首页 > 最新文献

2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)最新文献

英文 中文
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress) 实施基于延迟感知雾云的物联网防火墙(正在进行中)
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013561
Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz
Firewalls for IoT devices can be enforced at the gateway or at the cloud. Utilizing a fog based architecture, firewalls can also be enforced at fog layer. Depending on where the firewall is running, varying delays and overhead will be experienced by IoT devices. Some IoT devices are sensitive to the incurred delays. So choosing the most suitable platform to enforce firewall for each individual device under the different load conditions is important. In this work, we present a delay-aware IoT firewall enforcing mechanism using fog-cloud based architecture.
物联网设备的防火墙可以在网关或云上实施。利用基于雾的体系结构,也可以在雾层实施防火墙。根据防火墙的运行位置,物联网设备将经历不同的延迟和开销。一些物联网设备对产生的延迟很敏感。因此,在不同的负载条件下,为每个单独的设备选择最合适的平台来实施防火墙非常重要。在这项工作中,我们提出了一种基于雾云架构的延迟感知物联网防火墙执行机制。
{"title":"Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress)","authors":"Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz","doi":"10.1109/NCA57778.2022.10013561","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013561","url":null,"abstract":"Firewalls for IoT devices can be enforced at the gateway or at the cloud. Utilizing a fog based architecture, firewalls can also be enforced at fog layer. Depending on where the firewall is running, varying delays and overhead will be experienced by IoT devices. Some IoT devices are sensitive to the incurred delays. So choosing the most suitable platform to enforce firewall for each individual device under the different load conditions is important. In this work, we present a delay-aware IoT firewall enforcing mechanism using fog-cloud based architecture.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117347093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming 以基础设施为中心,与网络服务器无关的LoRaWAN漫游
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013531
Giovanni Merlino, R. Asorey-Cacheda, L. D'Agati, F. Longo, A. García-Sánchez, J. García-Haro, A. Puliafito
The development of Low-Power Wide-Area Networks (LPWAN) has significantly boosted the uptake of Internet of Things technologies, fostering their adoption in such domains as Smart Cities and Industry 4.0. In the context of LPWANs, LoRa is one of the most promising developments, experiencing massive growth in recent years. This situation has led to the steadily growing trend of redundant deployments across locations, or scenarios, where it would be more natural to be able to leverage (e.g., rent) LoRa infrastructure belonging to a third party. Key to reversing this unsustainable trend is roaming approaches. Although the LoRa specifications define mechanisms for roaming, gaps and challenges make roaming difficult to deploy and operate in real-world scenarios. This paper analyzes these concerns and proposes a novel architecture compliant with the LoRa specification to design and accommodate roaming services in a consistent, efficient, and scalable way.
低功耗广域网(LPWAN)的发展极大地促进了物联网技术的采用,促进了它们在智慧城市和工业4.0等领域的采用。在lpwan的背景下,LoRa是最有前途的发展之一,近年来经历了巨大的增长。这种情况导致了跨位置或场景的冗余部署的稳步增长趋势,在这些情况下,能够利用(例如,租用)属于第三方的LoRa基础设施将更加自然。扭转这种不可持续趋势的关键是漫游方法。尽管LoRa规范定义了漫游机制,但存在的差距和挑战使得漫游难以在实际场景中部署和操作。本文分析了这些问题,提出了一种符合LoRa规范的新型架构,以一致、高效和可扩展的方式设计和容纳漫游服务。
{"title":"Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming","authors":"Giovanni Merlino, R. Asorey-Cacheda, L. D'Agati, F. Longo, A. García-Sánchez, J. García-Haro, A. Puliafito","doi":"10.1109/NCA57778.2022.10013531","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013531","url":null,"abstract":"The development of Low-Power Wide-Area Networks (LPWAN) has significantly boosted the uptake of Internet of Things technologies, fostering their adoption in such domains as Smart Cities and Industry 4.0. In the context of LPWANs, LoRa is one of the most promising developments, experiencing massive growth in recent years. This situation has led to the steadily growing trend of redundant deployments across locations, or scenarios, where it would be more natural to be able to leverage (e.g., rent) LoRa infrastructure belonging to a third party. Key to reversing this unsustainable trend is roaming approaches. Although the LoRa specifications define mechanisms for roaming, gaps and challenges make roaming difficult to deploy and operate in real-world scenarios. This paper analyzes these concerns and proposes a novel architecture compliant with the LoRa specification to design and accommodate roaming services in a consistent, efficient, and scalable way.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version) 乘法部分同态CRT秘密共享:(初步版本)
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013513
S. Dolev, Yaniv Kleinman
A new CRT-based positive (non-zero) secret-sharing scheme with perfect information-theoretic (PIT) security and multiplicative homomorphism is presented. The scheme is designed to support the evaluation of multiplications of non-zero secrets of multiplicative groups.Our CRT-based scheme is partially homomorphic, supporting homomorphic multiplications. Nevertheless, it has the potential to be regarded as fully homomorphic for practical scenarios, such as bounded-sized multi-cloud databases.
提出了一种新的基于ct的、具有完善的信息论(PIT)安全性和乘法同态的正(非零)秘密共享方案。该方案旨在支持对乘性群的非零秘密的乘法求值。我们的基于crt的方案是部分同态的,支持同态乘法。尽管如此,对于实际场景(例如大小有限的多云数据库),它仍有可能被视为完全同态的。
{"title":"Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version)","authors":"S. Dolev, Yaniv Kleinman","doi":"10.1109/NCA57778.2022.10013513","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013513","url":null,"abstract":"A new CRT-based positive (non-zero) secret-sharing scheme with perfect information-theoretic (PIT) security and multiplicative homomorphism is presented. The scheme is designed to support the evaluation of multiplications of non-zero secrets of multiplicative groups.Our CRT-based scheme is partially homomorphic, supporting homomorphic multiplications. Nevertheless, it has the potential to be regarded as fully homomorphic for practical scenarios, such as bounded-sized multi-cloud databases.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inter-slice B5G Bandwidth Resource Allocation B5G片间带宽资源分配
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013545
Fadoua Debbabi, Raouia Taktak, Rihab Jmal, L. Chaari, R. Aguiar
The Beyond 5G (B5G) networks vision afford wireless access to a vertical market with varying Quality of Service (QoS) requirements. Network Slicing (NS) is one of the key features that offers the opportunity to have a logical network that affects the market model of these verticals. Accordingly, Network Slicing opens the door to new market players including the Infrastructure Provider (InP) and the Virtual Network Operator (VNO). The InP is the owner of the infrastructure that supports several types of slices. The VNO will buy network resources (i.e., bandwidth) from the InP in order to provide a particular service to its users. Consequently, deciding on the optimal resources allocation among VNO users while maximizing the revenue of the InP has become a fundamental issue that needs to be solved. Previous works have presented optimal solutions for resources allocation and focused mainly on a single scenario based on pricing mechanisms. In this paper, we propose an inter-slice resources allocation based on multiple sets, namely customer residential profile, industry coverage, and business area. We propose an Integer Linear Programming (ILP) formulation to the problem, describe an admission control scheme and devise a greedy-based heuristic to solve the problem.
超5G (B5G)网络愿景为具有不同服务质量(QoS)要求的垂直市场提供无线接入。网络切片(NS)是一个关键特性,它提供了一个影响这些垂直市场模型的逻辑网络的机会。因此,网络切片为新的市场参与者打开了大门,包括基础设施提供商(InP)和虚拟网络运营商(VNO)。InP是支持多种类型片的基础设施的所有者。VNO将从InP购买网络资源(即带宽),以便向其用户提供特定的服务。因此,如何在实现InP收益最大化的同时,在VNO用户之间进行最优的资源分配,已经成为一个需要解决的根本性问题。以前的工作提出了资源配置的最优解决方案,主要集中在基于定价机制的单一场景。在本文中,我们提出了一种基于多集(即客户居住概况、行业覆盖范围和业务区域)的片间资源配置方法。我们提出了一个整数线性规划(ILP)公式,描述了一个准入控制方案,并设计了一个基于贪婪的启发式算法来解决这个问题。
{"title":"Inter-slice B5G Bandwidth Resource Allocation","authors":"Fadoua Debbabi, Raouia Taktak, Rihab Jmal, L. Chaari, R. Aguiar","doi":"10.1109/NCA57778.2022.10013545","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013545","url":null,"abstract":"The Beyond 5G (B5G) networks vision afford wireless access to a vertical market with varying Quality of Service (QoS) requirements. Network Slicing (NS) is one of the key features that offers the opportunity to have a logical network that affects the market model of these verticals. Accordingly, Network Slicing opens the door to new market players including the Infrastructure Provider (InP) and the Virtual Network Operator (VNO). The InP is the owner of the infrastructure that supports several types of slices. The VNO will buy network resources (i.e., bandwidth) from the InP in order to provide a particular service to its users. Consequently, deciding on the optimal resources allocation among VNO users while maximizing the revenue of the InP has become a fundamental issue that needs to be solved. Previous works have presented optimal solutions for resources allocation and focused mainly on a single scenario based on pricing mechanisms. In this paper, we propose an inter-slice resources allocation based on multiple sets, namely customer residential profile, industry coverage, and business area. We propose an Integer Linear Programming (ILP) formulation to the problem, describe an admission control scheme and devise a greedy-based heuristic to solve the problem.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122168808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning 基于顺序机器学习的网络入侵检测系统鲁棒性评估
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013643
A. Venturi, Claudio Zanasi, Mirco Marchetti, M. Colajanni
The rise of sequential Machine Learning (ML) methods has paved the way for a new generation of Network Intrusion Detection Systems (NIDS) which base their classification on the temporal patterns exhibited by malicious traffic. Previous work presents successful algorithms in this field, but just a few attempts try to assess their robustness in real-world contexts. In this paper, we aim to fill this gap by presenting a novel evaluation methodology. In particular, we propose a new time-based adversarial attack in which we simulate a delay in the malicious communications that changes the arrangement of the samples in the test set. Moreover, we design an innovative evaluation technique simulating a worst-case training scenario in which the last portion of the training set does not include any malicious flow. Through them, we can evaluate how much sequential ML-based NIDS are sensible to modifications that an adaptive attacker might apply at temporal level, and we can verify their robustness to the unpredictable traffic produced by modern networks. Our experimental campaign validates our proposal against a recent NIDS trained on a public dataset for botnet detection. The results demonstrate its high resistance to temporal adversarial attacks, but also a drastic performance drop when even just 1% of benign flows are injected at the end of the training set. Our findings raise questions about the reliable deployment of sequential ML-NIDS in practice, and at the same time can guide researchers to develop more robust defensive tools in the future.
顺序机器学习(ML)方法的兴起为新一代网络入侵检测系统(NIDS)铺平了道路,这些系统基于恶意流量所表现出的时间模式进行分类。以前的工作在这一领域提出了成功的算法,但只有少数尝试试图评估它们在现实环境中的鲁棒性。在本文中,我们的目标是通过提出一种新的评估方法来填补这一空白。特别是,我们提出了一种新的基于时间的对抗性攻击,在这种攻击中,我们模拟了恶意通信中的延迟,这种延迟改变了测试集中样本的排列。此外,我们设计了一种创新的评估技术,模拟最坏情况的训练场景,其中训练集的最后一部分不包括任何恶意流。通过它们,我们可以评估基于序列ml的NIDS对自适应攻击者在时间层面上可能应用的修改有多大的敏感性,并且我们可以验证它们对现代网络产生的不可预测流量的鲁棒性。我们的实验活动针对最近在公共数据集上训练的用于僵尸网络检测的NIDS验证了我们的建议。结果表明,它对时间对抗性攻击具有很高的抵抗力,但在训练集结束时,即使只注入1%的良性流,性能也会急剧下降。我们的研究结果提出了关于在实践中可靠部署顺序ML-NIDS的问题,同时可以指导研究人员在未来开发更强大的防御工具。
{"title":"Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning","authors":"A. Venturi, Claudio Zanasi, Mirco Marchetti, M. Colajanni","doi":"10.1109/NCA57778.2022.10013643","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013643","url":null,"abstract":"The rise of sequential Machine Learning (ML) methods has paved the way for a new generation of Network Intrusion Detection Systems (NIDS) which base their classification on the temporal patterns exhibited by malicious traffic. Previous work presents successful algorithms in this field, but just a few attempts try to assess their robustness in real-world contexts. In this paper, we aim to fill this gap by presenting a novel evaluation methodology. In particular, we propose a new time-based adversarial attack in which we simulate a delay in the malicious communications that changes the arrangement of the samples in the test set. Moreover, we design an innovative evaluation technique simulating a worst-case training scenario in which the last portion of the training set does not include any malicious flow. Through them, we can evaluate how much sequential ML-based NIDS are sensible to modifications that an adaptive attacker might apply at temporal level, and we can verify their robustness to the unpredictable traffic produced by modern networks. Our experimental campaign validates our proposal against a recent NIDS trained on a public dataset for botnet detection. The results demonstrate its high resistance to temporal adversarial attacks, but also a drastic performance drop when even just 1% of benign flows are injected at the end of the training set. Our findings raise questions about the reliable deployment of sequential ML-NIDS in practice, and at the same time can guide researchers to develop more robust defensive tools in the future.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV) 基于强化学习的车联网虚拟传感器配置
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013541
Slim Abbes, S. Rekhis
The Internet of Vehicles (IoV) has been recognized as a powerful application of the Internet of Things (IoT) in the Intelligent Transportation System (ITS), providing intelligence for interconnection between devices, interaction with the environment, and thus, greater efficiency in sensor data exploitation. Therefore, leveraging the huge capability of sensors embedded in vehicles to offer a Sensing As A Service (Se-aaS) represents a great solution to exploit under-used sensor resources and continue providing sensors despite their positions and mobility patterns. Nevertheless, the high network mobility and the fast topology changes in IoV impact the vehicle availability and complicate the service provision. To this aim, we propose a vehicle sensor virtualization in a Cloud IoV architecture that encompasses functional blocks of mobile sensor suppliers, Sensor Cloud Service Provider (SCSP), and service consumers. Moreover, we propose a reinforcement learning-based solution for vehicle sensor selection to predict and dynamically select the physical sensors composing the vehicle virtual sensor. The conducted simulations show the effectiveness of the proposed solution.
车联网(IoV)已被认为是物联网(IoT)在智能交通系统(ITS)中的强大应用,为设备之间的互联、与环境的交互提供智能,从而提高传感器数据利用的效率。因此,利用嵌入在车辆中的传感器的巨大功能来提供传感即服务(Se-aaS)是一个很好的解决方案,可以利用未充分利用的传感器资源,并继续提供传感器,无论其位置和移动模式如何。然而,物联网的高移动性和快速拓扑变化影响了车辆的可用性,使服务提供复杂化。为此,我们提出了云物联网架构中的汽车传感器虚拟化,该架构包含移动传感器供应商、传感器云服务提供商(SCSP)和服务消费者的功能块。此外,我们提出了一种基于强化学习的车辆传感器选择解决方案,以预测和动态选择组成车辆虚拟传感器的物理传感器。仿真结果表明了该方法的有效性。
{"title":"Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV)","authors":"Slim Abbes, S. Rekhis","doi":"10.1109/NCA57778.2022.10013541","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013541","url":null,"abstract":"The Internet of Vehicles (IoV) has been recognized as a powerful application of the Internet of Things (IoT) in the Intelligent Transportation System (ITS), providing intelligence for interconnection between devices, interaction with the environment, and thus, greater efficiency in sensor data exploitation. Therefore, leveraging the huge capability of sensors embedded in vehicles to offer a Sensing As A Service (Se-aaS) represents a great solution to exploit under-used sensor resources and continue providing sensors despite their positions and mobility patterns. Nevertheless, the high network mobility and the fast topology changes in IoV impact the vehicle availability and complicate the service provision. To this aim, we propose a vehicle sensor virtualization in a Cloud IoV architecture that encompasses functional blocks of mobile sensor suppliers, Sensor Cloud Service Provider (SCSP), and service consumers. Moreover, we propose a reinforcement learning-based solution for vehicle sensor selection to predict and dynamically select the physical sensors composing the vehicle virtual sensor. The conducted simulations show the effectiveness of the proposed solution.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modularized and Contract-Based Prediction Models in Programmable Networks 可编程网络中的模块化和基于契约的预测模型
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013517
Michel Neves, Andre Riker, J. Nobre, A. Abelém, B. Dalmazo
Network traffic engineering aims at the network quality, optimizing routes and detecting network attacks. In this context, traffic prediction is an essential tool to capture the underlying behavior of a network. Therefore, this work proposes a modularization architecture for volumetric prediction models, allowing switching between models and setups at runtime in controllers of Software Defined Networks (SDN), dealing with short time series and delivering the data already processed for the prediction. The proposed architecture compares the results from four traditional predictors based on short-range time dependency.
网络流量工程旨在提高网络质量,优化路由,检测网络攻击。在这种情况下,流量预测是捕获网络底层行为的基本工具。因此,这项工作提出了体积预测模型的模块化架构,允许在软件定义网络(SDN)控制器的运行时在模型和设置之间切换,处理短时间序列并提供已经为预测处理过的数据。提出的体系结构比较了基于短期时间依赖性的四种传统预测器的结果。
{"title":"Modularized and Contract-Based Prediction Models in Programmable Networks","authors":"Michel Neves, Andre Riker, J. Nobre, A. Abelém, B. Dalmazo","doi":"10.1109/NCA57778.2022.10013517","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013517","url":null,"abstract":"Network traffic engineering aims at the network quality, optimizing routes and detecting network attacks. In this context, traffic prediction is an essential tool to capture the underlying behavior of a network. Therefore, this work proposes a modularization architecture for volumetric prediction models, allowing switching between models and setups at runtime in controllers of Software Defined Networks (SDN), dealing with short time series and delivering the data already processed for the prediction. The proposed architecture compares the results from four traditional predictors based on short-range time dependency.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application 蓝牙点对点位置认证与游戏化移动应用程序
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013607
Ricardo Grade, Samih Eisa, M. Pardal
Nowadays, tourists turn to digital platforms to discover new places to explore. CROSS City is a smart tourism mobile application that enhances the user experience of tourists visiting points of interest in a route by rewarding them in the end, if they actually visited all locations. From a technical standpoint, the user location is certified resorting to strategies that take advantage of both the diversity of the existing Wi-Fi network infrastructure throughout the city, as well as the presence of other users at the same site using Bluetooth. This work developed a new, peer-to-peer location certification strategy and added gamification elements to encourage users to keep the wireless radios turned on and use the app more. This work was evaluated both in laboratory experiments and with users in a real-world scenario which demonstrated that the new Bluetooth peer-based strategy is both feasible and resistant to collusion attacks.
如今,游客们转向数字平台来发现新的地方进行探索。CROSS City是一款智能旅游手机应用程序,如果游客参观了所有景点,最终会得到奖励,从而增强他们在游览路线中感兴趣的景点时的用户体验。从技术角度来看,用户位置认证采用的策略既利用了整个城市现有Wi-Fi网络基础设施的多样性,也利用了同一站点使用蓝牙的其他用户的存在。这项工作开发了一种新的点对点位置认证策略,并增加了游戏化元素,以鼓励用户保持无线收音机打开并更多地使用该应用程序。这项工作在实验室实验和现实世界场景中的用户中进行了评估,证明了新的基于对等的蓝牙策略既可行又能抵抗共谋攻击。
{"title":"Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application","authors":"Ricardo Grade, Samih Eisa, M. Pardal","doi":"10.1109/NCA57778.2022.10013607","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013607","url":null,"abstract":"Nowadays, tourists turn to digital platforms to discover new places to explore. CROSS City is a smart tourism mobile application that enhances the user experience of tourists visiting points of interest in a route by rewarding them in the end, if they actually visited all locations. From a technical standpoint, the user location is certified resorting to strategies that take advantage of both the diversity of the existing Wi-Fi network infrastructure throughout the city, as well as the presence of other users at the same site using Bluetooth. This work developed a new, peer-to-peer location certification strategy and added gamification elements to encourage users to keep the wireless radios turned on and use the app more. This work was evaluated both in laboratory experiments and with users in a real-world scenario which demonstrated that the new Bluetooth peer-based strategy is both feasible and resistant to collusion attacks.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Machine Learning-based anomaly detectors for Controller Area Network 基于机器学习的控制器局域网异常检测器比较
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013527
A. Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti
This paper presents a comparative analysis of different Machine Learning-based detection algorithms designed for Controller Area Network (CAN) communication on three different datasets. This work focuses on addressing the current limitations of related scientific literature, related to the quality of the publicly available datasets and to the lack of public implementations of the detection solutions presented in literature. Since these issues are preventing the reproducibility of published results and their comparison with novel detection solutions, we remark that it is necessary that all security researchers working in this field start to address them properly to advance the current state-of-the-art in CAN intrusion detection systems. This paper strives to solve these issues by presenting a comparison of existing works on publicly available datasets.
本文对三种不同数据集的控制器局域网(CAN)通信设计的基于机器学习的检测算法进行了比较分析。这项工作的重点是解决当前相关科学文献的局限性,这些局限性与公开可用数据集的质量有关,也与文献中提出的检测解决方案缺乏公开实施有关。由于这些问题阻碍了已发表结果的可重复性及其与新检测解决方案的比较,我们注意到,所有在该领域工作的安全研究人员都有必要开始适当地解决这些问题,以推进CAN入侵检测系统的当前最先进水平。本文通过对公开数据集上的现有作品进行比较,努力解决这些问题。
{"title":"Comparison of Machine Learning-based anomaly detectors for Controller Area Network","authors":"A. Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti","doi":"10.1109/NCA57778.2022.10013527","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013527","url":null,"abstract":"This paper presents a comparative analysis of different Machine Learning-based detection algorithms designed for Controller Area Network (CAN) communication on three different datasets. This work focuses on addressing the current limitations of related scientific literature, related to the quality of the publicly available datasets and to the lack of public implementations of the detection solutions presented in literature. Since these issues are preventing the reproducibility of published results and their comparison with novel detection solutions, we remark that it is necessary that all security researchers working in this field start to address them properly to advance the current state-of-the-art in CAN intrusion detection systems. This paper strives to solve these issues by presenting a comparison of existing works on publicly available datasets.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WebDHT: browser-compatible distributed hash table for decentralized Web applications WebDHT:用于分散Web应用程序的浏览器兼容分布式哈希表
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013537
L. Rossi, Luca Ferretti
Modern browser technologies allow running highly portable and usable complex applications. However, the inability to access all the operating system features may limit their features or performance when compared to native software in certain scenarios. We investigate the design of peer-to-peer (P2P) networks of interconnected browsers to improve applications interconnecting users, such as videotelephony, messaging and gaming. Although peer-to-peer protocols are well-established in the literature, known designs and implementations cannot be executed on browsers due to constraints of browser environments. We propose WebDHT, a webassembly library for creating P2P networks among browsers which offers topic-based peer-discovery features and integrates usable identity authentication mechanisms. WebDHT implements a variant of the Kademlia protocol based on distributed hash tables (DHT) adapted to support WebRTC protocol. WebDHT requires a native server to be available only for network bootstrap, but leverages existing browsers connected to the DHT to decentralize WebRTC signaling backends. We propose an open-source implementation and two demonstrative applications for users messaging and multimedia streaming, and analyze limitations and future work for designing better browser-compatible P2P networks.
现代浏览器技术允许运行高度可移植和可用的复杂应用程序。但是,在某些情况下,与本机软件相比,无法访问所有操作系统功能可能会限制其功能或性能。我们研究了互连浏览器的点对点(P2P)网络的设计,以改进互连用户的应用程序,如视频电话,消息传递和游戏。虽然点对点协议在文献中已经建立,但由于浏览器环境的限制,已知的设计和实现无法在浏览器上执行。我们提出WebDHT,一个用于在浏览器之间创建P2P网络的webassembly库,它提供了基于主题的对等发现功能并集成了可用的身份认证机制。WebDHT实现了一种基于分布式哈希表(DHT)的Kademlia协议的变体,以支持webbrtc协议。WebDHT要求本机服务器仅用于网络引导,但利用连接到DHT的现有浏览器去中心化webbrtc信令后端。我们提出了一个开源实现和两个演示应用,用于用户消息传递和多媒体流,并分析了设计更好的浏览器兼容的P2P网络的限制和未来的工作。
{"title":"WebDHT: browser-compatible distributed hash table for decentralized Web applications","authors":"L. Rossi, Luca Ferretti","doi":"10.1109/NCA57778.2022.10013537","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013537","url":null,"abstract":"Modern browser technologies allow running highly portable and usable complex applications. However, the inability to access all the operating system features may limit their features or performance when compared to native software in certain scenarios. We investigate the design of peer-to-peer (P2P) networks of interconnected browsers to improve applications interconnecting users, such as videotelephony, messaging and gaming. Although peer-to-peer protocols are well-established in the literature, known designs and implementations cannot be executed on browsers due to constraints of browser environments. We propose WebDHT, a webassembly library for creating P2P networks among browsers which offers topic-based peer-discovery features and integrates usable identity authentication mechanisms. WebDHT implements a variant of the Kademlia protocol based on distributed hash tables (DHT) adapted to support WebRTC protocol. WebDHT requires a native server to be available only for network bootstrap, but leverages existing browsers connected to the DHT to decentralize WebRTC signaling backends. We propose an open-source implementation and two demonstrative applications for users messaging and multimedia streaming, and analyze limitations and future work for designing better browser-compatible P2P networks.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125633426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1