首页 > 最新文献

2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
Effect of Construction Materials on Indoor Positioning System using Bluetooth Low Energy 建筑材料对低功耗蓝牙室内定位系统的影响
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998330
Fei Gao, Xue Li
Indoor positioning system (IPS) has become increasingly important due to its wide applications in indoor navigation, location-based services (LBS), and disaster relief / recovery. Among the technology candidates, Bluetooth Low Energy (BLE) provides low cost and low power consumption. This paper studies the effect of construction materials on the localisation accuracy of an IPS based on trilateration using received signal strength indicators (RSSI) from BLE beacon nodes. Through experiments, we found that plasterboard walls and glass walls provide better localisation accuracy as compared to wooden walls. Furthermore, knowledge about the room-level location of BLE beacon nodes can help improve the localisation accuracy.
室内定位系统(IPS)在室内导航、基于位置的服务(LBS)和灾害救援/恢复等领域的应用越来越广泛。在候选技术中,低功耗蓝牙(Bluetooth Low Energy, BLE)具有低成本和低功耗的特点。本文利用BLE信标节点的接收信号强度指标(RSSI),研究了建筑材料对基于三边测量的IPS定位精度的影响。通过实验,我们发现石膏板墙和玻璃墙比木墙具有更好的定位精度。此外,了解BLE信标节点的房间级位置有助于提高定位精度。
{"title":"Effect of Construction Materials on Indoor Positioning System using Bluetooth Low Energy","authors":"Fei Gao, Xue Li","doi":"10.1109/ITNAC55475.2022.9998330","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998330","url":null,"abstract":"Indoor positioning system (IPS) has become increasingly important due to its wide applications in indoor navigation, location-based services (LBS), and disaster relief / recovery. Among the technology candidates, Bluetooth Low Energy (BLE) provides low cost and low power consumption. This paper studies the effect of construction materials on the localisation accuracy of an IPS based on trilateration using received signal strength indicators (RSSI) from BLE beacon nodes. Through experiments, we found that plasterboard walls and glass walls provide better localisation accuracy as compared to wooden walls. Furthermore, knowledge about the room-level location of BLE beacon nodes can help improve the localisation accuracy.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute Verifier for Internet of Things 物联网属性验证器
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998348
M. Kamel, Yuping Yan, P. Ligeti, C. Reich
Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the nossession of one or all of the given target attributes.
身份管理、身份验证和属性验证是许多物联网(IoT)应用程序中的主要关注点。考虑到隐私问题,属性验证在许多应用中变得更加重要。该领域的许多拟议模型都存在隐私和可伸缩性问题,因为它们依赖于集中式实体。本文提出了一种基于挑战-响应方法的分散式属性验证器。为了满足各种物联网属性验证需求,提出的模型提供了两种属性验证模式,即1-out- n验证和n-out- n验证模式,参与者可以证明给定目标属性的一个或所有属性的nossession。
{"title":"Attribute Verifier for Internet of Things","authors":"M. Kamel, Yuping Yan, P. Ligeti, C. Reich","doi":"10.1109/ITNAC55475.2022.9998348","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998348","url":null,"abstract":"Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the nossession of one or all of the given target attributes.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114849342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach 高级持续威胁检测:粒子群优化方法
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998358
Abdullah Al Mamun, Harith Al-Sahaf, I. Welch, S. Çamtepe
Advanced Persistent Threat (APT) is one of the most sophisticated cyber threats aiming to gain access to a system and remain there for a long time utilizing continuous, covert, and sophisticated evasion techniques. As a result, detecting such an attack is still very challenging. A successful APT attack can cause significant financial and valuable information loss for a large company or a government organization. The importance of APT detection has attracted many researchers, and various machine learning methods have been proposed in the literature to improve APT detection performance. This paper utilizes Particle Swarm Optimization (PSO) to automatically evolve a classification model for APT attack detection and classification. The proposed method optimizes a set of weights, each corresponding to a feature in the dataset. These weights are then used to predict the class label, for instance, by calculating the weighted sum of the features based on the weights evolved by PSO. One of the main advantages of the proposed method is that it does not require human intervention. The experimental results on a publicly available dataset, i.e., DAPT-2020, show that the proposed method significantly outperformed the state-of-the-art method and other commonly used machine learning methods for APT detection and multi-class classification. Furthermore, a detailed investigation of the proposed method's inner mechanism is discussed to highlight various aspects, e.g., convergence and some of the detected patterns.
高级持续性威胁(APT)是最复杂的网络威胁之一,其目的是利用连续、隐蔽和复杂的逃避技术,进入系统并长时间停留在那里。因此,检测此类攻击仍然非常具有挑战性。成功的APT攻击可能会给大型公司或政府组织造成重大的财务和有价值的信息损失。APT检测的重要性吸引了众多研究者,文献中提出了各种机器学习方法来提高APT检测性能。本文利用粒子群算法(Particle Swarm Optimization, PSO)自动进化分类模型,对APT攻击进行检测和分类。该方法优化了一组权重,每个权重对应于数据集中的一个特征。然后使用这些权重来预测类标签,例如,通过计算基于PSO进化的权重的特征的加权和。该方法的主要优点之一是不需要人为干预。在公开可用的数据集(即DAPT-2020)上的实验结果表明,所提出的方法在APT检测和多类分类方面明显优于最先进的方法和其他常用的机器学习方法。此外,还详细讨论了该方法的内部机制,以突出各个方面,例如收敛性和一些检测到的模式。
{"title":"Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach","authors":"Abdullah Al Mamun, Harith Al-Sahaf, I. Welch, S. Çamtepe","doi":"10.1109/ITNAC55475.2022.9998358","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998358","url":null,"abstract":"Advanced Persistent Threat (APT) is one of the most sophisticated cyber threats aiming to gain access to a system and remain there for a long time utilizing continuous, covert, and sophisticated evasion techniques. As a result, detecting such an attack is still very challenging. A successful APT attack can cause significant financial and valuable information loss for a large company or a government organization. The importance of APT detection has attracted many researchers, and various machine learning methods have been proposed in the literature to improve APT detection performance. This paper utilizes Particle Swarm Optimization (PSO) to automatically evolve a classification model for APT attack detection and classification. The proposed method optimizes a set of weights, each corresponding to a feature in the dataset. These weights are then used to predict the class label, for instance, by calculating the weighted sum of the features based on the weights evolved by PSO. One of the main advantages of the proposed method is that it does not require human intervention. The experimental results on a publicly available dataset, i.e., DAPT-2020, show that the proposed method significantly outperformed the state-of-the-art method and other commonly used machine learning methods for APT detection and multi-class classification. Furthermore, a detailed investigation of the proposed method's inner mechanism is discussed to highlight various aspects, e.g., convergence and some of the detected patterns.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQBRP: A Switch Quality-Based Routing Protocol for Software-Defined Networks SQBRP:一种基于交换机质量的软件定义网络路由协议
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998402
Nabila Bouziane, Z. Doukha
Nowadays, networks are facing new challenges due to the proliferation of network devices, the excessive use of bandwidth-intensive network applications, as well as the increasing demand for network quality of service. To satisfy these growing user expectations and improve network performance, an efficient network routing is needed. In order to overcome these challenges, Software Defined Networking (SDN) was designed to manage data flow and network maintenance. However, the standard SDN short-path first routing protocol (SPF) degrades network performance because it ignores the dynamic nature of the network in terms of traffic flow. In addition, there is no SDN routing solution that exploits switch states like CPU usage in the routing process. In this context, this paper proposes an SDN Routing protocol based on switch quality and residual bandwidth (SQBRP). To evaluate the performance of our protocol, we carried out several simulations. The results show that SQBRP reduces packet drop ratio as well as delays and improves throughput compared to SPF, particularly in an overloaded network.
当前,网络设备的激增、带宽密集型网络应用的过度使用以及对网络服务质量的要求不断提高,使网络面临着新的挑战。为了满足这些日益增长的用户期望并提高网络性能,需要一种高效的网络路由。为了克服这些挑战,设计了软件定义网络(SDN)来管理数据流和网络维护。但是,标准的SDN SPF (short-path first routing protocol)忽略了网络流量的动态性,降低了网络的性能。此外,没有一种SDN路由解决方案可以利用路由过程中的交换机状态(如CPU使用情况)。在此背景下,本文提出了一种基于交换机质量和剩余带宽(SQBRP)的SDN路由协议。为了评估我们的协议的性能,我们进行了几个模拟。结果表明,与SPF相比,SQBRP减少了丢包率和延迟,提高了吞吐量,特别是在过载的网络中。
{"title":"SQBRP: A Switch Quality-Based Routing Protocol for Software-Defined Networks","authors":"Nabila Bouziane, Z. Doukha","doi":"10.1109/ITNAC55475.2022.9998402","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998402","url":null,"abstract":"Nowadays, networks are facing new challenges due to the proliferation of network devices, the excessive use of bandwidth-intensive network applications, as well as the increasing demand for network quality of service. To satisfy these growing user expectations and improve network performance, an efficient network routing is needed. In order to overcome these challenges, Software Defined Networking (SDN) was designed to manage data flow and network maintenance. However, the standard SDN short-path first routing protocol (SPF) degrades network performance because it ignores the dynamic nature of the network in terms of traffic flow. In addition, there is no SDN routing solution that exploits switch states like CPU usage in the routing process. In this context, this paper proposes an SDN Routing protocol based on switch quality and residual bandwidth (SQBRP). To evaluate the performance of our protocol, we carried out several simulations. The results show that SQBRP reduces packet drop ratio as well as delays and improves throughput compared to SPF, particularly in an overloaded network.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage Performance of Satellite-Terrestrial MISO Downlink Transmission 卫星-地面MISO下行传输的中断性能
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998344
Xinghan Lin, Haoxing Zhang, Gaofeng Pan, Shuai Wang, Jianping An
The satellite-terrestrial communication system is considered to be a necessary way to provide global broad coverage. Particularly, as the low Earth orbit (LEO) constellation system develops rapidly and LEO satellites operate in low orbits with heights lower than 2000 km, short serving time and frequent handovers are necessary for LEO satellite-terrestrial communications. Thus, diversity gain via multiple satellites needs to be considered. In this work, the code-division multiple access scheme is adopted for the downlink delivery while multiple satellites are trying to simultaneously deliver information bits to a terrestrial terminal. Moreover, an aerial platform generates interference signals to interfere with the information delivered from the satellites to the terrestrial terminal. Then, we derive an outage performance analysis model by deriving the closed-form analysis expression for outage probability. Finally, the Monte Carlo simulation is presented to show how the system parameters, e.g., the synchronization of the clock and the frequency drifts among the multiple terrestrial users, influence the downlink transmission performance of target satellite-terrestrial systems.
卫星-地面通信系统被认为是提供全球广泛覆盖的必要方式。特别是随着近地轨道星座系统的快速发展和低轨道卫星在高度低于2000公里的低轨道运行,低轨道卫星与地面通信需要较短的服务时间和频繁的切换。因此,需要考虑通过多颗卫星获得的分集增益。当多颗卫星试图同时向地面终端发送信息时,下行传输采用码分多址方案。此外,空中平台产生干扰信号以干扰从卫星传送到地面终端的信息。然后,通过导出停机概率的封闭分析表达式,推导出停机性能分析模型。最后,通过蒙特卡罗仿真分析了时钟同步和多个地面用户之间的频率漂移等系统参数对目标星地系统下行传输性能的影响。
{"title":"Outage Performance of Satellite-Terrestrial MISO Downlink Transmission","authors":"Xinghan Lin, Haoxing Zhang, Gaofeng Pan, Shuai Wang, Jianping An","doi":"10.1109/ITNAC55475.2022.9998344","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998344","url":null,"abstract":"The satellite-terrestrial communication system is considered to be a necessary way to provide global broad coverage. Particularly, as the low Earth orbit (LEO) constellation system develops rapidly and LEO satellites operate in low orbits with heights lower than 2000 km, short serving time and frequent handovers are necessary for LEO satellite-terrestrial communications. Thus, diversity gain via multiple satellites needs to be considered. In this work, the code-division multiple access scheme is adopted for the downlink delivery while multiple satellites are trying to simultaneously deliver information bits to a terrestrial terminal. Moreover, an aerial platform generates interference signals to interfere with the information delivered from the satellites to the terrestrial terminal. Then, we derive an outage performance analysis model by deriving the closed-form analysis expression for outage probability. Finally, the Monte Carlo simulation is presented to show how the system parameters, e.g., the synchronization of the clock and the frequency drifts among the multiple terrestrial users, influence the downlink transmission performance of target satellite-terrestrial systems.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125658290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Vertical Use Cases and Trials of Transportation 5G垂直运输用例和试验
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998352
Haesik Kim, Jarno Pinola, O. Apilo
The 5G networks are still being deployed in many countries creating new business opportunities. 5G networks allow us to include new features and deliver new levels of system capacity and efficiency such as higher speed connectivity, ultra low latency connectivity, improved security, distributed networks, virtualized networks and so on. They enable us to have new use cases and scenarios such as automated vehicles, smart city, eHealth, and so on. In this paper, 5G vertical use cases and large scale trials of transportation undertaken at the EU 5G-HEART project trial sites across Europe are introduced. Four representative transport use cases are validated in the 5G-HEART project. They are as follows: (1) Platooning that drives a group of vehicles together, (2) Autonomous driving that avoids collision and achieves safer driving and better traffic efficiency, (3) Remote driving support that allows an user or cloud software to control vehicles remotely, and (4) Vehicle data services that provides us with a better vehicle services by interconnecting various third-party data to autonomous vehicles using 5G networks. User requirements and KPIs are analyzed for 5G transportation use cases. The selected results of 5G-HEART transportation vertical trials are presented.
5G网络仍在许多国家部署,创造了新的商业机会。5G网络使我们能够包含新功能,并提供更高水平的系统容量和效率,例如更高的速度连接,超低延迟连接,改进的安全性,分布式网络,虚拟化网络等。它们使我们能够拥有新的用例和场景,例如自动驾驶汽车、智能城市、电子健康等。本文介绍了在欧洲各地的欧盟5G- heart项目试验点进行的5G垂直用例和大规模运输试验。在5G-HEART项目中验证了四个代表性的传输用例。它们分别是:(1)车辆组队驾驶;(2)自动驾驶,避免碰撞,实现更安全的驾驶和更高的交通效率;(3)远程驾驶支持,允许用户或云软件远程控制车辆;(4)车辆数据服务,通过5G网络将各种第三方数据与自动驾驶车辆互联,为我们提供更好的车辆服务。分析5G传输用例的用户需求和kpi。介绍了5G-HEART运输垂直试验的选定结果。
{"title":"5G Vertical Use Cases and Trials of Transportation","authors":"Haesik Kim, Jarno Pinola, O. Apilo","doi":"10.1109/ITNAC55475.2022.9998352","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998352","url":null,"abstract":"The 5G networks are still being deployed in many countries creating new business opportunities. 5G networks allow us to include new features and deliver new levels of system capacity and efficiency such as higher speed connectivity, ultra low latency connectivity, improved security, distributed networks, virtualized networks and so on. They enable us to have new use cases and scenarios such as automated vehicles, smart city, eHealth, and so on. In this paper, 5G vertical use cases and large scale trials of transportation undertaken at the EU 5G-HEART project trial sites across Europe are introduced. Four representative transport use cases are validated in the 5G-HEART project. They are as follows: (1) Platooning that drives a group of vehicles together, (2) Autonomous driving that avoids collision and achieves safer driving and better traffic efficiency, (3) Remote driving support that allows an user or cloud software to control vehicles remotely, and (4) Vehicle data services that provides us with a better vehicle services by interconnecting various third-party data to autonomous vehicles using 5G networks. User requirements and KPIs are analyzed for 5G transportation use cases. The selected results of 5G-HEART transportation vertical trials are presented.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Contention-Based vs Timeslotted Channel Hopping Medium Access in Wireless Sensor Networks under Noisy Environment 噪声环境下无线传感器网络中基于争用与时隙信道跳频的介质访问比较
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998416
Yevhenii Shudrenko, K. Kuladinithi, A. Timm‐Giel
Tiny sensors with a radio transceiver offer ubiq-uitous connectivity and ease of maintenance for Internet of Things (IoT) applications compared to wired counterparts. Most Wireless Sensor Networks (WSNs) utilize IEEE 802.15.4 standard for communication, which defines physical and Medium Access Control (MAC) layers architecture. Two most promi-nent MAC modes are unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and Timeslotted Channel Hopping (TSCH), which represent a randomized and scheduled solution, respectively. Considering diverse use-case requirements, the choice of a suitable MAC is error-prone. Existing literature only evaluates contention-based TSCH with a simplified physical layer and no external interference, obscuring TSCH strengths and limitations in comparison to CSMA/CA. This work fills the gap in understanding the potential of both MAC modes by comparing their performance using detailed simulations in OMNeT++ with a realistic radio model. A 100-node network with bidirectional communication is evaluated under variable WLAN interference, using the end-to-end delay and packet delivery ratio as performance indicators. Contrary to expectations, CSMA/CA may outperform TSCH depending on the interference pattern. At the expense of latency, TSCH achieves 100% reliability even in a highly congested medium thanks to the channel hopping. Overall, presented insights contribute greatly to the MAC selection process durinz an IoT network planningstage,
与有线设备相比,带有无线电收发器的微型传感器为物联网(IoT)应用提供了无处不在的连接和易于维护的功能。大多数无线传感器网络(wsn)使用IEEE 802.15.4标准进行通信,该标准定义了物理层和介质访问控制(MAC)层架构。两种最有前途的MAC模式是无槽载波感知多址免碰撞(CSMA/CA)和时隙信道跳频(TSCH),它们分别代表随机和调度解决方案。考虑到不同的用例需求,选择合适的MAC很容易出错。现有文献仅评估了基于冲突的TSCH,其物理层简化且无外部干扰,与CSMA/CA相比,模糊了TSCH的优势和局限性。本工作通过在omnet++中使用实际无线电模型进行详细模拟,比较两种MAC模式的性能,填补了理解两种MAC模式潜力的空白。本文以端到端时延和分组发送率为性能指标,对具有双向通信的100节点网络在可变WLAN干扰下的性能进行了评估。与预期相反,CSMA/CA可能优于TSCH,这取决于干扰模式。以牺牲延迟为代价,TSCH即使在高度拥塞的介质中也能实现100%的可靠性,这要归功于信道跳变。总的来说,所提出的见解对物联网网络规划阶段的MAC选择过程有很大贡献。
{"title":"Comparison of Contention-Based vs Timeslotted Channel Hopping Medium Access in Wireless Sensor Networks under Noisy Environment","authors":"Yevhenii Shudrenko, K. Kuladinithi, A. Timm‐Giel","doi":"10.1109/ITNAC55475.2022.9998416","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998416","url":null,"abstract":"Tiny sensors with a radio transceiver offer ubiq-uitous connectivity and ease of maintenance for Internet of Things (IoT) applications compared to wired counterparts. Most Wireless Sensor Networks (WSNs) utilize IEEE 802.15.4 standard for communication, which defines physical and Medium Access Control (MAC) layers architecture. Two most promi-nent MAC modes are unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and Timeslotted Channel Hopping (TSCH), which represent a randomized and scheduled solution, respectively. Considering diverse use-case requirements, the choice of a suitable MAC is error-prone. Existing literature only evaluates contention-based TSCH with a simplified physical layer and no external interference, obscuring TSCH strengths and limitations in comparison to CSMA/CA. This work fills the gap in understanding the potential of both MAC modes by comparing their performance using detailed simulations in OMNeT++ with a realistic radio model. A 100-node network with bidirectional communication is evaluated under variable WLAN interference, using the end-to-end delay and packet delivery ratio as performance indicators. Contrary to expectations, CSMA/CA may outperform TSCH depending on the interference pattern. At the expense of latency, TSCH achieves 100% reliability even in a highly congested medium thanks to the channel hopping. Overall, presented insights contribute greatly to the MAC selection process durinz an IoT network planningstage,","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121814867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Viable Statistical Metrics for Re-Embedding Network Steganalysis 重新嵌入网络隐写分析的可行统计度量
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998399
Jun O. Seo, S. Manoharan, U. Speidel
Network steganalyses attempt to uncover hidden messages (steganograms) in network flows. These techniques are binary in that they classify if a flow contains steganograms or not. Moreover, most of these techniques assume the availability flows that do not contain any steganograms as baselines for comparison, an assumption that is hard to hold. A re-embedding steganalysis does not require any baseline, and moreover, it can not only detect the presence of steganograms but also estimate the amount of steganograms. Being able to estimate the amount of steganograms allows a network forensic expert to judge the damage caused by these hidden messages. This paper addresses the question of what statistical metrics might apply for effective re-embedding steganalysis of network traces. It presents an empirical comparison of several statistical metrics in the light of their effectiveness in re-embedding steganalysis.
网络隐写分析试图揭示网络流中隐藏的消息(隐写图)。这些技术是二元的,因为它们对流是否包含隐写进行分类。此外,这些技术中的大多数都假设不包含任何隐写图的可用性流作为比较的基线,这是一个很难成立的假设。重新嵌入隐写分析不需要任何基线,而且它不仅可以检测出隐写的存在,而且可以估计出隐写的数量。能够估计隐写图的数量使网络法医专家能够判断这些隐藏信息造成的损害。本文解决了哪些统计度量可能适用于网络痕迹的有效重嵌入隐写分析的问题。它提出了几个统计指标的实证比较,在他们的有效性在重新嵌入隐写分析。
{"title":"On Viable Statistical Metrics for Re-Embedding Network Steganalysis","authors":"Jun O. Seo, S. Manoharan, U. Speidel","doi":"10.1109/ITNAC55475.2022.9998399","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998399","url":null,"abstract":"Network steganalyses attempt to uncover hidden messages (steganograms) in network flows. These techniques are binary in that they classify if a flow contains steganograms or not. Moreover, most of these techniques assume the availability flows that do not contain any steganograms as baselines for comparison, an assumption that is hard to hold. A re-embedding steganalysis does not require any baseline, and moreover, it can not only detect the presence of steganograms but also estimate the amount of steganograms. Being able to estimate the amount of steganograms allows a network forensic expert to judge the damage caused by these hidden messages. This paper addresses the question of what statistical metrics might apply for effective re-embedding steganalysis of network traces. It presents an empirical comparison of several statistical metrics in the light of their effectiveness in re-embedding steganalysis.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115726931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient and QoS Assurance Link Adaptation Scheme for Wireless Body Area Networks 无线体域网络节能和QoS保证链路自适应方案
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998362
Da-Ren Chen, Nai-Xin Liang
Due to limited power supply and long-life service requirements for wireless sensor nodes, energy and time-efficient methods are critical to in the wireless body area networks (WBAN). Link adaptation (LA) technique, in which modulation and coding are applied to change per channel conditions to maximize link throughput are widely investigated in the field of mobile communications. On the basis of LA and transmit power control (TPC) techniques, we propose a model-based calibration scheme to maintain a transmit power threshold table WBAN which satisfies the target quality of service (QoS) while minimizing transmission power of sensor nodes. Rather than existing methods that compare the SNR threshold with instantaneous channel SNR, we contrast the target bit error rate (BER) with instantaneous received BER, and calibrate the path loss and shadowing model, and receiver sensitivity. The proposed method lower bounds the transmit power given a pair of prescribed data rate and BER for a set of feasible combinations of modulation and coding schemes (MCSs). The performance evaluation show that the proposed method outperforms previous link adaptation methods in execution overheads and energy efficiency.
由于无线传感器节点的供电有限和长寿命服务要求,在无线体域网络(WBAN)中,节能和省时的方法至关重要。链路自适应技术在移动通信领域得到了广泛的研究,该技术利用调制和编码来改变每个信道的条件,以最大限度地提高链路吞吐量。在LA和发射功率控制(TPC)技术的基础上,提出了一种基于模型的WBAN校准方案,以保持满足目标服务质量(QoS)的发射功率阈值表,同时最小化传感器节点的发射功率。与现有的将信噪比阈值与瞬时信道信噪比进行比较的方法不同,我们将目标误码率(BER)与瞬时接收误码率进行对比,并对路径损失和阴影模型以及接收机灵敏度进行校准。该方法在给定一对规定的数据速率和误码率的情况下,对一组可行的调制编码方案(MCSs)组合进行了发射功率下界的计算。性能评估表明,该方法在执行开销和能量效率方面优于以往的链路自适应方法。
{"title":"Energy-Efficient and QoS Assurance Link Adaptation Scheme for Wireless Body Area Networks","authors":"Da-Ren Chen, Nai-Xin Liang","doi":"10.1109/ITNAC55475.2022.9998362","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998362","url":null,"abstract":"Due to limited power supply and long-life service requirements for wireless sensor nodes, energy and time-efficient methods are critical to in the wireless body area networks (WBAN). Link adaptation (LA) technique, in which modulation and coding are applied to change per channel conditions to maximize link throughput are widely investigated in the field of mobile communications. On the basis of LA and transmit power control (TPC) techniques, we propose a model-based calibration scheme to maintain a transmit power threshold table WBAN which satisfies the target quality of service (QoS) while minimizing transmission power of sensor nodes. Rather than existing methods that compare the SNR threshold with instantaneous channel SNR, we contrast the target bit error rate (BER) with instantaneous received BER, and calibrate the path loss and shadowing model, and receiver sensitivity. The proposed method lower bounds the transmit power given a pair of prescribed data rate and BER for a set of feasible combinations of modulation and coding schemes (MCSs). The performance evaluation show that the proposed method outperforms previous link adaptation methods in execution overheads and energy efficiency.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms 基于物联网硬件平台的轻量级加密算法分析
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998413
Mohammed El-hajj, A. Fadlallah
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor networks, tele-medicine, and smart grid are a few examples of these fields. In any of these contexts, security and privacy might be essential aspects. Research on secure communication in Internet of Things (IoT) networks is a highly contested topic. One method for ensuring secure data transmission is cryptography. Since IoT devices have limited resources, such as power, memory, and batteries, IoT networks have boosted the term “lightweight cryptography”. Algorithms for lightweight cryptography are designed to efficiently protect data while using minimal resources. In this research work, we evaluate and benchmark lightweight symmetric ciphers for resource-constrained devices. The evaluation is performed using two widely used platform: Arduino and Raspberry PI. In the first part, we implement 39 block ciphers on an ATMEGA328p micro-controller and analyze them in terms of speed, cost, and energy efficiency during encryption and decryption for different block and key sizes. In the second part, the 2nd round NIST candidates (80 stream and block cipher algorithms) were added to the first part ciphers in a comprehensive analysis for equivalent block and key sizes in terms of latency and energy efficiency.
高度受限的设备相互连接并相互作用以完成任务,这些设备正在各种新领域中得到应用。物联网(IoT)、网络物理系统、分布式控制系统、车载系统、无线传感器网络、远程医疗和智能电网是这些领域的几个例子。在任何这些上下文中,安全和隐私都可能是必不可少的方面。物联网(IoT)网络中安全通信的研究是一个备受争议的话题。确保数据传输安全的一种方法是密码学。由于物联网设备的资源有限,如电源、内存和电池,物联网网络推动了“轻量级加密”这一术语。轻量级加密算法的设计目的是在使用最小资源的同时有效地保护数据。在这项研究工作中,我们评估和基准轻量级对称密码的资源受限设备。评估使用了两个广泛使用的平台:Arduino和Raspberry PI。在第一部分中,我们在ATMEGA328p微控制器上实现了39个分组密码,并在不同块和密钥大小的加密和解密过程中分析了它们的速度,成本和能源效率。在第二部分中,将第二轮NIST候选算法(80个流和分组密码算法)添加到第一部分密码中,在延迟和能效方面对等效块和密钥大小进行了全面分析。
{"title":"Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms","authors":"Mohammed El-hajj, A. Fadlallah","doi":"10.1109/ITNAC55475.2022.9998413","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998413","url":null,"abstract":"Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor networks, tele-medicine, and smart grid are a few examples of these fields. In any of these contexts, security and privacy might be essential aspects. Research on secure communication in Internet of Things (IoT) networks is a highly contested topic. One method for ensuring secure data transmission is cryptography. Since IoT devices have limited resources, such as power, memory, and batteries, IoT networks have boosted the term “lightweight cryptography”. Algorithms for lightweight cryptography are designed to efficiently protect data while using minimal resources. In this research work, we evaluate and benchmark lightweight symmetric ciphers for resource-constrained devices. The evaluation is performed using two widely used platform: Arduino and Raspberry PI. In the first part, we implement 39 block ciphers on an ATMEGA328p micro-controller and analyze them in terms of speed, cost, and energy efficiency during encryption and decryption for different block and key sizes. In the second part, the 2nd round NIST candidates (80 stream and block cipher algorithms) were added to the first part ciphers in a comprehensive analysis for equivalent block and key sizes in terms of latency and energy efficiency.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1