首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless Communication 远距离无线通信支持无线局域网通信的防碰撞多跳帧传输方法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314841
Ryosuke Nagayoshi, Y. Tanigawa, H. Tode
Currently, in addition to wireless LAN (WLAN), equipments for longer-distance wireless communication like IEEE 802.11af and 802.11ah are being developed. Thus, in the near future, access points (APs) and wireless stations (STAs) equipped with functions for both WLAN communication and longer-distance communication are expected. Although longer-distance communication enables STAs to connect to their APs even outside the WLAN coverages, the transmission rates are smaller. Multihop WLAN communication via relay STAs provides larger transmission rates. However, frame transmission from relay STAs increases collisions, and additional routing is required. This study proposes collision-protected multihop transmission without preliminary routing in the environment in which both WLAN communication and longer-distance communication are available. Collision protection and routing are processed by a two-way handshake between data frame transmitter and receiver stations with the longer-distance communication. After the handshake, the data frame is transmitted via relay STAs by exclusively using the WLAN channel.
目前,除了无线局域网(WLAN)之外,还在开发IEEE 802.11af和802.11ah等远距离无线通信设备。因此,在不久的将来,预计将出现既具有WLAN通信功能又具有较长距离通信功能的接入点(ap)和无线站(sta)。尽管长距离通信使sta能够在WLAN覆盖范围之外连接其ap,但传输速率较小。多跳无线局域网通信通过中继sta提供更大的传输速率。但是,来自中继sta的帧传输增加了冲突,并且需要额外的路由。本研究提出在WLAN通信和较长距离通信同时可用的环境下,不需要预先路由的防碰撞多跳传输。碰撞保护和路由由数据帧发送站和接收站之间的双向握手处理,具有较远的通信距离。握手后,数据帧通过中继sta通过专用的WLAN信道传输。
{"title":"A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless Communication","authors":"Ryosuke Nagayoshi, Y. Tanigawa, H. Tode","doi":"10.1109/LCN48667.2020.9314841","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314841","url":null,"abstract":"Currently, in addition to wireless LAN (WLAN), equipments for longer-distance wireless communication like IEEE 802.11af and 802.11ah are being developed. Thus, in the near future, access points (APs) and wireless stations (STAs) equipped with functions for both WLAN communication and longer-distance communication are expected. Although longer-distance communication enables STAs to connect to their APs even outside the WLAN coverages, the transmission rates are smaller. Multihop WLAN communication via relay STAs provides larger transmission rates. However, frame transmission from relay STAs increases collisions, and additional routing is required. This study proposes collision-protected multihop transmission without preliminary routing in the environment in which both WLAN communication and longer-distance communication are available. Collision protection and routing are processed by a two-way handshake between data frame transmitter and receiver stations with the longer-distance communication. After the handshake, the data frame is transmitted via relay STAs by exclusively using the WLAN channel.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient autonomous vehicle navigation scheme based on LiDAR sensor in vehicular network 车联网中基于LiDAR传感器的高效自主车辆导航方案
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314817
Rima Benelmir, S. Bitam, A. Mellouk
Recently, autonomous vehicles navigation (AVN) attracted many researches trying to improve road traffic without the human intervention. One of the main challenges in AVN is allowing a vehicle to discover its moving trajectory with a reduced computational complexity. To cope with this issue, we propose in this paper a new simulated annealing algorithm to discover an optimal trajectory when the vehicle encounters an obstacle using LiDAR perception. The found trajectory is then sent to a roadside unit (RSU), which communicates this discovery to other nodes in the network for further use. During its navigation, the vehicle perceives the environment by a LiDAR sensor to detect an eventual obstacle and launches an optimal path discovery to reach the final destination in a reduced time. The results obtained showed the effectiveness of our proposal to find an optimal route compared to Dijkstra algorithm.
近年来,无人驾驶汽车导航(AVN)吸引了许多研究,试图在没有人为干预的情况下改善道路交通。AVN的主要挑战之一是允许车辆在降低计算复杂度的情况下发现其移动轨迹。为了解决这一问题,本文提出了一种新的模拟退火算法,利用激光雷达感知发现车辆遇到障碍物时的最优轨迹。然后将发现的轨迹发送到路边单元(RSU), RSU将此发现传递给网络中的其他节点以供进一步使用。在其导航过程中,车辆通过激光雷达传感器感知环境,以检测最终障碍物,并启动最佳路径发现,以在更短的时间内到达最终目的地。结果表明,与Dijkstra算法相比,本文提出的算法在寻找最优路径方面是有效的。
{"title":"An efficient autonomous vehicle navigation scheme based on LiDAR sensor in vehicular network","authors":"Rima Benelmir, S. Bitam, A. Mellouk","doi":"10.1109/LCN48667.2020.9314817","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314817","url":null,"abstract":"Recently, autonomous vehicles navigation (AVN) attracted many researches trying to improve road traffic without the human intervention. One of the main challenges in AVN is allowing a vehicle to discover its moving trajectory with a reduced computational complexity. To cope with this issue, we propose in this paper a new simulated annealing algorithm to discover an optimal trajectory when the vehicle encounters an obstacle using LiDAR perception. The found trajectory is then sent to a roadside unit (RSU), which communicates this discovery to other nodes in the network for further use. During its navigation, the vehicle perceives the environment by a LiDAR sensor to detect an eventual obstacle and launches an optimal path discovery to reach the final destination in a reduced time. The results obtained showed the effectiveness of our proposal to find an optimal route compared to Dijkstra algorithm.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Start of Frame Delimiters (SFDs) for Simultaneous Intra-Group One-to-All Dissemination 同时组内一对所有传播的帧分隔符(SFDs)的开始
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314842
Jagnyashini Debadarshini, Sudipta Saha, O. Landsiedel, M. Chan
Intra-group spreading is one of the common and frequent needs in many decentralized communication protocols. Such spreading is useful for quick and local dissemination of information among different clusters in large-scale decentralized systems like the Internet-of-Things (IoT). Complex decentralized protocols can carefully exploit such localized dissemination as a base unit for their efficient implementation. However, due to the inherent broadcast nature of wireless communication, efficient and simultaneous execution of multiple intra-group disseminations is difficult. In this work, we propose a novel and simple way to completely hide a wireless transmission without changing any channel or frequency. Next, we use this for supporting simultaneous intra-group disseminations. Rigorous evaluation of the proposed strategy over testbeds show significant improvement of upto 60% in reliability with similar average latency and radio-on time in comparison to the baseline where no additional mechanism is adopted for separation of intra-group communications.
组内扩展是许多分散通信协议中常见且频繁的需求之一。这种传播对于在物联网(IoT)等大规模分散系统中不同集群之间快速和本地传播信息非常有用。复杂的去中心化协议可以谨慎地利用这种局部传播作为其有效实现的基本单元。然而,由于无线通信固有的广播性质,很难有效地同时执行多个组内传播。在这项工作中,我们提出了一种新颖而简单的方法,可以在不改变任何信道或频率的情况下完全隐藏无线传输。接下来,我们使用它来支持同时在组内传播。在试验台上对提议的策略进行严格评估表明,与没有采用额外机制分离组内通信的基线相比,在平均延迟和无线电开启时间相似的情况下,可靠性显著提高了60%。
{"title":"Start of Frame Delimiters (SFDs) for Simultaneous Intra-Group One-to-All Dissemination","authors":"Jagnyashini Debadarshini, Sudipta Saha, O. Landsiedel, M. Chan","doi":"10.1109/LCN48667.2020.9314842","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314842","url":null,"abstract":"Intra-group spreading is one of the common and frequent needs in many decentralized communication protocols. Such spreading is useful for quick and local dissemination of information among different clusters in large-scale decentralized systems like the Internet-of-Things (IoT). Complex decentralized protocols can carefully exploit such localized dissemination as a base unit for their efficient implementation. However, due to the inherent broadcast nature of wireless communication, efficient and simultaneous execution of multiple intra-group disseminations is difficult. In this work, we propose a novel and simple way to completely hide a wireless transmission without changing any channel or frequency. Next, we use this for supporting simultaneous intra-group disseminations. Rigorous evaluation of the proposed strategy over testbeds show significant improvement of upto 60% in reliability with similar average latency and radio-on time in comparison to the baseline where no additional mechanism is adopted for separation of intra-group communications.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ARdeep: Adaptive and Reliable Routing Protocol for Mobile Robotic Networks with Deep Reinforcement Learning ARdeep:基于深度强化学习的移动机器人网络自适应可靠路由协议
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314848
Jianmin Liu, Qi Wang, Chentao He, Yongjun Xu
The mobile robotic network consisting multiple robotic devices such as unmanned aerial vehicles (UAVs) is a high-speed mobile wireless network. Existing mobile ad hoc protocols cannot meet the demands of mobile robotic networks due to intermittently connected links and frequent topology changes. This paper proposes a deep reinforcement learning based adaptive and reliable routing protocol, ARdeep. We formulate routing decisions with a Markov Decision Process model to automatically characterize the network variations. To better infer network environment, the link status is considered when making routing decisions. Simulation results demonstrate that ARdeep outperforms the existing good performing QGeo and conventional GPSR.
由无人机等多机器人设备组成的移动机器人网络是一种高速移动无线网络。现有的移动自组织协议由于链路的间歇性连接和频繁的拓扑变化而不能满足移动机器人网络的需求。本文提出了一种基于深度强化学习的自适应可靠路由协议ARdeep。我们使用马尔可夫决策过程模型来制定路由决策,以自动表征网络变化。为了更好地推断网络环境,在进行路由决策时考虑了链路状态。仿真结果表明,ARdeep的性能优于现有的QGeo和传统GPSR。
{"title":"ARdeep: Adaptive and Reliable Routing Protocol for Mobile Robotic Networks with Deep Reinforcement Learning","authors":"Jianmin Liu, Qi Wang, Chentao He, Yongjun Xu","doi":"10.1109/LCN48667.2020.9314848","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314848","url":null,"abstract":"The mobile robotic network consisting multiple robotic devices such as unmanned aerial vehicles (UAVs) is a high-speed mobile wireless network. Existing mobile ad hoc protocols cannot meet the demands of mobile robotic networks due to intermittently connected links and frequent topology changes. This paper proposes a deep reinforcement learning based adaptive and reliable routing protocol, ARdeep. We formulate routing decisions with a Markov Decision Process model to automatically characterize the network variations. To better infer network environment, the link status is considered when making routing decisions. Simulation results demonstrate that ARdeep outperforms the existing good performing QGeo and conventional GPSR.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Transmission Scheduling and End-to-end Throughput of Multi-hop Paths in Full-duplex Embedded Wireless Networks 全双工嵌入式无线网络中多跳路径的传输调度和端到端吞吐量
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314826
Fei Ge, L. Tan, Wei Zhang, Ming Liu, Xun Gao, Juan Luo
We describes four scheduling schemes on the predefined path in large-scale wireless networks supported by full-duplex radios. The end-to-end throughput on multi-hop path with these schemes is discussed, indicating the effect of scheduling schemes and the influence of full-duplex radios on multi-hop data transmission. We make a simulator and compare the throughput results in these schemes. Results show that the new scheduling methods may improve end-to-end throughput on multi-hop path in wireless networks moderately.
在全双工无线电支持的大规模无线网络中,提出了四种基于预定义路径的调度方案。讨论了这些方案在多跳路径上的端到端吞吐量,说明了调度方案的影响以及全双工无线电对多跳数据传输的影响。我们制作了一个模拟器,并比较了这些方案的吞吐量结果。结果表明,新的调度方法可以适度提高无线网络中多跳路径的端到端吞吐量。
{"title":"Transmission Scheduling and End-to-end Throughput of Multi-hop Paths in Full-duplex Embedded Wireless Networks","authors":"Fei Ge, L. Tan, Wei Zhang, Ming Liu, Xun Gao, Juan Luo","doi":"10.1109/LCN48667.2020.9314826","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314826","url":null,"abstract":"We describes four scheduling schemes on the predefined path in large-scale wireless networks supported by full-duplex radios. The end-to-end throughput on multi-hop path with these schemes is discussed, indicating the effect of scheduling schemes and the influence of full-duplex radios on multi-hop data transmission. We make a simulator and compare the throughput results in these schemes. Results show that the new scheduling methods may improve end-to-end throughput on multi-hop path in wireless networks moderately.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-filter 基于哈希的短字符串预过滤器提高入侵检测系统的吞吐量
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314812
Tomás Fukac, V. Kosar, J. Korenek, J. Matoušek
With an increasing speed of network links, it is also necessary to increase the throughput of network security systems. An intrusion detection system (IDS) is one of the key components in the protection of network infrastructure. Unfortunately, the IDS has to match a large set of regular expressions (REs) in network streams, which has a negative impact on its throughput. A fast pre-filtration of network traffic can allow to achieve a higher overall throughput. Therefore, we have designed a new algorithm, which is able to select short strings that represent an RE set utilized in the IDS. Compared to previous methods, strings are selected in less than a second for an RE and can reduce network traffic up to 3.3 times better. As all selected strings have the same length, they can be used in a hash-based pre-filter, which is able to process more 100 Gbps of network traffic.
随着网络链路速度的不断提高,也需要提高网络安全系统的吞吐量。入侵检测系统(IDS)是保护网络基础设施的关键组成部分之一。不幸的是,IDS必须匹配网络流中的大量正则表达式(REs),这对其吞吐量有负面影响。网络流量的快速预过滤可以实现更高的总体吞吐量。因此,我们设计了一种新的算法,该算法能够选择代表IDS中使用的RE集的短字符串。与以前的方法相比,正则在不到1秒的时间内选择字符串,并且可以将网络流量减少3.3倍。由于所有选择的字符串都具有相同的长度,因此它们可以用于基于哈希的预过滤器,该过滤器能够处理100 Gbps以上的网络流量。
{"title":"Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-filter","authors":"Tomás Fukac, V. Kosar, J. Korenek, J. Matoušek","doi":"10.1109/LCN48667.2020.9314812","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314812","url":null,"abstract":"With an increasing speed of network links, it is also necessary to increase the throughput of network security systems. An intrusion detection system (IDS) is one of the key components in the protection of network infrastructure. Unfortunately, the IDS has to match a large set of regular expressions (REs) in network streams, which has a negative impact on its throughput. A fast pre-filtration of network traffic can allow to achieve a higher overall throughput. Therefore, we have designed a new algorithm, which is able to select short strings that represent an RE set utilized in the IDS. Compared to previous methods, strings are selected in less than a second for an RE and can reduce network traffic up to 3.3 times better. As all selected strings have the same length, they can be used in a hash-based pre-filter, which is able to process more 100 Gbps of network traffic.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leveraging MEC in a 5G System for Enhanced Back Situation Awareness 在5G系统中利用MEC增强后方态势感知
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314838
Rreze Halili, F. Z. Yousaf, Nina Slamnik-Kriještorac, Girma M. Yilma, M. Liebsch, E. B. Silva, S. Hadiwardoyo, Rafael Berkvens, M. Weyn
5G has opened up possibilities of introducing new use cases and business models that could not be perceived before. In the context of public safety, 5G offers immense opportunities towards enhancing mission success and situation awareness during emergency management. This paper introduces Back-Situation Awareness (BSA) application enabling early warning/notification to vehicles of an approaching emergency vehicle indicating its presence and the time it will arrive. Such an application is expected to give drivers enough time to create a safety corridor for the emergency vehicle to pass through safely and unhindered. We provide details on the system and application design of the BSA application leveraging Multi-Access Edge Computing (MEC) systems that complement the 5G mobile communication system. An evaluation of the application is provided by using data measurements and indicating the accuracy of the computation and notification of the Estimated Time of Arrival (ETA) based on the ETSI C-ITS protocol messages.
5G开辟了引入以前无法感知的新用例和商业模式的可能性。在公共安全的背景下,5G为在应急管理过程中提高任务成功率和态势感知提供了巨大的机会。本文介绍了一种能够向车辆早期预警/通知正在接近的紧急车辆的存在和到达时间的后台态势感知(BSA)应用程序。这样的应用程序预计会给司机足够的时间来创建一个安全走廊,让紧急车辆安全无阻地通过。我们详细介绍了利用多接入边缘计算(MEC)系统来补充5G移动通信系统的BSA应用程序的系统和应用程序设计。通过使用数据测量和指示基于ETSI C-ITS协议消息的估计到达时间(ETA)的计算和通知的准确性,提供了应用程序的评估。
{"title":"Leveraging MEC in a 5G System for Enhanced Back Situation Awareness","authors":"Rreze Halili, F. Z. Yousaf, Nina Slamnik-Kriještorac, Girma M. Yilma, M. Liebsch, E. B. Silva, S. Hadiwardoyo, Rafael Berkvens, M. Weyn","doi":"10.1109/LCN48667.2020.9314838","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314838","url":null,"abstract":"5G has opened up possibilities of introducing new use cases and business models that could not be perceived before. In the context of public safety, 5G offers immense opportunities towards enhancing mission success and situation awareness during emergency management. This paper introduces Back-Situation Awareness (BSA) application enabling early warning/notification to vehicles of an approaching emergency vehicle indicating its presence and the time it will arrive. Such an application is expected to give drivers enough time to create a safety corridor for the emergency vehicle to pass through safely and unhindered. We provide details on the system and application design of the BSA application leveraging Multi-Access Edge Computing (MEC) systems that complement the 5G mobile communication system. An evaluation of the application is provided by using data measurements and indicating the accuracy of the computation and notification of the Estimated Time of Arrival (ETA) based on the ETSI C-ITS protocol messages.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Black-box System Identification of CPS Protected by a Watermark-based Detector 基于水印检测器保护的CPS黑盒系统识别
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314803
Khalil Guibene, Marwane Ayaida, L. Khoukhi, N. Messai
The implication of Cyber-Physical Systems (CPS) in critical infrastructures (e.g., smart grids, water distribution networks, etc.) has introduced new security issues and vulnerabilities to those systems. In this paper, we demonstrate that black-box system identification using Support Vector Regression (SVR) can be used efficiently to build a model of a given industrial system even when this system is protected with a watermark-based detector. First, we briefly describe the Tennessee Eastman Process used in this study. Then, we present the principal of detection scheme and the theory behind SVR. Finally, we design an efficient black-box SVR algorithm for the Tennessee Eastman Process. Extensive simulations prove the efficiency of our proposed algorithm.
网络物理系统(CPS)在关键基础设施(如智能电网、配水网络等)中的含义为这些系统带来了新的安全问题和漏洞。在本文中,我们证明了使用支持向量回归(SVR)的黑盒系统识别可以有效地用于构建给定工业系统的模型,即使该系统受到基于水印的检测器的保护。首先,我们简要描述了本研究中使用的田纳西伊士曼过程。然后,我们介绍了检测方案的基本原理和支持向量回归的原理。最后,针对田纳西伊士曼过程设计了一种高效的黑盒SVR算法。大量的仿真实验证明了该算法的有效性。
{"title":"Black-box System Identification of CPS Protected by a Watermark-based Detector","authors":"Khalil Guibene, Marwane Ayaida, L. Khoukhi, N. Messai","doi":"10.1109/LCN48667.2020.9314803","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314803","url":null,"abstract":"The implication of Cyber-Physical Systems (CPS) in critical infrastructures (e.g., smart grids, water distribution networks, etc.) has introduced new security issues and vulnerabilities to those systems. In this paper, we demonstrate that black-box system identification using Support Vector Regression (SVR) can be used efficiently to build a model of a given industrial system even when this system is protected with a watermark-based detector. First, we briefly describe the Tennessee Eastman Process used in this study. Then, we present the principal of detection scheme and the theory behind SVR. Finally, we design an efficient black-box SVR algorithm for the Tennessee Eastman Process. Extensive simulations prove the efficiency of our proposed algorithm.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement Learning 基于深度强化学习的智能qos感知路由机制
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314768
Yuanyuan Cao, Bin Dai, Yijun Mo, Yang Xu
With the rapid development of Internet applications, diversified Quality of Service (QoS) has been required in packet routing to meet the demand of various types of applications. This paper presents an Intelligent QoS-aware Routing (IQoR) framework with the assistance of Deep Reinforcement Learning (DRL), which supports multi-class QoS provisioning for packet forwarding. The simulation results show that IQoR outperforms the widely-used benchmark routing algorithms by significantly reducing the average delay and jitter of packets.
随着Internet应用的快速发展,分组路由对服务质量(QoS)提出了多样化的要求,以满足不同类型应用的需求。本文提出了一种基于深度强化学习(DRL)的智能QoS感知路由(IQoR)框架,该框架支持为分组转发提供多类QoS。仿真结果表明,IQoR算法显著降低了数据包的平均时延和抖动,优于目前广泛使用的基准路由算法。
{"title":"IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement Learning","authors":"Yuanyuan Cao, Bin Dai, Yijun Mo, Yang Xu","doi":"10.1109/LCN48667.2020.9314768","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314768","url":null,"abstract":"With the rapid development of Internet applications, diversified Quality of Service (QoS) has been required in packet routing to meet the demand of various types of applications. This paper presents an Intelligent QoS-aware Routing (IQoR) framework with the assistance of Deep Reinforcement Learning (DRL), which supports multi-class QoS provisioning for packet forwarding. The simulation results show that IQoR outperforms the widely-used benchmark routing algorithms by significantly reducing the average delay and jitter of packets.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Understanding Traffic Fingerprinting CNNs 了解流量指纹cnn
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314785
T. Dahanayaka, Guillaume Jourjon, Suranga Seneviratne
HTTPS encrypted traffic can leak information about underlying contents through various statistical properties of traffic flows like packet lengths and timing, opening doors to traffic fingerprinting attacks. Recently proposed traffic fingerprinting attacks leveraged Convolutional Neural Networks (CNNs) and recorded very high accuracies undermining the state-of-the-art mitigation techniques. In this paper, we methodically dissect such CNNs with the objectives of building further accurate and scalable traffic classifiers and understanding the inner workings of such CNNs to develop effective mitigation techniques. By conducting experiments with three datasets, we show that website fingerprinting CNNs focus majorly on the initial parts of traces instead of longer windows of continuous uploads or downloads. Next, we show that traffic fingerprinting CNNs exhibit transfer-learning capabilities allowing identification of new websites with fewer data. Finally, we show that traffic fingerprinting CNNs outperform RNNs because of their resilience to random shifts in data happening due to varying network conditions.
HTTPS加密的流量可以通过流量流的各种统计属性(如数据包长度和时间)泄露有关底层内容的信息,从而为流量指纹攻击打开了大门。最近提出的流量指纹攻击利用卷积神经网络(cnn),并记录了非常高的准确性,破坏了最先进的缓解技术。在本文中,我们系统地剖析了这些cnn,目的是建立进一步准确和可扩展的流量分类器,并了解这些cnn的内部工作原理,以开发有效的缓解技术。通过对三个数据集进行实验,我们发现网站指纹cnn主要关注痕迹的初始部分,而不是连续上传或下载的较长窗口。接下来,我们展示了流量指纹cnn表现出迁移学习能力,允许用更少的数据识别新网站。最后,我们表明流量指纹cnn优于rnn,因为它们对由于不同网络条件而发生的数据随机变化具有弹性。
{"title":"Understanding Traffic Fingerprinting CNNs","authors":"T. Dahanayaka, Guillaume Jourjon, Suranga Seneviratne","doi":"10.1109/LCN48667.2020.9314785","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314785","url":null,"abstract":"HTTPS encrypted traffic can leak information about underlying contents through various statistical properties of traffic flows like packet lengths and timing, opening doors to traffic fingerprinting attacks. Recently proposed traffic fingerprinting attacks leveraged Convolutional Neural Networks (CNNs) and recorded very high accuracies undermining the state-of-the-art mitigation techniques. In this paper, we methodically dissect such CNNs with the objectives of building further accurate and scalable traffic classifiers and understanding the inner workings of such CNNs to develop effective mitigation techniques. By conducting experiments with three datasets, we show that website fingerprinting CNNs focus majorly on the initial parts of traces instead of longer windows of continuous uploads or downloads. Next, we show that traffic fingerprinting CNNs exhibit transfer-learning capabilities allowing identification of new websites with fewer data. Finally, we show that traffic fingerprinting CNNs outperform RNNs because of their resilience to random shifts in data happening due to varying network conditions.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1