首页 > 最新文献

IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Exploring Approaches to the Management of Physical, Virtual, and Social Sensors 探索物理、虚拟和社会传感器的管理方法
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162911
Ngombo Armando, J. Fernandes, A. Rodrigues, J. Silva, F. Boavida
As the Internet of Things (IoT) get bigger and more complex, efficient and effective management solutions must be developed and put into operation. IoT management is even more crucial if we want to have a unified management that can cope with electronic, virtual (software) and human-based sensors, which provide contextualised data via Online Social Networks (OSN). In this paper we present and explore approaches to this unified management, resorting to open and widely adopted standards for both data and device management, namely OMA - Lightweight Machine to Machine (LwM2M) and FIWARE. We present a proof-of-concept (PoC) implementation that shows that the management of the referred three types of sensing is feasible from both functional and performance points of view.
随着物联网(IoT)规模越来越大、越来越复杂,必须开发高效、有效的管理解决方案并投入运行。如果我们想要有一个统一的管理,可以应对电子、虚拟(软件)和基于人的传感器,这些传感器通过在线社交网络(OSN)提供情境化数据,物联网管理就更加重要。在本文中,我们提出并探索了这种统一管理的方法,采用开放和广泛采用的数据和设备管理标准,即OMA -轻量级机器对机器(LwM2M)和FIWARE。我们提出了一个概念验证(PoC)实现,表明从功能和性能的角度来看,上述三种传感类型的管理是可行的。
{"title":"Exploring Approaches to the Management of Physical, Virtual, and Social Sensors","authors":"Ngombo Armando, J. Fernandes, A. Rodrigues, J. Silva, F. Boavida","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162911","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162911","url":null,"abstract":"As the Internet of Things (IoT) get bigger and more complex, efficient and effective management solutions must be developed and put into operation. IoT management is even more crucial if we want to have a unified management that can cope with electronic, virtual (software) and human-based sensors, which provide contextualised data via Online Social Networks (OSN). In this paper we present and explore approaches to this unified management, resorting to open and widely adopted standards for both data and device management, namely OMA - Lightweight Machine to Machine (LwM2M) and FIWARE. We present a proof-of-concept (PoC) implementation that shows that the management of the referred three types of sensing is feasible from both functional and performance points of view.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131134500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home Applications 摘要:iCrutch:一种基于智能手机的智能拐杖
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162990
Ke Lin, Siyao Cheng, Jianzhong Li
As the rapid development of smart home applications, they bring us much more convenience to operate smart lights, room heaters etc., directly. However, it is still hard for the elderly or someone with leg problems to operate the above things because the movement of them is dependent on a pair of crutches so that their hands are not always available while using crutches. Therefore, if the elderly or someone with leg problems can control the devices directly with crutches, it will become more comfortable and convenient for them to live in the smart houses. Due to such motivation, we propose iCrutch in this paper. By bidding the user's obsolescent smartphone on the currently-used crutch, iCrutch can recognize the user's actions and send controlling commands to the smart home actuators for further response. Unlike remote controllers, our iCrutch permits the user to operate without leaving his/her hands from the crutches. Meanwhile, iCrutch almost does not introduce extra cost since the obsolescent smartphone and the current crutch are made full use of. The expense of our system is noticeably reduced compared with embedding a smart system into the crutch.
随着智能家居应用的快速发展,给我们带来了更多的便利,直接操作智能灯,房间加热器等。然而,对于老年人或有腿部问题的人来说,由于他们的运动依赖于一副拐杖,所以他们的手在使用拐杖时并不总是可用的,因此仍然很难操作上述事情。因此,如果老年人或有腿部问题的人可以用拐杖直接控制设备,那么他们在智能住宅中的生活将变得更加舒适和方便。基于这样的动机,我们在本文中提出了iCrutch。通过将用户陈旧的智能手机与当前使用的拐杖进行交互,iCrutch可以识别用户的动作,并向智能家居执行器发送控制命令,以获得进一步的响应。与遥控器不同,我们的iCrutch允许用户在不离开拐杖的情况下操作。同时,iCrutch几乎不会带来额外的成本,因为过时的智能手机和现在的拐杖都得到了充分的利用。与将智能系统嵌入拐杖相比,我们系统的费用明显降低。
{"title":"Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home Applications","authors":"Ke Lin, Siyao Cheng, Jianzhong Li","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162990","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162990","url":null,"abstract":"As the rapid development of smart home applications, they bring us much more convenience to operate smart lights, room heaters etc., directly. However, it is still hard for the elderly or someone with leg problems to operate the above things because the movement of them is dependent on a pair of crutches so that their hands are not always available while using crutches. Therefore, if the elderly or someone with leg problems can control the devices directly with crutches, it will become more comfortable and convenient for them to live in the smart houses. Due to such motivation, we propose iCrutch in this paper. By bidding the user's obsolescent smartphone on the currently-used crutch, iCrutch can recognize the user's actions and send controlling commands to the smart home actuators for further response. Unlike remote controllers, our iCrutch permits the user to operate without leaving his/her hands from the crutches. Meanwhile, iCrutch almost does not introduce extra cost since the obsolescent smartphone and the current crutch are made full use of. The expense of our system is noticeably reduced compared with embedding a smart system into the crutch.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Flow based IoT Botnet Attack Detection using Deep Learning 基于网络流的物联网僵尸网络攻击检测使用深度学习
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162668
S. S, V. R., M. Alazab, Soman Kp
Governments around the globe are promoting smart city applications to enhance the quality of daily-life activities in urban areas. Smart cities include internet-enabled devices that are used by applications like health care, power grid, water treatment, traffic control, etc to enhance its effectiveness. The expansion in the quantity of Internet-of-things (IoT) based botnet attacks is due to the growing trend of Internet-enabled devices. To provide advanced cyber security solutions to IoT devices and smart city applications, this paper proposes a deep learning (DL) based botnet detection system that works on network traffic flows. The botnet detection framework collects the network traffic flows, converts them into connection records and uses a DL model to detect attacks emanating from the compromised IoT devices. To determine an optimal DL model, many experiments are conducted on well-known and recently released benchmark data sets. Further, the datasets are visualized to understand its characteristics. The proposed DL model outperformed the conventional machine learning (ML) models.
全球各国政府都在推动智慧城市应用,以提高城市地区日常生活活动的质量。智慧城市包括医疗保健、电网、水处理、交通控制等应用中使用的互联网设备,以提高其有效性。基于物联网(IoT)的僵尸网络攻击数量的增长是由于联网设备的增长趋势。为了为物联网设备和智慧城市应用提供先进的网络安全解决方案,本文提出了一种基于深度学习(DL)的僵尸网络检测系统,该系统适用于网络流量。僵尸网络检测框架收集网络流量,将其转换为连接记录,并使用DL模型检测来自受损物联网设备的攻击。为了确定一个最优的深度学习模型,在已知的和最近发布的基准数据集上进行了许多实验。此外,数据集被可视化以理解其特征。提出的深度学习模型优于传统的机器学习(ML)模型。
{"title":"Network Flow based IoT Botnet Attack Detection using Deep Learning","authors":"S. S, V. R., M. Alazab, Soman Kp","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162668","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162668","url":null,"abstract":"Governments around the globe are promoting smart city applications to enhance the quality of daily-life activities in urban areas. Smart cities include internet-enabled devices that are used by applications like health care, power grid, water treatment, traffic control, etc to enhance its effectiveness. The expansion in the quantity of Internet-of-things (IoT) based botnet attacks is due to the growing trend of Internet-enabled devices. To provide advanced cyber security solutions to IoT devices and smart city applications, this paper proposes a deep learning (DL) based botnet detection system that works on network traffic flows. The botnet detection framework collects the network traffic flows, converts them into connection records and uses a DL model to detect attacks emanating from the compromised IoT devices. To determine an optimal DL model, many experiments are conducted on well-known and recently released benchmark data sets. Further, the datasets are visualized to understand its characteristics. The proposed DL model outperformed the conventional machine learning (ML) models.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Reconsidering Leakage Prevention in MapReduce 重新考虑MapReduce中的防泄漏
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162675
Xiaoyu Zhang, Yongzhi Wang, Yu Zou
Trusted Execution Environment introduces a promising avenue for protecting MapReduce jobs on untrusted cloud environment. However existing works pointed out that simply protecting MapReduce workers with trusted execution environment and protecting cross-worker communications with encryption still leak information via cross-worker traffic volumes. Although several countermeasures were proposed to defeat such a side-channel attack, in this paper, we showed that previous countermeasures not only fail in completely eliminating such a side-channel, but also have limitations from other aspects. To address all the discovered limitations, we further discussed possible strategies.
可信执行环境引入了一种很有前途的方法来保护在不可信云环境中的MapReduce作业。然而,现有的研究指出,简单地用可信的执行环境保护MapReduce工作线程,用加密保护跨工作线程通信,仍然会通过跨工作线程流量泄露信息。虽然提出了几种对抗这种侧信道攻击的对策,但在本文中,我们表明,以往的对策不仅不能完全消除这种侧信道,而且在其他方面也有局限性。为了解决所有发现的限制,我们进一步讨论了可能的策略。
{"title":"Reconsidering Leakage Prevention in MapReduce","authors":"Xiaoyu Zhang, Yongzhi Wang, Yu Zou","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162675","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162675","url":null,"abstract":"Trusted Execution Environment introduces a promising avenue for protecting MapReduce jobs on untrusted cloud environment. However existing works pointed out that simply protecting MapReduce workers with trusted execution environment and protecting cross-worker communications with encryption still leak information via cross-worker traffic volumes. Although several countermeasures were proposed to defeat such a side-channel attack, in this paper, we showed that previous countermeasures not only fail in completely eliminating such a side-channel, but also have limitations from other aspects. To address all the discovered limitations, we further discussed possible strategies.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-enabled Traffic Alert System for IoV in Smart Cities 基于sdn的智慧城市车联网交通警报系统
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162888
G. Raja, P. Dhanasekaran, S. Anbalagan, Aishwarya Ganapathisubramaniyan, A. Bashir
Intelligent Transportation System (ITS) are helping to enhance road safety and traffic management applications. Internet of Vehicles (IoV) plays a promising role in this field, which turns each vehicle into a smart object with its own compute, storage, and networking capabilities. Nowadays, accidents have been increased mainly due to un-notified alerts about other accidents, work-in-progress, and excessive motorized vehicles at peak times. This non-line of sight information can be efficiently delivered using vehicular communication. IoV network, however has its own challenges like high mobility and dynamic network topology. The above mentioned challenges are addressed with the assistance of a centralized Software Defined Network (SDN), which isolates the control plane from the data plane. In IoV, SDN provides logically centralized traffic management and improves the vehicular communication. In this paper, the Software Defined-Internet of Vehicles (SD-IoV) system is designed to manage heavy traffic and avoids broadcast storm problem with high packet delivery ratio. The proposed broadcast routing mechanism uses selective forwarding and neighbor awareness of the vehicle to efficiently broadcast emergency alert messages, thereby avoiding traffic jams and reducing travel time. On-Board Unit (OBU) in vehicles detects the accident and initializes the broadcast algorithm in SD-IoV system. The accident detection by OBU in vehicles is simulated using machine learning technique with an accuracy of 90%. Simulation performed in SUMO and OMNeT++ shows that with the help of the SDN controller, the IoV network achieves a high packet delivery ratio with minimal delay.
智能交通系统(ITS)正在帮助提高道路安全和交通管理的应用。车联网(IoV)在这一领域发挥了很好的作用,它将每辆车变成一个具有自己的计算、存储和网络能力的智能对象。如今,事故的增加主要是由于其他事故的未通知警报,正在进行的工作以及高峰时期机动车辆过多。这种非视线信息可以通过车载通信有效地传递。然而,车联网也面临着高移动性和动态网络拓扑等挑战。上面提到的挑战是在集中式软件定义网络(SDN)的帮助下解决的,它将控制平面与数据平面隔离开来。在车联网中,SDN提供了逻辑上集中的流量管理,改善了车载通信。本文设计了软件定义的车联网(SD-IoV)系统,以管理大流量,避免高分组分发率的广播风暴问题。提出的广播路由机制利用车辆的选择性转发和邻居感知来有效地广播紧急警报信息,从而避免了交通堵塞,减少了行驶时间。车载车载单元OBU (On-Board Unit)在SD-IoV系统中检测事故并初始化广播算法。利用机器学习技术模拟OBU在车辆中的事故检测,准确率达到90%。在SUMO和omnet++中进行的仿真表明,在SDN控制器的帮助下,IoV网络以最小的延迟实现了高的分组分发率。
{"title":"SDN-enabled Traffic Alert System for IoV in Smart Cities","authors":"G. Raja, P. Dhanasekaran, S. Anbalagan, Aishwarya Ganapathisubramaniyan, A. Bashir","doi":"10.1109/infocomwkshps50562.2020.9162888","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162888","url":null,"abstract":"Intelligent Transportation System (ITS) are helping to enhance road safety and traffic management applications. Internet of Vehicles (IoV) plays a promising role in this field, which turns each vehicle into a smart object with its own compute, storage, and networking capabilities. Nowadays, accidents have been increased mainly due to un-notified alerts about other accidents, work-in-progress, and excessive motorized vehicles at peak times. This non-line of sight information can be efficiently delivered using vehicular communication. IoV network, however has its own challenges like high mobility and dynamic network topology. The above mentioned challenges are addressed with the assistance of a centralized Software Defined Network (SDN), which isolates the control plane from the data plane. In IoV, SDN provides logically centralized traffic management and improves the vehicular communication. In this paper, the Software Defined-Internet of Vehicles (SD-IoV) system is designed to manage heavy traffic and avoids broadcast storm problem with high packet delivery ratio. The proposed broadcast routing mechanism uses selective forwarding and neighbor awareness of the vehicle to efficiently broadcast emergency alert messages, thereby avoiding traffic jams and reducing travel time. On-Board Unit (OBU) in vehicles detects the accident and initializes the broadcast algorithm in SD-IoV system. The accident detection by OBU in vehicles is simulated using machine learning technique with an accuracy of 90%. Simulation performed in SUMO and OMNeT++ shows that with the help of the SDN controller, the IoV network achieves a high packet delivery ratio with minimal delay.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132500513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer Nodes 在数据传输节点上使用可编程100Gbps网卡的实时自适应网络
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162721
Gauravdeep Shami, M. Lyonnais, Rodney G. Wilson
High bandwidth, low latency modern-day applications are extremely sensitive to variations in network parameters. In-band Network Telemetry (INT) can help in extracting forwarding plane dynamics of the network element and characterize the service path to make preemptive service modifications. In this demonstration, we showcase a programmable telemetry framework via FPGA based NICs installed in e-science Data Transfer Nodes (DTN) operating over Ciena's Research Network Innovation Platform (CENI). We demonstrate the benefits of this framework in accelerating fault localization mechanisms and implementing corrective actions, in a closed loop with Software Defined Network (SDN) Orchestrators.
高带宽,低延迟现代应用程序对网络参数的变化非常敏感。带内网络遥测(INT)技术可以提取网元的转发平面动态,并对业务路径进行表征,从而进行先发制人的业务修改。在本演示中,我们展示了一个可编程遥测框架,该框架通过基于FPGA的网卡安装在电子科学数据传输节点(DTN)中,该节点在Ciena的研究网络创新平台(CENI)上运行。我们在软件定义网络(SDN)编排器的闭环中演示了该框架在加速故障定位机制和实施纠正措施方面的好处。
{"title":"Real Time Adaptive Networking using Programmable 100Gbps NIC on Data Transfer Nodes","authors":"Gauravdeep Shami, M. Lyonnais, Rodney G. Wilson","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162721","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162721","url":null,"abstract":"High bandwidth, low latency modern-day applications are extremely sensitive to variations in network parameters. In-band Network Telemetry (INT) can help in extracting forwarding plane dynamics of the network element and characterize the service path to make preemptive service modifications. In this demonstration, we showcase a programmable telemetry framework via FPGA based NICs installed in e-science Data Transfer Nodes (DTN) operating over Ciena's Research Network Innovation Platform (CENI). We demonstrate the benefits of this framework in accelerating fault localization mechanisms and implementing corrective actions, in a closed loop with Software Defined Network (SDN) Orchestrators.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAT-NHP: Radio Access Technology Selection Based on N-hop Prediction 基于n跳预测的无线接入技术选择
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162863
Weifeng Sun, Guanghao Zhang, Yuankui Zhang, Chi Lin
Radio access technology (RAT) is used to choose the best target network during the network access or network handover. It could be used for the rescuing scenario in the wireless multi-hop networks. Most researches about RAT selection focus on heterogeneous cell networks, which are single-hop networks. The radio access selection method for cell networks is no longer suitable for heterogeneous wireless multi-hop network (HWMN), because the communicating quality of the expected access point (EAP) could not reflect the whole network capability due to the multi-hop characteristics. This paper presents a novel metric, named n-hop prediction (NHP), for radio access selection in HWMN. NHP takes network capability and load within n-hop range of the expected access point into account, and also it takes users' QoS requirement into account. Simulation results reveal that the proposed approach can achieve better performance than that without considering these factors.
无线接入技术(RAT)用于在网络接入或网络切换过程中选择最佳目标网络。它可以用于无线多跳网络中的抢救场景。大多数关于RAT选择的研究都集中在异构细胞网络上,这是一种单跳网络。蜂窝网络的无线接入选择方法不再适用于异构无线多跳网络(HWMN),因为期望接入点(EAP)的通信质量由于其多跳特性而不能反映整个网络的能力。本文提出了一种用于HWMN无线接入选择的n跳预测(NHP)新度量。NHP既考虑了期望接入点n跳范围内的网络容量和负载,又考虑了用户的QoS需求。仿真结果表明,该方法比不考虑这些因素的方法具有更好的性能。
{"title":"RAT-NHP: Radio Access Technology Selection Based on N-hop Prediction","authors":"Weifeng Sun, Guanghao Zhang, Yuankui Zhang, Chi Lin","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162863","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162863","url":null,"abstract":"Radio access technology (RAT) is used to choose the best target network during the network access or network handover. It could be used for the rescuing scenario in the wireless multi-hop networks. Most researches about RAT selection focus on heterogeneous cell networks, which are single-hop networks. The radio access selection method for cell networks is no longer suitable for heterogeneous wireless multi-hop network (HWMN), because the communicating quality of the expected access point (EAP) could not reflect the whole network capability due to the multi-hop characteristics. This paper presents a novel metric, named n-hop prediction (NHP), for radio access selection in HWMN. NHP takes network capability and load within n-hop range of the expected access point into account, and also it takes users' QoS requirement into account. Simulation results reveal that the proposed approach can achieve better performance than that without considering these factors.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133584185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT data sharing privacy preserving scheme 一种物联网数据共享隐私保护方案
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162939
Yan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du
The massive data collection, transmission, storage and processing in IoT are challenging to the cloud computing environment. Aiming at the problem of data sharing and privacy protection of IoT, this paper designed an IoT data sharing model that is based on the edge computing service. The model establishes the virtual data management service by the data abstraction in the edge service layer to provide data service for IoT devices, and further proposed a privacy preserving scheme for data sharing based on attribute encryption. The scheme realized anonymous data sharing and access control and finally is proved to be secure and has a good performance.
物联网中海量数据的采集、传输、存储和处理对云计算环境提出了挑战。针对物联网数据共享和隐私保护问题,本文设计了一种基于边缘计算服务的物联网数据共享模型。该模型通过边缘服务层的数据抽象建立虚拟数据管理服务,为物联网设备提供数据服务,并进一步提出了一种基于属性加密的数据共享隐私保护方案。该方案实现了匿名数据共享和访问控制,最终证明了该方案的安全性和良好的性能。
{"title":"An IoT data sharing privacy preserving scheme","authors":"Yan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du","doi":"10.1109/infocomwkshps50562.2020.9162939","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162939","url":null,"abstract":"The massive data collection, transmission, storage and processing in IoT are challenging to the cloud computing environment. Aiming at the problem of data sharing and privacy protection of IoT, this paper designed an IoT data sharing model that is based on the edge computing service. The model establishes the virtual data management service by the data abstraction in the edge service layer to provide data service for IoT devices, and further proposed a privacy preserving scheme for data sharing based on attribute encryption. The scheme realized anonymous data sharing and access control and finally is proved to be secure and has a good performance.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones 基于卷积神经网络的手机射频指纹识别方案
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9163058
Sheng Wang, Linning Peng, Hua Fu, A. Hu, Xinyu Zhou
Global system for mobile communications (GSM) is one of the most widely used communication standards in the world today, which still has a large number of users, so it is of great security significance to identify devices operating in a GSM network. This paper proposes a novel radio frequency fingerprinting (RFF) based device identifications method for mobile phones. A differential constellation trace figure (DCTF) physical layer RFF extraction and convolutional neural network (CNN) based classification scheme is designed to identify accessing mobile phones. Theoretical analysis shows that differential process of GSM signal can effectively reflect the characteristics of RFF from different phones. Compared with the existing RFF identification methods, CNN based classification can identify the DCTF of different devices with low complexity and high accuracy. Furthermore, the proposed DCTF-CNN method is robust to different device locations and GSM parameters. Experimental results show that the accuracy of the proposed DCTF-CNN method can reach 92.97% and 99.77% with SNR at 25 dB and 50 dB for 6 mobile phones.
GSM (Global system for mobile communications,全球移动通信系统)是当今世界上使用最广泛的通信标准之一,它仍然拥有大量的用户,因此识别在GSM网络中运行的设备具有重要的安全意义。提出了一种基于射频指纹技术的手机设备识别方法。设计了一种基于差分星座轨迹图(DCTF)物理层RFF提取和卷积神经网络(CNN)的手机识别方法。理论分析表明,GSM信号的差分处理可以有效地反映不同手机的RFF特征。与现有的RFF识别方法相比,基于CNN的分类可以识别不同设备的DCTF,且复杂度低,准确率高。此外,所提出的DCTF-CNN方法对不同的设备位置和GSM参数具有鲁棒性。实验结果表明,本文提出的DCTF-CNN方法在25 dB和50 dB信噪比下的准确率分别达到92.97%和99.77%,适用于6部手机。
{"title":"A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones","authors":"Sheng Wang, Linning Peng, Hua Fu, A. Hu, Xinyu Zhou","doi":"10.1109/infocomwkshps50562.2020.9163058","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9163058","url":null,"abstract":"Global system for mobile communications (GSM) is one of the most widely used communication standards in the world today, which still has a large number of users, so it is of great security significance to identify devices operating in a GSM network. This paper proposes a novel radio frequency fingerprinting (RFF) based device identifications method for mobile phones. A differential constellation trace figure (DCTF) physical layer RFF extraction and convolutional neural network (CNN) based classification scheme is designed to identify accessing mobile phones. Theoretical analysis shows that differential process of GSM signal can effectively reflect the characteristics of RFF from different phones. Compared with the existing RFF identification methods, CNN based classification can identify the DCTF of different devices with low complexity and high accuracy. Furthermore, the proposed DCTF-CNN method is robust to different device locations and GSM parameters. Experimental results show that the accuracy of the proposed DCTF-CNN method can reach 92.97% and 99.77% with SNR at 25 dB and 50 dB for 6 mobile phones.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129370354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Opening the Deep Pandora Box: Explainable Traffic Classification 打开潘多拉魔盒:可解释的流量分类
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162704
Cedric Beliard, A. Finamore, Dario Rossi
Fostered by the tremendous success in the image recognition field, recently there has been a strong push for the adoption of Convolutional Neural Networks (CNN) in networks, especially at the edge, assisted by low-power hardware equipment (known as “tensor processing units”) for the acceleration of CNN-related computations. The availability of such hardware has reignited the interest for traffic classification approaches that are based on Deep Learning. However, unlike tree-based approaches that are easy to interpret, CNNs are in essence represented by a large number of weights, whose interpretation is particularly obscure for the human operators. Since human operators will need to deal, troubleshoot, and maintain these automatically learned models, that will replace the more easily human-readable heuristic rules of DPI classification engine, there is a clear need to open the “deep pandora box”, and make it easily accessible for network domain experts. In this demonstration, we shed light in the inference process of a commercial-grade classification engine dealing with hundreds of classes, enriching the classification workflow with tools to enable better understanding of the inner mechanics of both the traffic and the models.
在图像识别领域取得巨大成功的推动下,最近有一股强大的力量推动卷积神经网络(CNN)在网络中的应用,特别是在边缘,在低功耗硬件设备(称为“张量处理单元”)的辅助下,加速与CNN相关的计算。这种硬件的可用性重新点燃了人们对基于深度学习的流量分类方法的兴趣。然而,与易于解释的基于树的方法不同,cnn本质上是由大量权重表示的,这些权重的解释对于人类操作员来说尤其模糊。由于人类操作员将需要处理、排除故障和维护这些自动学习的模型,这将取代更容易被人类阅读的DPI分类引擎的启发式规则,因此显然需要打开“深层潘多拉盒子”,并使其易于网络领域专家访问。在这个演示中,我们阐明了处理数百个类的商业级分类引擎的推理过程,用工具丰富了分类工作流,以便更好地理解流量和模型的内部机制。
{"title":"Opening the Deep Pandora Box: Explainable Traffic Classification","authors":"Cedric Beliard, A. Finamore, Dario Rossi","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162704","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162704","url":null,"abstract":"Fostered by the tremendous success in the image recognition field, recently there has been a strong push for the adoption of Convolutional Neural Networks (CNN) in networks, especially at the edge, assisted by low-power hardware equipment (known as “tensor processing units”) for the acceleration of CNN-related computations. The availability of such hardware has reignited the interest for traffic classification approaches that are based on Deep Learning. However, unlike tree-based approaches that are easy to interpret, CNNs are in essence represented by a large number of weights, whose interpretation is particularly obscure for the human operators. Since human operators will need to deal, troubleshoot, and maintain these automatically learned models, that will replace the more easily human-readable heuristic rules of DPI classification engine, there is a clear need to open the “deep pandora box”, and make it easily accessible for network domain experts. In this demonstration, we shed light in the inference process of a commercial-grade classification engine dealing with hundreds of classes, enriching the classification workflow with tools to enable better understanding of the inner mechanics of both the traffic and the models.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1