首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT Devices 细胞动力学:一种基于细胞动力学的物联网设备异常检测技术
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314856
Kashif Naveed, Hui Wu, Abdullah Abusaq
IoT devices are becoming ubiquitous and the availability of open-source botnets has made it very easy for anyone to attack and manipulate such connected devices and even infect them. These anomalies are getting sophisticated and powerful enough to generate network traffic at terabits per second (Tbps) and cost companies over a billion dollars a year. We present a novel technique, named Dytokinesis, to separate such anomalous entities. Dytokinesis is inspired by the biological Cytokinesis process in which a cell is divided into two. Dytokinesis, on a similar pattern, performs such a division on a dataset with high accuracy and low latency. Dytokinesis works in different phases and makes use of Empirical Data Analysis (EDA) and Gaussian kernel to bisect the dataset into normal and anomalous classes. Experimental results demonstrate that Dytokinesis obtains significantly higher accuracy compared to other state-of-the-art techniques while achieving the best run-time performance.
物联网设备正变得无处不在,开源僵尸网络的可用性使得任何人都可以很容易地攻击和操纵这些连接的设备,甚至感染它们。这些异常变得越来越复杂和强大,足以产生每秒太比特(Tbps)的网络流量,每年给公司造成超过10亿美元的损失。我们提出了一种新的技术,命名为dytokineesis,以分离这种异常实体。细胞分裂的灵感来自于生物细胞分裂过程,在这个过程中,一个细胞被分成两个。dytokineesis以类似的模式在数据集上执行这样的划分,具有高精度和低延迟。dytokineesis在不同的阶段工作,并利用经验数据分析(EDA)和高斯核将数据集平分为正常和异常类。实验结果表明,与其他先进技术相比,dytokineesis在获得最佳运行性能的同时获得了显着更高的精度。
{"title":"Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT Devices","authors":"Kashif Naveed, Hui Wu, Abdullah Abusaq","doi":"10.1109/LCN48667.2020.9314856","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314856","url":null,"abstract":"IoT devices are becoming ubiquitous and the availability of open-source botnets has made it very easy for anyone to attack and manipulate such connected devices and even infect them. These anomalies are getting sophisticated and powerful enough to generate network traffic at terabits per second (Tbps) and cost companies over a billion dollars a year. We present a novel technique, named Dytokinesis, to separate such anomalous entities. Dytokinesis is inspired by the biological Cytokinesis process in which a cell is divided into two. Dytokinesis, on a similar pattern, performs such a division on a dataset with high accuracy and low latency. Dytokinesis works in different phases and makes use of Empirical Data Analysis (EDA) and Gaussian kernel to bisect the dataset into normal and anomalous classes. Experimental results demonstrate that Dytokinesis obtains significantly higher accuracy compared to other state-of-the-art techniques while achieving the best run-time performance.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131941152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
List of Accepted Demonstrations 已接受的演示列表
Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314843
{"title":"List of Accepted Demonstrations","authors":"","doi":"10.1109/lcn48667.2020.9314843","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314843","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCAN: Smart Collaborative Attack in Named Data Networking SCAN:命名数据网络中的智能协同攻击
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314807
Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, S. Nandi, Sukumar Nandi
Named Data Networking is a promising Future Internet Architecture, where consumers fetch contents from the network using unique names. It has in-built security features like data integrity, and data origin authentication as contents are signed by the original producer. Though, NDN’s stateful forwarding plane helps to remove some of the existing DDoS attacks in the current IP architecture, still it can face one specific kind of attack called Interest flooding attack (IFA). In this paper, we focus on one variant of IFA where malicious consumers and malicious producers collaboratively launch an attack to degrade the QoS of legitimate consumers. Here we have shown how attackers can intelligently fix the Interest sending rate so that attack goes undetected easily. Simulation results demonstrate that with proper placement of malicious consumers and producers, the attackers can successfully launch the attack with moderate traffic and less number of malicious consumers.
命名数据网络是一种很有前途的未来互联网架构,消费者使用唯一名称从网络获取内容。它具有内置的安全特性,如数据完整性和数据源身份验证,因为内容由原始生产者签名。尽管NDN的状态转发平面有助于消除当前IP架构中存在的一些DDoS攻击,但它仍然可能面临一种称为兴趣泛洪攻击(IFA)的特定类型的攻击。在本文中,我们重点研究了IFA的一种变体,其中恶意消费者和恶意生产者协同发起攻击以降低合法消费者的QoS。在这里,我们展示了攻击者如何智能地修改利息发送速率,从而使攻击不容易被发现。仿真结果表明,通过合理配置恶意消费者和恶意生产者,攻击者可以在流量适中、恶意消费者数量较少的情况下成功发起攻击。
{"title":"SCAN: Smart Collaborative Attack in Named Data Networking","authors":"Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, S. Nandi, Sukumar Nandi","doi":"10.1109/LCN48667.2020.9314807","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314807","url":null,"abstract":"Named Data Networking is a promising Future Internet Architecture, where consumers fetch contents from the network using unique names. It has in-built security features like data integrity, and data origin authentication as contents are signed by the original producer. Though, NDN’s stateful forwarding plane helps to remove some of the existing DDoS attacks in the current IP architecture, still it can face one specific kind of attack called Interest flooding attack (IFA). In this paper, we focus on one variant of IFA where malicious consumers and malicious producers collaboratively launch an attack to degrade the QoS of legitimate consumers. Here we have shown how attackers can intelligently fix the Interest sending rate so that attack goes undetected easily. Simulation results demonstrate that with proper placement of malicious consumers and producers, the attackers can successfully launch the attack with moderate traffic and less number of malicious consumers.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE LCN 2020 - Author Index IEEE LCN 2020 -作者索引
Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314814
{"title":"IEEE LCN 2020 - Author Index","authors":"","doi":"10.1109/lcn48667.2020.9314814","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314814","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133629267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don’t Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies 不要停留在顶部:使用证书透明度日志来扩展网络安全研究的域列表
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314793
Fabian Marquardt, Christopher Schmidt
Comprehensive domain lists are a requirement for many Internet measurement studies. Currently, researchers rely on proprietary lists such as the Alexa top list. Recent research has identified many problems with the existing domain lists. Our work proposes Certificate Transparency (CT) logs as an alternative domain list source for use in internet measurement studies. We describe the process of deriving a domain list from available CT log servers and analyze the gathered domain list. Furthermore, we compare the CT domain list with existing domain top lists by scanning the gathered domains for various web application technologies. Our results indicate a high level of similarity between the lists, but also interesting differences.
全面的域列表是许多互联网测量研究的要求。目前,研究人员依赖于专有列表,如Alexa热门列表。最近的研究发现了现有域名列表的许多问题。我们的工作建议证书透明度(CT)日志作为互联网测量研究中使用的替代域列表源。我们描述了从可用的CT日志服务器中获取域列表的过程,并对收集到的域列表进行了分析。此外,我们通过扫描收集到的各种web应用技术的域,将CT域列表与现有的域顶级列表进行比较。我们的结果表明,这些列表之间存在高度的相似性,但也存在有趣的差异。
{"title":"Don’t Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies","authors":"Fabian Marquardt, Christopher Schmidt","doi":"10.1109/LCN48667.2020.9314793","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314793","url":null,"abstract":"Comprehensive domain lists are a requirement for many Internet measurement studies. Currently, researchers rely on proprietary lists such as the Alexa top list. Recent research has identified many problems with the existing domain lists. Our work proposes Certificate Transparency (CT) logs as an alternative domain list source for use in internet measurement studies. We describe the process of deriving a domain list from available CT log servers and analyze the gathered domain list. Furthermore, we compare the CT domain list with existing domain top lists by scanning the gathered domains for various web application technologies. Our results indicate a high level of similarity between the lists, but also interesting differences.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating the Impact of Cross-Tier Interference on Quality in Heterogeneous Cellular Networks 减轻异构蜂窝网络中跨层干扰对质量的影响
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314834
Bharat Agarwal, Mohammed Amine Togou, M. Ruffini, Gabriel-Miro Muntean
Recently, the use of heterogeneous small-cell networks to offload traffic from existing cellular systems has attracted considerable attention. One of the significant challenges in heterogeneous networks (HetNet) is cross-tier interference, which becomes significant when macro-cell users (MUE) are in the vicinity of femtocell base stations (FBS). Indeed, the femtocell will cause significant interference to MUEs on the macrocell downlink (DL) while MUEs will induce hefty interference to the femtocell on the macrocell uplink (UL). Substantial work has focused on offloading and interference mitigation in HetNets; yet, none of them has considered the impact of cross-tier interference on quality of service (QoS), quality of experience (QoE). This paper proposes the Quality Efficient Femtocell Offloading Scheme (QEFOS) that selects the users most affected by the interference encountered and offloads them to nearby FBSs. QEFOS testing shows substantial improvements in terms of QoS and QoE perceived by users in heavy cross-tier interference scenarios in comparison with alternative approaches. In particular QEFOS’s impact on throughput, packet loss ratio (PLR), peak-to-signal-noise ratio (PSNR), and structural similarity identity matrix (SSIM) was assessed.
最近,使用异构小蜂窝网络来卸载现有蜂窝系统的流量引起了相当大的关注。跨层干扰是异构网络(HetNet)面临的重大挑战之一,当宏蜂窝用户(MUE)位于飞蜂窝基站(FBS)附近时,跨层干扰变得非常明显。实际上,移动蜂窝将对宏蜂窝下行链路(DL)上的微蜂窝造成严重干扰,而微蜂窝将对宏蜂窝上行链路(UL)上的移动蜂窝造成严重干扰。大量工作集中在HetNets的卸载和干扰缓解上;然而,它们都没有考虑到跨层干扰对服务质量(QoS)、体验质量(QoE)的影响。本文提出了一种优质高效的基站卸载方案(QEFOS),该方案选择受干扰最严重的用户,并将其卸载到附近的基站。与其他方法相比,QEFOS测试显示,在重度跨层干扰场景中,用户感知到的QoS和QoE方面有了实质性的改进。特别是QEFOS对吞吐量、丢包率(PLR)、峰信噪比(PSNR)和结构相似单位矩阵(SSIM)的影响进行了评估。
{"title":"Mitigating the Impact of Cross-Tier Interference on Quality in Heterogeneous Cellular Networks","authors":"Bharat Agarwal, Mohammed Amine Togou, M. Ruffini, Gabriel-Miro Muntean","doi":"10.1109/LCN48667.2020.9314834","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314834","url":null,"abstract":"Recently, the use of heterogeneous small-cell networks to offload traffic from existing cellular systems has attracted considerable attention. One of the significant challenges in heterogeneous networks (HetNet) is cross-tier interference, which becomes significant when macro-cell users (MUE) are in the vicinity of femtocell base stations (FBS). Indeed, the femtocell will cause significant interference to MUEs on the macrocell downlink (DL) while MUEs will induce hefty interference to the femtocell on the macrocell uplink (UL). Substantial work has focused on offloading and interference mitigation in HetNets; yet, none of them has considered the impact of cross-tier interference on quality of service (QoS), quality of experience (QoE). This paper proposes the Quality Efficient Femtocell Offloading Scheme (QEFOS) that selects the users most affected by the interference encountered and offloads them to nearby FBSs. QEFOS testing shows substantial improvements in terms of QoS and QoE perceived by users in heavy cross-tier interference scenarios in comparison with alternative approaches. In particular QEFOS’s impact on throughput, packet loss ratio (PLR), peak-to-signal-noise ratio (PSNR), and structural similarity identity matrix (SSIM) was assessed.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT 基于sdn的工业物联网后端网络安全可靠的数据传输
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314854
Tao Li, C. Hofmann, Elke Franz
Software Defined Networking (SDN) is established as a widely used concept in networks and has been introduced into the network architecture of Industrial Internet of Things (IIoT). Adversaries targeting on disrupting the operation of an IIoT system can launch a simple yet effective attack – malicious packet-modification attack (MPA) – that was previously identified in IoT based on wireless sensor networks. To mitigate MPAs, we introduce an approach for secure and reliable data transmission in the presence of such active attackers by utilizing the programmability and flexibility offered by SDN. Our approach ensures that modifications are recognized by IIoT devices. The effectiveness and performance of the proposed solution was evaluated in comprehensive tests by means of a prototypical implementation. The results confirm that malicious forwarding devices can be reliably and quickly identified and, hence, bypassed even if they modify only a portion of the data.
软件定义网络(SDN)作为一个广泛应用于网络的概念,已经被引入到工业物联网(IIoT)的网络架构中。以破坏工业物联网系统运行为目标的攻击者可以发起简单而有效的攻击——恶意数据包修改攻击(MPA),这种攻击以前在基于无线传感器网络的物联网中被识别出来。为了减轻MPAs,我们通过利用SDN提供的可编程性和灵活性,引入了一种在这种主动攻击者存在的情况下安全可靠的数据传输方法。我们的方法确保修改被IIoT设备识别。通过一个原型实现,在综合测试中评估了该解决方案的有效性和性能。结果证实,恶意转发设备可以可靠而快速地识别,因此,即使它们只修改了一部分数据,也可以绕过它们。
{"title":"Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT","authors":"Tao Li, C. Hofmann, Elke Franz","doi":"10.1109/LCN48667.2020.9314854","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314854","url":null,"abstract":"Software Defined Networking (SDN) is established as a widely used concept in networks and has been introduced into the network architecture of Industrial Internet of Things (IIoT). Adversaries targeting on disrupting the operation of an IIoT system can launch a simple yet effective attack – malicious packet-modification attack (MPA) – that was previously identified in IoT based on wireless sensor networks. To mitigate MPAs, we introduce an approach for secure and reliable data transmission in the presence of such active attackers by utilizing the programmability and flexibility offered by SDN. Our approach ensures that modifications are recognized by IIoT devices. The effectiveness and performance of the proposed solution was evaluated in comprehensive tests by means of a prototypical implementation. The results confirm that malicious forwarding devices can be reliably and quickly identified and, hence, bypassed even if they modify only a portion of the data.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy ReAL:一种基于ResNet-ALSTM的能源互联网入侵检测系统
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314858
Jiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li
The Internet of energy (IoE), envisioned to be a promising paradigm of the Internet of things (IoT), is characterized by the deep integration of various distributed energy systems. However, the fusion of heterogeneous IoE communication networks creates a new threat landscape. To thwart and mitigate various types of cyber threats to IoE networks, this paper proposes a novel intrusion detection system (IDS) based on a designed residual network with attention long short term memory (ReAL). Specifically, we design a light gradient boosting machine (LightGBM)-based feature selection method to identify the most useful features. Then, a residual network (ResNet) and a long short term memory neural network with an attention mechanism (ALSTM) are employed, to extract temporal patterns of network traffic events. After that, these patterns are orchestrated to identify the anomalies in IoE networks. The high effectiveness of the proposed IDS is validated on a real IoE dataset.
能源互联网(IoE)以各种分布式能源系统的深度融合为特征,被设想为物联网(IoT)的一个有前途的范例。然而,异构物联网通信网络的融合产生了新的威胁格局。为了抵御和缓解物联网网络面临的各种网络威胁,本文提出了一种基于设计的具有注意长短期记忆(ReAL)的残余网络的入侵检测系统。具体来说,我们设计了一种基于光梯度增强机(LightGBM)的特征选择方法来识别最有用的特征。然后,采用残差网络(ResNet)和带注意机制的长短期记忆神经网络(ALSTM)提取网络流量事件的时间模式。之后,这些模式被编排以识别IoE网络中的异常。在一个真实的物联网数据集上验证了该IDS的有效性。
{"title":"ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy","authors":"Jiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li","doi":"10.1109/LCN48667.2020.9314858","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314858","url":null,"abstract":"The Internet of energy (IoE), envisioned to be a promising paradigm of the Internet of things (IoT), is characterized by the deep integration of various distributed energy systems. However, the fusion of heterogeneous IoE communication networks creates a new threat landscape. To thwart and mitigate various types of cyber threats to IoE networks, this paper proposes a novel intrusion detection system (IDS) based on a designed residual network with attention long short term memory (ReAL). Specifically, we design a light gradient boosting machine (LightGBM)-based feature selection method to identify the most useful features. Then, a residual network (ResNet) and a long short term memory neural network with an attention mechanism (ALSTM) are employed, to extract temporal patterns of network traffic events. After that, these patterns are orchestrated to identify the anomalies in IoE networks. The high effectiveness of the proposed IDS is validated on a real IoE dataset.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System 基于区块链的端到端可验证远程电子投票系统
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314815
Christian Killer, B. Rodrigues, E. Scheid, M. Franco, M. Eck, Nik Zaugg, Alex Scheitlin, B. Stiller
While the existence of Public Bulletin Boards (PBB) is often formulated as an assumption in related work on Remote Electronic Voting (REV) systems, this work here on Provotum focuses on the practical design and architecture of such a PBB, including its distributed execution. Further, Provotum leverages a public permissioned Blockchain (BC) as a PBB, where only authorized entities can sign blocks, while the general public can verify all BC data.Therefore, Provotum defines a new and fully decentralized BC-based REV system, which deploys a permissioned BC as a PBB and allows for the explicit distribution of trust across different permissioned BC nodes. Provotum is operated in a fully distributed fashion by using Smart Contracts (SC), Distributed Key Generation (DKG), Homomorphic Encryption (HE), and Cooperative Decryption (CD), as well as employing client-side encryption, which enables ballot secrecy, while the BC forms an audit trail, enabling public and End-to-end Verifiability (E2E-V).
虽然在远程电子投票(REV)系统的相关工作中,公共公告板(Public Bulletin Boards, PBB)的存在通常被认为是一种假设,但本文在Provotum上的工作侧重于这种公共公告板的实际设计和体系结构,包括其分布式执行。此外,Provotum利用公共许可bb0 (BC)作为PBB,其中只有授权实体可以签名块,而一般公众可以验证所有BC数据。因此,Provotum定义了一个新的、完全去中心化的基于BC的REV系统,该系统将被许可的BC部署为PBB,并允许跨不同被许可的BC节点显式地分发信任。Provotum以完全分布式的方式运行,通过使用智能合约(SC),分布式密钥生成(DKG),同态加密(HE)和协作解密(CD),以及采用客户端加密,从而实现选票保密,而BC形成审计跟踪,实现公共和端到端可验证性(E2E-V)。
{"title":"Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System","authors":"Christian Killer, B. Rodrigues, E. Scheid, M. Franco, M. Eck, Nik Zaugg, Alex Scheitlin, B. Stiller","doi":"10.1109/LCN48667.2020.9314815","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314815","url":null,"abstract":"While the existence of Public Bulletin Boards (PBB) is often formulated as an assumption in related work on Remote Electronic Voting (REV) systems, this work here on Provotum focuses on the practical design and architecture of such a PBB, including its distributed execution. Further, Provotum leverages a public permissioned Blockchain (BC) as a PBB, where only authorized entities can sign blocks, while the general public can verify all BC data.Therefore, Provotum defines a new and fully decentralized BC-based REV system, which deploys a permissioned BC as a PBB and allows for the explicit distribution of trust across different permissioned BC nodes. Provotum is operated in a fully distributed fashion by using Smart Contracts (SC), Distributed Key Generation (DKG), Homomorphic Encryption (HE), and Cooperative Decryption (CD), as well as employing client-side encryption, which enables ballot secrecy, while the BC forms an audit trail, enabling public and End-to-end Verifiability (E2E-V).","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
LCN 2020 Keynote 1 - Do We Still Need Wi-Fi in the Era of 5G? LCN 2020主题演讲1 - 5G时代我们还需要Wi-Fi吗?
Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314821
{"title":"LCN 2020 Keynote 1 - Do We Still Need Wi-Fi in the Era of 5G?","authors":"","doi":"10.1109/lcn48667.2020.9314821","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314821","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1