首页 > 最新文献

2023 IEEE 48th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Decision Tree-Based Confidentiality Self-Management in the Internet of Things 基于决策树的物联网保密自我管理
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223363
Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov
{"title":"Decision Tree-Based Confidentiality Self-Management in the Internet of Things","authors":"Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov","doi":"10.1109/lcn58197.2023.10223363","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223363","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125079657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data Collection 面向物联网数据采集的最优蜂窝互联无人机轨迹规划
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223376
Amirahmad Chapnevis, E. Bulut
{"title":"AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data Collection","authors":"Amirahmad Chapnevis, E. Bulut","doi":"10.1109/lcn58197.2023.10223376","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223376","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123216798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Naval Cybersecurity in the Age of AI: deceptive ISAR Images Generation with GANs 人工智能时代的海军网络安全:用gan生成欺骗性ISAR图像
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223338
Giulio Meucci, B. Karahoda, A. Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli-Forti
{"title":"Naval Cybersecurity in the Age of AI: deceptive ISAR Images Generation with GANs","authors":"Giulio Meucci, B. Karahoda, A. Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli-Forti","doi":"10.1109/lcn58197.2023.10223338","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223338","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ACK Policy Optimization Algorithm for QUIC 面向QUIC的ACK策略优化算法
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223366
E. Volodina, Erwin P. Rathgeb
{"title":"The ACK Policy Optimization Algorithm for QUIC","authors":"E. Volodina, Erwin P. Rathgeb","doi":"10.1109/lcn58197.2023.10223366","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223366","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps 基于Salp群算法和混沌映射的彩色图像隐写方法
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223367
Aya Jaradat, M. Mowafi, E. Taqieddin
{"title":"A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps","authors":"Aya Jaradat, M. Mowafi, E. Taqieddin","doi":"10.1109/lcn58197.2023.10223367","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223367","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129807497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols 在遗留工业协议未使用的报头字段中改进完整性保护
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223384
Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie
—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.
工业网络变得越来越互联,这为没有考虑安全的传统网络打开了网络攻击的闸门。因此,遗留工业通信协议的巨大前景迫切需要一种通用的解决方案来追溯地集成安全特性。然而,目前的建议很难适应新的场景和协议,尽管大多数工业协议都有一个共同的主题:由于它们的逐步发展,以前重要的遗留特性变得无关紧要,导致未使用的协议字段现在为改进安全性提供了一个独特的机会。我们对三个主要协议的分析表明,报头提供了36到63位的未使用空间。为了利用这个空间,我们设计了REtrofittable ProtEction Library(击退),它支持将身份验证标签嵌入到未使用的头字段的任意组合中。我们表明,除了加密处理之外,击退的开销可以忽略不计,它可以适应达到性能目标或满足法律要求。
{"title":"Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols","authors":"Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie","doi":"10.1109/lcn58197.2023.10223384","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223384","url":null,"abstract":"—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demo: Leveraging Edge Intelligence for Affective Communication over URLLC 演示:利用边缘智能实现URLLC上的有效通信
Pub Date : 2023-10-02 DOI: 10.1109/lcn58197.2023.10223383
I. Amer, Sarah Adel Bargal, Sharief M. A. Oteafy, Hossam S. Hassanein
{"title":"Demo: Leveraging Edge Intelligence for Affective Communication over URLLC","authors":"I. Amer, Sarah Adel Bargal, Sharief M. A. Oteafy, Hossam S. Hassanein","doi":"10.1109/lcn58197.2023.10223383","DOIUrl":"https://doi.org/10.1109/lcn58197.2023.10223383","url":null,"abstract":"","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128565804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 48th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1