首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Start of Frame Delimiters (SFDs) for Simultaneous Intra-Group One-to-All Dissemination 同时组内一对所有传播的帧分隔符(SFDs)的开始
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314842
Jagnyashini Debadarshini, Sudipta Saha, O. Landsiedel, M. Chan
Intra-group spreading is one of the common and frequent needs in many decentralized communication protocols. Such spreading is useful for quick and local dissemination of information among different clusters in large-scale decentralized systems like the Internet-of-Things (IoT). Complex decentralized protocols can carefully exploit such localized dissemination as a base unit for their efficient implementation. However, due to the inherent broadcast nature of wireless communication, efficient and simultaneous execution of multiple intra-group disseminations is difficult. In this work, we propose a novel and simple way to completely hide a wireless transmission without changing any channel or frequency. Next, we use this for supporting simultaneous intra-group disseminations. Rigorous evaluation of the proposed strategy over testbeds show significant improvement of upto 60% in reliability with similar average latency and radio-on time in comparison to the baseline where no additional mechanism is adopted for separation of intra-group communications.
组内扩展是许多分散通信协议中常见且频繁的需求之一。这种传播对于在物联网(IoT)等大规模分散系统中不同集群之间快速和本地传播信息非常有用。复杂的去中心化协议可以谨慎地利用这种局部传播作为其有效实现的基本单元。然而,由于无线通信固有的广播性质,很难有效地同时执行多个组内传播。在这项工作中,我们提出了一种新颖而简单的方法,可以在不改变任何信道或频率的情况下完全隐藏无线传输。接下来,我们使用它来支持同时在组内传播。在试验台上对提议的策略进行严格评估表明,与没有采用额外机制分离组内通信的基线相比,在平均延迟和无线电开启时间相似的情况下,可靠性显著提高了60%。
{"title":"Start of Frame Delimiters (SFDs) for Simultaneous Intra-Group One-to-All Dissemination","authors":"Jagnyashini Debadarshini, Sudipta Saha, O. Landsiedel, M. Chan","doi":"10.1109/LCN48667.2020.9314842","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314842","url":null,"abstract":"Intra-group spreading is one of the common and frequent needs in many decentralized communication protocols. Such spreading is useful for quick and local dissemination of information among different clusters in large-scale decentralized systems like the Internet-of-Things (IoT). Complex decentralized protocols can carefully exploit such localized dissemination as a base unit for their efficient implementation. However, due to the inherent broadcast nature of wireless communication, efficient and simultaneous execution of multiple intra-group disseminations is difficult. In this work, we propose a novel and simple way to completely hide a wireless transmission without changing any channel or frequency. Next, we use this for supporting simultaneous intra-group disseminations. Rigorous evaluation of the proposed strategy over testbeds show significant improvement of upto 60% in reliability with similar average latency and radio-on time in comparison to the baseline where no additional mechanism is adopted for separation of intra-group communications.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Guarantees for Mix-flows in Inter-Datacenter WANs in Single and Federated Clouds 单云和联合云中数据中心间广域网混合流的保证
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314789
Shruti Gandhi, Y. Viniotis
Inter-datacenter WANs connect geo-distributed datacenters and carry a considerable amount of traffic, generally a mix of flows. There has been little work done to provide custom guarantees depending on the nature of traffic requirements in such environments. In this paper we address this problem by proposing Vritti, an adaptable spatial-temporal system for traffic engineering in inter-datacenter WAN environments applicable to single and federated clouds. With Vritti, cloud providers can offer tailor-made guarantees to users with widely differing requirements (in terms of hard, soft or no deadlines) and traffic characteristics (in terms of known or unknown traffic volumes). We use linear programming to mathematically formulate the problem with the objective of maximizing utility. We propose two online algorithms to generate admission control, scheduling and routing decisions. Our simulations show that Vritti can effectively meet deadline transfers and provide fairness to non-deadline transfers in both single and federated cloud environments.
数据中心间广域网连接地理分布的数据中心,并承载相当数量的流量,通常是流的混合。在这种环境中,根据交通需求的性质提供定制保障的工作很少。在本文中,我们通过提出Vritti来解决这个问题,Vritti是一种适用于单云和联合云的跨数据中心WAN环境中流量工程的自适应时空系统。有了Vritti,云提供商可以为有着不同需求(硬截止日期、软截止日期或无截止日期)和流量特征(已知或未知流量)的用户提供量身定制的保证。我们用线性规划的方法来数学地表述以效用最大化为目标的问题。我们提出了两种在线算法来生成准入控制、调度和路由决策。仿真结果表明,无论在单一云环境还是联合云环境中,Vritti都能有效地满足截止日期传输,并为非截止日期传输提供公平性。
{"title":"Guarantees for Mix-flows in Inter-Datacenter WANs in Single and Federated Clouds","authors":"Shruti Gandhi, Y. Viniotis","doi":"10.1109/LCN48667.2020.9314789","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314789","url":null,"abstract":"Inter-datacenter WANs connect geo-distributed datacenters and carry a considerable amount of traffic, generally a mix of flows. There has been little work done to provide custom guarantees depending on the nature of traffic requirements in such environments. In this paper we address this problem by proposing Vritti, an adaptable spatial-temporal system for traffic engineering in inter-datacenter WAN environments applicable to single and federated clouds. With Vritti, cloud providers can offer tailor-made guarantees to users with widely differing requirements (in terms of hard, soft or no deadlines) and traffic characteristics (in terms of known or unknown traffic volumes). We use linear programming to mathematically formulate the problem with the objective of maximizing utility. We propose two online algorithms to generate admission control, scheduling and routing decisions. Our simulations show that Vritti can effectively meet deadline transfers and provide fairness to non-deadline transfers in both single and federated cloud environments.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical Learning-Based Dynamic Retransmission Mechanism for Mission Critical Communication: An Edge-Computing Approach 基于统计学习的关键任务通信动态重传机制:一种边缘计算方法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314773
M. Raza, M. Abolhasan, J. Lipman, N. Shariati, Wei Ni
Mission-critical machine type communication (MC-MTC) systems in which machines communicate to perform various tasks such as coordination, sensing, and actuation, require stringent requirements of ultra-reliable and low latency communications (URLLC). Edge computing being an integral part of future wireless networks, provides services that support URLLC applications. In this paper, we use the edge computing approach and present a statistical learning-based dynamic retransmission mechanism. The proposed approach meets the desired latency-reliability criterion in MC-MTC networks employing framed ALOHA. The maximum number of retransmissions Nr under a given latency-reliability constraint is learned statistically by the devices from the history of their previous transmissions and shared with the base station. Simulations are performed in MATLAB to evaluate a framed-ALOHA system’s performance in which an active device can have only one successful transmission in one round composed of (Nr + 1) frames, and the performance is compared with the diversity transmission-based framed-ALOHA.
关键任务机器类型通信(MC-MTC)系统中,机器通信以执行各种任务,如协调,传感和驱动,需要超可靠和低延迟通信(URLLC)的严格要求。边缘计算是未来无线网络不可或缺的一部分,它提供了支持URLLC应用程序的服务。在本文中,我们使用边缘计算方法,提出了一种基于统计学习的动态重传机制。在采用帧式ALOHA的MC-MTC网络中,该方法满足期望的延迟可靠性准则。在给定的延迟-可靠性约束下,设备从其先前传输的历史中统计地了解到最大重传次数Nr,并与基站共享。通过MATLAB仿真,对有源设备在由(Nr + 1)帧组成的一轮中只能成功传输一次的帧aloha系统性能进行了评价,并与基于分集传输的帧aloha系统性能进行了比较。
{"title":"Statistical Learning-Based Dynamic Retransmission Mechanism for Mission Critical Communication: An Edge-Computing Approach","authors":"M. Raza, M. Abolhasan, J. Lipman, N. Shariati, Wei Ni","doi":"10.1109/LCN48667.2020.9314773","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314773","url":null,"abstract":"Mission-critical machine type communication (MC-MTC) systems in which machines communicate to perform various tasks such as coordination, sensing, and actuation, require stringent requirements of ultra-reliable and low latency communications (URLLC). Edge computing being an integral part of future wireless networks, provides services that support URLLC applications. In this paper, we use the edge computing approach and present a statistical learning-based dynamic retransmission mechanism. The proposed approach meets the desired latency-reliability criterion in MC-MTC networks employing framed ALOHA. The maximum number of retransmissions Nr under a given latency-reliability constraint is learned statistically by the devices from the history of their previous transmissions and shared with the base station. Simulations are performed in MATLAB to evaluate a framed-ALOHA system’s performance in which an active device can have only one successful transmission in one round composed of (Nr + 1) frames, and the performance is compared with the diversity transmission-based framed-ALOHA.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Transmission Scheduling and End-to-end Throughput of Multi-hop Paths in Full-duplex Embedded Wireless Networks 全双工嵌入式无线网络中多跳路径的传输调度和端到端吞吐量
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314826
Fei Ge, L. Tan, Wei Zhang, Ming Liu, Xun Gao, Juan Luo
We describes four scheduling schemes on the predefined path in large-scale wireless networks supported by full-duplex radios. The end-to-end throughput on multi-hop path with these schemes is discussed, indicating the effect of scheduling schemes and the influence of full-duplex radios on multi-hop data transmission. We make a simulator and compare the throughput results in these schemes. Results show that the new scheduling methods may improve end-to-end throughput on multi-hop path in wireless networks moderately.
在全双工无线电支持的大规模无线网络中,提出了四种基于预定义路径的调度方案。讨论了这些方案在多跳路径上的端到端吞吐量,说明了调度方案的影响以及全双工无线电对多跳数据传输的影响。我们制作了一个模拟器,并比较了这些方案的吞吐量结果。结果表明,新的调度方法可以适度提高无线网络中多跳路径的端到端吞吐量。
{"title":"Transmission Scheduling and End-to-end Throughput of Multi-hop Paths in Full-duplex Embedded Wireless Networks","authors":"Fei Ge, L. Tan, Wei Zhang, Ming Liu, Xun Gao, Juan Luo","doi":"10.1109/LCN48667.2020.9314826","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314826","url":null,"abstract":"We describes four scheduling schemes on the predefined path in large-scale wireless networks supported by full-duplex radios. The end-to-end throughput on multi-hop path with these schemes is discussed, indicating the effect of scheduling schemes and the influence of full-duplex radios on multi-hop data transmission. We make a simulator and compare the throughput results in these schemes. Results show that the new scheduling methods may improve end-to-end throughput on multi-hop path in wireless networks moderately.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARdeep: Adaptive and Reliable Routing Protocol for Mobile Robotic Networks with Deep Reinforcement Learning ARdeep:基于深度强化学习的移动机器人网络自适应可靠路由协议
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314848
Jianmin Liu, Qi Wang, Chentao He, Yongjun Xu
The mobile robotic network consisting multiple robotic devices such as unmanned aerial vehicles (UAVs) is a high-speed mobile wireless network. Existing mobile ad hoc protocols cannot meet the demands of mobile robotic networks due to intermittently connected links and frequent topology changes. This paper proposes a deep reinforcement learning based adaptive and reliable routing protocol, ARdeep. We formulate routing decisions with a Markov Decision Process model to automatically characterize the network variations. To better infer network environment, the link status is considered when making routing decisions. Simulation results demonstrate that ARdeep outperforms the existing good performing QGeo and conventional GPSR.
由无人机等多机器人设备组成的移动机器人网络是一种高速移动无线网络。现有的移动自组织协议由于链路的间歇性连接和频繁的拓扑变化而不能满足移动机器人网络的需求。本文提出了一种基于深度强化学习的自适应可靠路由协议ARdeep。我们使用马尔可夫决策过程模型来制定路由决策,以自动表征网络变化。为了更好地推断网络环境,在进行路由决策时考虑了链路状态。仿真结果表明,ARdeep的性能优于现有的QGeo和传统GPSR。
{"title":"ARdeep: Adaptive and Reliable Routing Protocol for Mobile Robotic Networks with Deep Reinforcement Learning","authors":"Jianmin Liu, Qi Wang, Chentao He, Yongjun Xu","doi":"10.1109/LCN48667.2020.9314848","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314848","url":null,"abstract":"The mobile robotic network consisting multiple robotic devices such as unmanned aerial vehicles (UAVs) is a high-speed mobile wireless network. Existing mobile ad hoc protocols cannot meet the demands of mobile robotic networks due to intermittently connected links and frequent topology changes. This paper proposes a deep reinforcement learning based adaptive and reliable routing protocol, ARdeep. We formulate routing decisions with a Markov Decision Process model to automatically characterize the network variations. To better infer network environment, the link status is considered when making routing decisions. Simulation results demonstrate that ARdeep outperforms the existing good performing QGeo and conventional GPSR.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-filter 基于哈希的短字符串预过滤器提高入侵检测系统的吞吐量
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314812
Tomás Fukac, V. Kosar, J. Korenek, J. Matoušek
With an increasing speed of network links, it is also necessary to increase the throughput of network security systems. An intrusion detection system (IDS) is one of the key components in the protection of network infrastructure. Unfortunately, the IDS has to match a large set of regular expressions (REs) in network streams, which has a negative impact on its throughput. A fast pre-filtration of network traffic can allow to achieve a higher overall throughput. Therefore, we have designed a new algorithm, which is able to select short strings that represent an RE set utilized in the IDS. Compared to previous methods, strings are selected in less than a second for an RE and can reduce network traffic up to 3.3 times better. As all selected strings have the same length, they can be used in a hash-based pre-filter, which is able to process more 100 Gbps of network traffic.
随着网络链路速度的不断提高,也需要提高网络安全系统的吞吐量。入侵检测系统(IDS)是保护网络基础设施的关键组成部分之一。不幸的是,IDS必须匹配网络流中的大量正则表达式(REs),这对其吞吐量有负面影响。网络流量的快速预过滤可以实现更高的总体吞吐量。因此,我们设计了一种新的算法,该算法能够选择代表IDS中使用的RE集的短字符串。与以前的方法相比,正则在不到1秒的时间内选择字符串,并且可以将网络流量减少3.3倍。由于所有选择的字符串都具有相同的长度,因此它们可以用于基于哈希的预过滤器,该过滤器能够处理100 Gbps以上的网络流量。
{"title":"Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-filter","authors":"Tomás Fukac, V. Kosar, J. Korenek, J. Matoušek","doi":"10.1109/LCN48667.2020.9314812","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314812","url":null,"abstract":"With an increasing speed of network links, it is also necessary to increase the throughput of network security systems. An intrusion detection system (IDS) is one of the key components in the protection of network infrastructure. Unfortunately, the IDS has to match a large set of regular expressions (REs) in network streams, which has a negative impact on its throughput. A fast pre-filtration of network traffic can allow to achieve a higher overall throughput. Therefore, we have designed a new algorithm, which is able to select short strings that represent an RE set utilized in the IDS. Compared to previous methods, strings are selected in less than a second for an RE and can reduce network traffic up to 3.3 times better. As all selected strings have the same length, they can be used in a hash-based pre-filter, which is able to process more 100 Gbps of network traffic.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leveraging MEC in a 5G System for Enhanced Back Situation Awareness 在5G系统中利用MEC增强后方态势感知
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314838
Rreze Halili, F. Z. Yousaf, Nina Slamnik-Kriještorac, Girma M. Yilma, M. Liebsch, E. B. Silva, S. Hadiwardoyo, Rafael Berkvens, M. Weyn
5G has opened up possibilities of introducing new use cases and business models that could not be perceived before. In the context of public safety, 5G offers immense opportunities towards enhancing mission success and situation awareness during emergency management. This paper introduces Back-Situation Awareness (BSA) application enabling early warning/notification to vehicles of an approaching emergency vehicle indicating its presence and the time it will arrive. Such an application is expected to give drivers enough time to create a safety corridor for the emergency vehicle to pass through safely and unhindered. We provide details on the system and application design of the BSA application leveraging Multi-Access Edge Computing (MEC) systems that complement the 5G mobile communication system. An evaluation of the application is provided by using data measurements and indicating the accuracy of the computation and notification of the Estimated Time of Arrival (ETA) based on the ETSI C-ITS protocol messages.
5G开辟了引入以前无法感知的新用例和商业模式的可能性。在公共安全的背景下,5G为在应急管理过程中提高任务成功率和态势感知提供了巨大的机会。本文介绍了一种能够向车辆早期预警/通知正在接近的紧急车辆的存在和到达时间的后台态势感知(BSA)应用程序。这样的应用程序预计会给司机足够的时间来创建一个安全走廊,让紧急车辆安全无阻地通过。我们详细介绍了利用多接入边缘计算(MEC)系统来补充5G移动通信系统的BSA应用程序的系统和应用程序设计。通过使用数据测量和指示基于ETSI C-ITS协议消息的估计到达时间(ETA)的计算和通知的准确性,提供了应用程序的评估。
{"title":"Leveraging MEC in a 5G System for Enhanced Back Situation Awareness","authors":"Rreze Halili, F. Z. Yousaf, Nina Slamnik-Kriještorac, Girma M. Yilma, M. Liebsch, E. B. Silva, S. Hadiwardoyo, Rafael Berkvens, M. Weyn","doi":"10.1109/LCN48667.2020.9314838","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314838","url":null,"abstract":"5G has opened up possibilities of introducing new use cases and business models that could not be perceived before. In the context of public safety, 5G offers immense opportunities towards enhancing mission success and situation awareness during emergency management. This paper introduces Back-Situation Awareness (BSA) application enabling early warning/notification to vehicles of an approaching emergency vehicle indicating its presence and the time it will arrive. Such an application is expected to give drivers enough time to create a safety corridor for the emergency vehicle to pass through safely and unhindered. We provide details on the system and application design of the BSA application leveraging Multi-Access Edge Computing (MEC) systems that complement the 5G mobile communication system. An evaluation of the application is provided by using data measurements and indicating the accuracy of the computation and notification of the Estimated Time of Arrival (ETA) based on the ETSI C-ITS protocol messages.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Black-box System Identification of CPS Protected by a Watermark-based Detector 基于水印检测器保护的CPS黑盒系统识别
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314803
Khalil Guibene, Marwane Ayaida, L. Khoukhi, N. Messai
The implication of Cyber-Physical Systems (CPS) in critical infrastructures (e.g., smart grids, water distribution networks, etc.) has introduced new security issues and vulnerabilities to those systems. In this paper, we demonstrate that black-box system identification using Support Vector Regression (SVR) can be used efficiently to build a model of a given industrial system even when this system is protected with a watermark-based detector. First, we briefly describe the Tennessee Eastman Process used in this study. Then, we present the principal of detection scheme and the theory behind SVR. Finally, we design an efficient black-box SVR algorithm for the Tennessee Eastman Process. Extensive simulations prove the efficiency of our proposed algorithm.
网络物理系统(CPS)在关键基础设施(如智能电网、配水网络等)中的含义为这些系统带来了新的安全问题和漏洞。在本文中,我们证明了使用支持向量回归(SVR)的黑盒系统识别可以有效地用于构建给定工业系统的模型,即使该系统受到基于水印的检测器的保护。首先,我们简要描述了本研究中使用的田纳西伊士曼过程。然后,我们介绍了检测方案的基本原理和支持向量回归的原理。最后,针对田纳西伊士曼过程设计了一种高效的黑盒SVR算法。大量的仿真实验证明了该算法的有效性。
{"title":"Black-box System Identification of CPS Protected by a Watermark-based Detector","authors":"Khalil Guibene, Marwane Ayaida, L. Khoukhi, N. Messai","doi":"10.1109/LCN48667.2020.9314803","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314803","url":null,"abstract":"The implication of Cyber-Physical Systems (CPS) in critical infrastructures (e.g., smart grids, water distribution networks, etc.) has introduced new security issues and vulnerabilities to those systems. In this paper, we demonstrate that black-box system identification using Support Vector Regression (SVR) can be used efficiently to build a model of a given industrial system even when this system is protected with a watermark-based detector. First, we briefly describe the Tennessee Eastman Process used in this study. Then, we present the principal of detection scheme and the theory behind SVR. Finally, we design an efficient black-box SVR algorithm for the Tennessee Eastman Process. Extensive simulations prove the efficiency of our proposed algorithm.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement Learning 基于深度强化学习的智能qos感知路由机制
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314768
Yuanyuan Cao, Bin Dai, Yijun Mo, Yang Xu
With the rapid development of Internet applications, diversified Quality of Service (QoS) has been required in packet routing to meet the demand of various types of applications. This paper presents an Intelligent QoS-aware Routing (IQoR) framework with the assistance of Deep Reinforcement Learning (DRL), which supports multi-class QoS provisioning for packet forwarding. The simulation results show that IQoR outperforms the widely-used benchmark routing algorithms by significantly reducing the average delay and jitter of packets.
随着Internet应用的快速发展,分组路由对服务质量(QoS)提出了多样化的要求,以满足不同类型应用的需求。本文提出了一种基于深度强化学习(DRL)的智能QoS感知路由(IQoR)框架,该框架支持为分组转发提供多类QoS。仿真结果表明,IQoR算法显著降低了数据包的平均时延和抖动,优于目前广泛使用的基准路由算法。
{"title":"IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement Learning","authors":"Yuanyuan Cao, Bin Dai, Yijun Mo, Yang Xu","doi":"10.1109/LCN48667.2020.9314768","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314768","url":null,"abstract":"With the rapid development of Internet applications, diversified Quality of Service (QoS) has been required in packet routing to meet the demand of various types of applications. This paper presents an Intelligent QoS-aware Routing (IQoR) framework with the assistance of Deep Reinforcement Learning (DRL), which supports multi-class QoS provisioning for packet forwarding. The simulation results show that IQoR outperforms the widely-used benchmark routing algorithms by significantly reducing the average delay and jitter of packets.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Understanding Traffic Fingerprinting CNNs 了解流量指纹cnn
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314785
T. Dahanayaka, Guillaume Jourjon, Suranga Seneviratne
HTTPS encrypted traffic can leak information about underlying contents through various statistical properties of traffic flows like packet lengths and timing, opening doors to traffic fingerprinting attacks. Recently proposed traffic fingerprinting attacks leveraged Convolutional Neural Networks (CNNs) and recorded very high accuracies undermining the state-of-the-art mitigation techniques. In this paper, we methodically dissect such CNNs with the objectives of building further accurate and scalable traffic classifiers and understanding the inner workings of such CNNs to develop effective mitigation techniques. By conducting experiments with three datasets, we show that website fingerprinting CNNs focus majorly on the initial parts of traces instead of longer windows of continuous uploads or downloads. Next, we show that traffic fingerprinting CNNs exhibit transfer-learning capabilities allowing identification of new websites with fewer data. Finally, we show that traffic fingerprinting CNNs outperform RNNs because of their resilience to random shifts in data happening due to varying network conditions.
HTTPS加密的流量可以通过流量流的各种统计属性(如数据包长度和时间)泄露有关底层内容的信息,从而为流量指纹攻击打开了大门。最近提出的流量指纹攻击利用卷积神经网络(cnn),并记录了非常高的准确性,破坏了最先进的缓解技术。在本文中,我们系统地剖析了这些cnn,目的是建立进一步准确和可扩展的流量分类器,并了解这些cnn的内部工作原理,以开发有效的缓解技术。通过对三个数据集进行实验,我们发现网站指纹cnn主要关注痕迹的初始部分,而不是连续上传或下载的较长窗口。接下来,我们展示了流量指纹cnn表现出迁移学习能力,允许用更少的数据识别新网站。最后,我们表明流量指纹cnn优于rnn,因为它们对由于不同网络条件而发生的数据随机变化具有弹性。
{"title":"Understanding Traffic Fingerprinting CNNs","authors":"T. Dahanayaka, Guillaume Jourjon, Suranga Seneviratne","doi":"10.1109/LCN48667.2020.9314785","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314785","url":null,"abstract":"HTTPS encrypted traffic can leak information about underlying contents through various statistical properties of traffic flows like packet lengths and timing, opening doors to traffic fingerprinting attacks. Recently proposed traffic fingerprinting attacks leveraged Convolutional Neural Networks (CNNs) and recorded very high accuracies undermining the state-of-the-art mitigation techniques. In this paper, we methodically dissect such CNNs with the objectives of building further accurate and scalable traffic classifiers and understanding the inner workings of such CNNs to develop effective mitigation techniques. By conducting experiments with three datasets, we show that website fingerprinting CNNs focus majorly on the initial parts of traces instead of longer windows of continuous uploads or downloads. Next, we show that traffic fingerprinting CNNs exhibit transfer-learning capabilities allowing identification of new websites with fewer data. Finally, we show that traffic fingerprinting CNNs outperform RNNs because of their resilience to random shifts in data happening due to varying network conditions.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1