首页 > 最新文献

IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
A Dynamic Resource Allocation Scheme in Vehicular Communications 一种车载通信动态资源分配方案
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162889
Akinsola Akinsanya, Manish Nair, Yijin Pan, Jiangzhou Wang
A switched-beam based multiple-input-multiple output (MIMO) vehicle-to-infrastructure (V2I) system can grant better system reliability as the signal-to-interference-plus-noise ratio (SINR) can be significantly optimized. In order to maximize the number of served vehicles by the simple switched-beam based V2I system, it is crucial to additionally introduce vehicle-to-vehicle (V2V) communication because (i) more than one vehicle might occupy a beam coverage, and (ii) vehicles may be out of the coverage region of a beam. In this paper, we proposed a cooperative infrastructure-beam allocation (IBA) and location-estimation (LE) scheme to optimize system coverage and reliability. IBA is an SINR optimization algorithm, and LE is a location-based proximity service for V2I and V2V communications respectively. Our simulation results show that a reliable beam coverage region in switched-beam V2I can be achieved with flexible value of SINR threshold. Also, the outage probability and average rates are directly dependent on set SINR thresholds. Finally, cooperation between V2I and V2V communication significantly improves the utility ratio which is further used as a metric for reliability.
基于开关波束的多输入多输出(MIMO)车对基础设施(V2I)系统可以显著优化信噪比(SINR),从而提供更好的系统可靠性。为了通过简单的基于开关波束的V2I系统最大限度地增加服务车辆的数量,额外引入车对车(V2V)通信至关重要,因为(i)多个车辆可能占用波束覆盖范围,(ii)车辆可能不在波束覆盖范围内。为了优化系统的覆盖和可靠性,提出了一种基础设施波束分配(IBA)和位置估计(LE)协同方案。IBA是一种SINR优化算法,LE是一种基于位置的接近服务,分别用于V2I和V2V通信。仿真结果表明,采用灵活的信噪比阈值可以获得可靠的波束覆盖区域。此外,中断概率和平均速率直接依赖于设置的SINR阈值。最后,V2I和V2V通信之间的合作显著提高了效用比,这进一步被用作可靠性的度量。
{"title":"A Dynamic Resource Allocation Scheme in Vehicular Communications","authors":"Akinsola Akinsanya, Manish Nair, Yijin Pan, Jiangzhou Wang","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162889","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162889","url":null,"abstract":"A switched-beam based multiple-input-multiple output (MIMO) vehicle-to-infrastructure (V2I) system can grant better system reliability as the signal-to-interference-plus-noise ratio (SINR) can be significantly optimized. In order to maximize the number of served vehicles by the simple switched-beam based V2I system, it is crucial to additionally introduce vehicle-to-vehicle (V2V) communication because (i) more than one vehicle might occupy a beam coverage, and (ii) vehicles may be out of the coverage region of a beam. In this paper, we proposed a cooperative infrastructure-beam allocation (IBA) and location-estimation (LE) scheme to optimize system coverage and reliability. IBA is an SINR optimization algorithm, and LE is a location-based proximity service for V2I and V2V communications respectively. Our simulation results show that a reliable beam coverage region in switched-beam V2I can be achieved with flexible value of SINR threshold. Also, the outage probability and average rates are directly dependent on set SINR thresholds. Finally, cooperation between V2I and V2V communication significantly improves the utility ratio which is further used as a metric for reliability.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sparser: Secure Nearest Neighbor Search with Space-filling Curves Sparser:具有空间填充曲线的安全最近邻搜索
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162585
Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu
Nearest neighbor search, a classic way of identifying similar data, can be applied to various areas, including database, machine learning, natural language processing, software engineering, etc. Secure nearest neighbor search aims to find nearest neighbors to a given query point over encrypted data without accessing data in plaintext. It provides privacy protection to datasets when nearest neighbor queries need to be operated by an untrusted party (e.g., a public server). While different solutions have been proposed to support nearest neighbor queries on encrypted data, these existing solutions still encounter critical drawbacks either in efficiency or privacy. In light of the limitations in the current literature, we propose a novel approximate nearest neighbor search solution, referred to as Sparser, by leveraging a combination of space-filling curves, perturbation, and Order-Preserving Encryption. The advantages of Sparser are twofold, strengthening privacy and improving efficiency. Specifically, Sparser pre-processes plaintext data with space-filling curves and perturbation, such that data is sparse, which mitigates leakage abuse attacks and renders stronger privacy. In addition to privacy enhancement, Sparser can efficiently find approximate nearest neighbors over encrypted data with logarithmic time. Through extensive experiments over real-world datasets, we demonstrate that Sparser can achieve strong privacy protection under leakage abuse attacks and minimize search time.
最近邻搜索是一种经典的识别相似数据的方法,可以应用于数据库、机器学习、自然语言处理、软件工程等各个领域。安全近邻搜索的目的是在不访问明文数据的情况下,通过加密数据找到给定查询点的近邻。当最近邻查询需要由不受信任的一方(例如,公共服务器)操作时,它为数据集提供隐私保护。虽然已经提出了不同的解决方案来支持对加密数据的最近邻查询,但这些现有的解决方案仍然在效率或隐私方面遇到严重的缺点。鉴于当前文献的局限性,我们提出了一种新的近似最近邻搜索解决方案,称为Sparser,通过利用空间填充曲线,摄动和保序加密的组合。Sparser的优点是双重的,加强隐私和提高效率。具体来说,Sparser使用空间填充曲线和摄动对明文数据进行预处理,使数据稀疏,减轻了泄漏滥用攻击,具有更强的隐私性。除了增强隐私性之外,Sparser还可以在对数时间内有效地找到加密数据的近似近邻。通过对真实数据集的大量实验,我们证明了Sparser可以在泄漏滥用攻击下实现强大的隐私保护并最大限度地减少搜索时间。
{"title":"Sparser: Secure Nearest Neighbor Search with Space-filling Curves","authors":"Siqin Fang, Sean Kennedy, Chenggang Wang, Boyang Wang, Qingqi Pei, Xuefeng Liu","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162585","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162585","url":null,"abstract":"Nearest neighbor search, a classic way of identifying similar data, can be applied to various areas, including database, machine learning, natural language processing, software engineering, etc. Secure nearest neighbor search aims to find nearest neighbors to a given query point over encrypted data without accessing data in plaintext. It provides privacy protection to datasets when nearest neighbor queries need to be operated by an untrusted party (e.g., a public server). While different solutions have been proposed to support nearest neighbor queries on encrypted data, these existing solutions still encounter critical drawbacks either in efficiency or privacy. In light of the limitations in the current literature, we propose a novel approximate nearest neighbor search solution, referred to as Sparser, by leveraging a combination of space-filling curves, perturbation, and Order-Preserving Encryption. The advantages of Sparser are twofold, strengthening privacy and improving efficiency. Specifically, Sparser pre-processes plaintext data with space-filling curves and perturbation, such that data is sparse, which mitigates leakage abuse attacks and renders stronger privacy. In addition to privacy enhancement, Sparser can efficiently find approximate nearest neighbors over encrypted data with logarithmic time. Through extensive experiments over real-world datasets, we demonstrate that Sparser can achieve strong privacy protection under leakage abuse attacks and minimize search time.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126662428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Glide and Zap Q-Learning 滑翔和Zap Q-Learning
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162650
Xiaofan He, Richeng Jin, H. Dai
As a powerful mathematical framework that allows intelligent agents to gradually learn their optimal strategies in unknown dynamic environments, reinforcement learning (RL) has found its success in many important applications. Nonetheless, a common stumbling block of RL algorithms is their low learning speed. Although different methods have been developed in literature to enhance the learning speed when special structure or prior learning experience is available, expediting RL in the general settings still remains a challenge. The Zap Q-learning is a recent breakthrough in this direction, which is shown to be an order of magnitude faster than the conventional Q-learning and its cutting-edging variants. Inspired by this exciting result, a novel algorithm, termed Glide and Zap Q-learning (G-Zap Q-learning), is proposed in this work by incorporating a novel gliding step into the learning process. The proposed algorithm is provably convergent to the optimal strategy and can further increase the learning speed of the original Zap Q-learning by several folds. In addition, it is applicable to general Markov decision processes (MDPs) and hence assumes wide applications. Simulations over both randomly generated MDPs and an exemplary application of privacy-aware task offloading in mobile-edge computing are conducted to validate the effectiveness of the proposed algorithm.
强化学习作为一个强大的数学框架,允许智能体在未知的动态环境中逐渐学习其最优策略,在许多重要的应用中取得了成功。尽管如此,强化学习算法的一个常见障碍是它们的低学习速度。虽然文献中已经开发了不同的方法来提高特殊结构或先验学习经验时的学习速度,但在一般情况下加快强化学习仍然是一个挑战。Zap Q-learning是该方向的最新突破,其速度比传统Q-learning及其尖端变体快一个数量级。受这一令人兴奋的结果的启发,本研究提出了一种新的算法,称为滑翔和Zap q -学习(G-Zap q -学习),将一种新的滑翔步骤纳入学习过程。该算法可证明收敛于最优策略,并可将原Zap q -学习的学习速度提高数倍。此外,它适用于一般的马尔可夫决策过程,因此具有广泛的应用。对随机生成的mdp和移动边缘计算中隐私感知任务卸载的示例应用进行了模拟,以验证所提出算法的有效性。
{"title":"Glide and Zap Q-Learning","authors":"Xiaofan He, Richeng Jin, H. Dai","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162650","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162650","url":null,"abstract":"As a powerful mathematical framework that allows intelligent agents to gradually learn their optimal strategies in unknown dynamic environments, reinforcement learning (RL) has found its success in many important applications. Nonetheless, a common stumbling block of RL algorithms is their low learning speed. Although different methods have been developed in literature to enhance the learning speed when special structure or prior learning experience is available, expediting RL in the general settings still remains a challenge. The Zap Q-learning is a recent breakthrough in this direction, which is shown to be an order of magnitude faster than the conventional Q-learning and its cutting-edging variants. Inspired by this exciting result, a novel algorithm, termed Glide and Zap Q-learning (G-Zap Q-learning), is proposed in this work by incorporating a novel gliding step into the learning process. The proposed algorithm is provably convergent to the optimal strategy and can further increase the learning speed of the original Zap Q-learning by several folds. In addition, it is applicable to general Markov decision processes (MDPs) and hence assumes wide applications. Simulations over both randomly generated MDPs and an exemplary application of privacy-aware task offloading in mobile-edge computing are conducted to validate the effectiveness of the proposed algorithm.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cerberus: Privacy-Preserving Computation in Edge Computing Cerberus:边缘计算中的隐私保护计算
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162942
Di Zhang, Lei Fan
Edge computing reduces the overhead of data centers and improves the efficiency of data processing. However, traditional cloud data protection mechanisms are no longer applicable to edge devices. Data leakage and other privacy issues may occur when computation is outsourced to edge nodes. The decentralization raises new privacy challenge for data control, storage and computation. In this work, we present Cerberus, a brand-new framework that preserves data privacy in edge computing by combining blockchain, distributed data storage and trusted execution environment (TEE). Blockchain is used to maintain a global computation state, and also acts as a medium of information interaction. Distributed data storage provides a secure and large-capacity storage. TEE-based off-chain computation guarantees confidentiality and efficiency of data processing. We also implement a prototype of Cerberus using Hyperledger Fabric and Intel SGX. Our evaluation on a sample of data sorting application shows that Cerberus achieves significant speed ups over previous cryptographic schemes. Compared with non secure computation, Cerberus can preserve data privacy without incurring much performance loss.
边缘计算降低了数据中心的开销,提高了数据处理的效率。然而,传统的云数据保护机制已不再适用于边缘设备。当计算外包给边缘节点时,可能会出现数据泄漏和其他隐私问题。去中心化对数据控制、存储和计算提出了新的隐私挑战。在这项工作中,我们提出了Cerberus,这是一个全新的框架,通过结合区块链,分布式数据存储和可信执行环境(TEE)来保护边缘计算中的数据隐私。区块链用于维护全局计算状态,同时也作为信息交互的媒介。分布式数据存储提供了安全、大容量的存储方式。基于tee的脱链计算保证了数据处理的保密性和效率。我们还使用Hyperledger Fabric和Intel SGX实现了Cerberus的原型。我们对数据排序应用程序样本的评估表明,Cerberus比以前的加密方案实现了显着的速度提升。与非安全计算相比,Cerberus在保护数据隐私的同时不会造成很大的性能损失。
{"title":"Cerberus: Privacy-Preserving Computation in Edge Computing","authors":"Di Zhang, Lei Fan","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162942","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162942","url":null,"abstract":"Edge computing reduces the overhead of data centers and improves the efficiency of data processing. However, traditional cloud data protection mechanisms are no longer applicable to edge devices. Data leakage and other privacy issues may occur when computation is outsourced to edge nodes. The decentralization raises new privacy challenge for data control, storage and computation. In this work, we present Cerberus, a brand-new framework that preserves data privacy in edge computing by combining blockchain, distributed data storage and trusted execution environment (TEE). Blockchain is used to maintain a global computation state, and also acts as a medium of information interaction. Distributed data storage provides a secure and large-capacity storage. TEE-based off-chain computation guarantees confidentiality and efficiency of data processing. We also implement a prototype of Cerberus using Hyperledger Fabric and Intel SGX. Our evaluation on a sample of data sorting application shows that Cerberus achieves significant speed ups over previous cryptographic schemes. Compared with non secure computation, Cerberus can preserve data privacy without incurring much performance loss.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks 资源受限物联网网络中平衡能源与安全的非合作博弈
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162702
Syed Bilal Hussain Shah, Lei Wang, P. Reddy, C. A. Carie
The restricted resources in IoT networks such as limited battery have resulted in strict requirements to prolong the network life time. To improve the communication, IoT nodes attempt to optimize the available energy in the sensor network, this makes them vulnerable to the malicious attacks from adversaries because of open scenario. In addition, enhancing the security level will consume the energy and decreases network life time. In order to balance energy and security in the network game theory concept is used. We design a non cooperative game between energy and security where the utilities of both energy and security players are maximized by controlling the number of nodes transmitting and hash length. We consider complete and incomplete information game and determine Nash equilibrium. Extensive simulation have been performed to examine Nash equilibrium. We obtained Nash equilibrium for both energy and security players.
物联网网络中有限的资源,如有限的电池,导致了对延长网络寿命的严格要求。为了改善通信,物联网节点试图优化传感器网络中的可用能量,这使得它们由于开放场景而容易受到对手的恶意攻击。此外,提高安全级别会消耗能源,降低网络寿命。为了平衡网络中的能量和安全,运用了博弈论的概念。我们设计了一个能源和安全之间的非合作博弈,通过控制传输节点的数量和哈希长度来最大化能源和安全参与者的效用。考虑完全和不完全信息博弈,确定纳什均衡。已经进行了广泛的模拟来检验纳什均衡。我们得到了能源和安全参与者的纳什均衡。
{"title":"Non-Cooperative Game to Balance Energy and Security in Resource Constrained IoT Networks","authors":"Syed Bilal Hussain Shah, Lei Wang, P. Reddy, C. A. Carie","doi":"10.1109/infocomwkshps50562.2020.9162702","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162702","url":null,"abstract":"The restricted resources in IoT networks such as limited battery have resulted in strict requirements to prolong the network life time. To improve the communication, IoT nodes attempt to optimize the available energy in the sensor network, this makes them vulnerable to the malicious attacks from adversaries because of open scenario. In addition, enhancing the security level will consume the energy and decreases network life time. In order to balance energy and security in the network game theory concept is used. We design a non cooperative game between energy and security where the utilities of both energy and security players are maximized by controlling the number of nodes transmitting and hash length. We consider complete and incomplete information game and determine Nash equilibrium. Extensive simulation have been performed to examine Nash equilibrium. We obtained Nash equilibrium for both energy and security players.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logical Peering for Interdomain Networking on Testbeds 测试台上域间网络的逻辑对等
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162936
Yuanjun Yao, Q. Cao, P. Ruth, Mert Cevik, Cong Wang, J. Chase
Research testbed fabrics have potential to support long-lived, evolving, interdomain experiments, including opt-in application traffic across multiple campuses and edge sites. We propose abstractions and security infrastructure to facilitate multi-domain networking, and a reusable controller toolkit (Ex-oPlex) for network service providers (NSPs) running in testbed-hosted virtual network slices. We demonstrate the idea on the ExoGENI testbed, which allows slices to interconnect and exchange traffic over peering links by mutual consent. Each ExoPlex NSP runs a peering controller that manages its interactions with its linked peers and controls the NSP's dataplane network via SDN. Our approach expresses policies for secure peering and routing in a declarative language-logical peering. The prototype uses logic rules to verify IP prefix ownership, filter and validate route advertisements, and implement user-specified policies for connectivity and path control in networks with multiple transit NSPs.
研究测试平台结构具有支持长期、不断发展的跨域实验的潜力,包括跨多个校园和边缘站点的可选应用流量。我们提出了抽象和安全基础设施,以促进多域网络,并为运行在测试平台托管的虚拟网络切片中的网络服务提供商(nsp)提供了可重用的控制器工具包(Ex-oPlex)。我们在ExoGENI测试平台上演示了这个想法,它允许切片通过相互同意在对等链路上互连和交换流量。每个ExoPlex NSP运行一个对等控制器,该控制器管理其与连接的对等节点的交互,并通过SDN控制NSP的数据平面网络。我们的方法用声明性语言——逻辑对等——表达安全对等和路由的策略。该原型通过逻辑规则来验证IP前缀的归属,过滤和验证路由发布,并在具有多个传输nsp的网络中实现用户指定的连通性和路径控制策略。
{"title":"Logical Peering for Interdomain Networking on Testbeds","authors":"Yuanjun Yao, Q. Cao, P. Ruth, Mert Cevik, Cong Wang, J. Chase","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162936","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162936","url":null,"abstract":"Research testbed fabrics have potential to support long-lived, evolving, interdomain experiments, including opt-in application traffic across multiple campuses and edge sites. We propose abstractions and security infrastructure to facilitate multi-domain networking, and a reusable controller toolkit (Ex-oPlex) for network service providers (NSPs) running in testbed-hosted virtual network slices. We demonstrate the idea on the ExoGENI testbed, which allows slices to interconnect and exchange traffic over peering links by mutual consent. Each ExoPlex NSP runs a peering controller that manages its interactions with its linked peers and controls the NSP's dataplane network via SDN. Our approach expresses policies for secure peering and routing in a declarative language-logical peering. The prototype uses logic rules to verify IP prefix ownership, filter and validate route advertisements, and implement user-specified policies for connectivity and path control in networks with multiple transit NSPs.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis of LTE-V2X and A Platooning Case Study LTE-V2X安全性分析及A队列组网案例研究
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162860
Pengfei Zhu, Konglin Zhu, Lin Zhang
C-V2X extended from cellular networks has been considered one of the promising communication techniques for Internet of Vehicles (IoV). Correspondingly, it inherits the security issues from cellular networks, i.e., LTE or 5G, and also bring new types of security issues. In this paper, we take LTE-V2X as an example to investigate the potential security and privacy issues of LTE-V2X. In particular, we first study the LTE-V2X communication procedure and discover the potential security flaws. Then we use the platooning case to show the harmfulness caused by different types of attacks using the security flaws. Finally, we use SUMO and OMNET++ to simulate platoon and LTE-V2X, and conduct different types of attacks on the simulator. The simulation results show that various attacks severely degrade the performance of platoon from the perspective of inter-vehicle distance and vehicle speed.
从蜂窝网络扩展而来的C-V2X通信技术被认为是车联网(IoV)中最有前途的通信技术之一。相应的,它既继承了蜂窝网络即LTE或5G的安全问题,也带来了新型的安全问题。本文以LTE-V2X为例,探讨LTE-V2X潜在的安全和隐私问题。特别是,我们首先研究了LTE-V2X通信过程,并发现了潜在的安全漏洞。然后以队列为例说明利用安全漏洞进行不同类型攻击所造成的危害。最后,我们使用SUMO和omnet++对排和LTE-V2X进行模拟,并对模拟器进行不同类型的攻击。仿真结果表明,从车际距离和车速的角度看,各种攻击严重降低了队列的性能。
{"title":"Security Analysis of LTE-V2X and A Platooning Case Study","authors":"Pengfei Zhu, Konglin Zhu, Lin Zhang","doi":"10.1109/infocomwkshps50562.2020.9162860","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162860","url":null,"abstract":"C-V2X extended from cellular networks has been considered one of the promising communication techniques for Internet of Vehicles (IoV). Correspondingly, it inherits the security issues from cellular networks, i.e., LTE or 5G, and also bring new types of security issues. In this paper, we take LTE-V2X as an example to investigate the potential security and privacy issues of LTE-V2X. In particular, we first study the LTE-V2X communication procedure and discover the potential security flaws. Then we use the platooning case to show the harmfulness caused by different types of attacks using the security flaws. Finally, we use SUMO and OMNET++ to simulate platoon and LTE-V2X, and conduct different types of attacks on the simulator. The simulation results show that various attacks severely degrade the performance of platoon from the perspective of inter-vehicle distance and vehicle speed.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GENIX: A GENI-based IXP Emulation GENIX:基于geni的IXP仿真
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9163037
Shahzeb Mustafa, P. K. Dey, M. Yuksel
We present GENIX; a modular emulation framework that mimics the behavior of IXPs on a public test-bed. GENIX is implemented in Global Environment for Network Innovations (GENI) and capable of enumerating various interactions among ISPs, expected in the real world. GENIX is the first effort towards alleviating the complexities of large-scale emulation to abstract a lightweight design where IXP dynamics can be usefully applied. We test GENIX for its ability to handle large volumes of traffic flow and its performance during network congestion.
我们介绍GENIX;在公共测试平台上模拟ixp行为的模块化仿真框架。GENIX是在全球网络创新环境(GENI)中实现的,能够列举在现实世界中预期的isp之间的各种交互。GENIX是为减轻大规模仿真的复杂性而做出的第一个努力,它抽象出一种轻量级设计,在这种设计中可以有效地应用IXP动力学。我们测试了GENIX处理大量流量的能力以及它在网络拥塞期间的性能。
{"title":"GENIX: A GENI-based IXP Emulation","authors":"Shahzeb Mustafa, P. K. Dey, M. Yuksel","doi":"10.1109/infocomwkshps50562.2020.9163037","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9163037","url":null,"abstract":"We present GENIX; a modular emulation framework that mimics the behavior of IXPs on a public test-bed. GENIX is implemented in Global Environment for Network Innovations (GENI) and capable of enumerating various interactions among ISPs, expected in the real world. GENIX is the first effort towards alleviating the complexities of large-scale emulation to abstract a lightweight design where IXP dynamics can be usefully applied. We test GENIX for its ability to handle large volumes of traffic flow and its performance during network congestion.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Location-Based Path Privacy Protection Scheme in Internet of Vehicles 基于位置的车联网路径隐私保护方案
Pub Date : 2020-07-01 DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162709
Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao
With the rapid development of Vehicular Ad-hoc Network (VANETs), Frequently communication between vehicles and base stations has generated a large amount of trajectory information. The vehicle trajectory data can be used for real-time traffic management, intelligent driving and onboard entertainment, but it brings huge storage pressure and risk of privacy leakage. Although existing trajectory protection algorithms can generate a large number of similar trajectories, these virtual trajectories are easily identified by an attacker and cannot be virtualized according to vehicles needs. Based on the existing rotation algorithms, we proposes a virtual trajectory generation algorithm(VTG), which generates corresponding virtual points according to the user's needs at each positions and form virtual trajectories through connecting virtual position points. At the same time, the edge node are regarded as trusted third party to ensure physical control in the privacy protection model and served as a bridge between users and Location Based Services (LBS) while storing part of trajectory data. Finally, the effectiveness and security of the method are verified through a large number of simulations, our experiments indicate that the method can provide better privacy protection for users.
随着车载自组织网络(VANETs)的快速发展,车辆与基站之间频繁的通信产生了大量的轨迹信息。车辆轨迹数据可用于实时交通管理、智能驾驶和车载娱乐,但也带来了巨大的存储压力和隐私泄露风险。虽然现有的轨迹保护算法可以生成大量相似的轨迹,但这些虚拟轨迹很容易被攻击者识别,无法根据车辆的需要进行虚拟化。在现有旋转算法的基础上,提出了一种虚拟轨迹生成算法(VTG),该算法在每个位置根据用户的需要生成相应的虚拟点,并通过连接虚拟位置点形成虚拟轨迹。同时,在隐私保护模型中,边缘节点作为可信第三方来保证物理控制,在存储部分轨迹数据的同时,充当用户与LBS (Location Based Services)之间的桥梁。最后,通过大量的仿真验证了该方法的有效性和安全性,实验表明该方法可以为用户提供更好的隐私保护。
{"title":"A Location-Based Path Privacy Protection Scheme in Internet of Vehicles","authors":"Haili Yu, Guangshun Li, Junhua Wu, Xinrong Ren, Jiabin Cao","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162709","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162709","url":null,"abstract":"With the rapid development of Vehicular Ad-hoc Network (VANETs), Frequently communication between vehicles and base stations has generated a large amount of trajectory information. The vehicle trajectory data can be used for real-time traffic management, intelligent driving and onboard entertainment, but it brings huge storage pressure and risk of privacy leakage. Although existing trajectory protection algorithms can generate a large number of similar trajectories, these virtual trajectories are easily identified by an attacker and cannot be virtualized according to vehicles needs. Based on the existing rotation algorithms, we proposes a virtual trajectory generation algorithm(VTG), which generates corresponding virtual points according to the user's needs at each positions and form virtual trajectories through connecting virtual position points. At the same time, the edge node are regarded as trusted third party to ensure physical control in the privacy protection model and served as a bridge between users and Location Based Services (LBS) while storing part of trajectory data. Finally, the effectiveness and security of the method are verified through a large number of simulations, our experiments indicate that the method can provide better privacy protection for users.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UCIP: User Controlled Internet Protocol UCIP:用户控制的互联网协议
Pub Date : 2020-07-01 DOI: 10.1109/infocomwkshps50562.2020.9162833
Morteza Kheirkhah, T. K. Phan, Xinpeng Wei, D. Griffin, M. Rio
Internet protocols have developed significantly over the last 50 years but have reached a point where the further improvements in performance, resilience, security and privacy cannot be achieved by simple incremental changes. This paper proposes a new IP protocol that puts the user's end host at the centre of major algorithmic decisions. It consist of three new mechanisms: a private source routing establishment protocol that allows inter-domain traffic routes to be decided by the user and kept private from the providers whilst allowing for anonymous connections where two node can communicate without knowing the identity/address of the other end point; a mechanism to control reception of packets that mitigates denial-of-service attacks and a new directory system that puts the end user at the core of the decisions enabling anycast and mobility with a pub-sub mechanism with fine grain capabilities for describe resources. These changes allow end nodes to have a much tighter control of how they send and receive their traffic and provide a paradigm shift for the Internet ecosystem.
互联网协议在过去的50年里有了显著的发展,但已经达到了一个点,在性能、弹性、安全性和隐私方面的进一步改进不能通过简单的增量更改来实现。本文提出了一种新的IP协议,它将用户的终端主机置于主要算法决策的中心。它由三个新机制组成:一个私有源路由建立协议,允许域间流量路由由用户决定,并对提供商保持私有,同时允许匿名连接,两个节点可以在不知道另一个端点的身份/地址的情况下进行通信;一种控制数据包接收的机制,减轻了拒绝服务攻击,以及一种新的目录系统,该系统将最终用户置于决策的核心,支持任意广播和移动性,并使用具有细粒度描述资源功能的发布-订阅机制。这些变化使终端节点能够更严格地控制它们发送和接收流量的方式,并为互联网生态系统提供了范式转变。
{"title":"UCIP: User Controlled Internet Protocol","authors":"Morteza Kheirkhah, T. K. Phan, Xinpeng Wei, D. Griffin, M. Rio","doi":"10.1109/infocomwkshps50562.2020.9162833","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162833","url":null,"abstract":"Internet protocols have developed significantly over the last 50 years but have reached a point where the further improvements in performance, resilience, security and privacy cannot be achieved by simple incremental changes. This paper proposes a new IP protocol that puts the user's end host at the centre of major algorithmic decisions. It consist of three new mechanisms: a private source routing establishment protocol that allows inter-domain traffic routes to be decided by the user and kept private from the providers whilst allowing for anonymous connections where two node can communicate without knowing the identity/address of the other end point; a mechanism to control reception of packets that mitigates denial-of-service attacks and a new directory system that puts the end user at the core of the decisions enabling anycast and mobility with a pub-sub mechanism with fine grain capabilities for describe resources. These changes allow end nodes to have a much tighter control of how they send and receive their traffic and provide a paradigm shift for the Internet ecosystem.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115091638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1