首页 > 最新文献

2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)最新文献

英文 中文
Reference Architectures and Standards for the Internet of Things and Big Data in Smart Manufacturing 智能制造中物联网和大数据的参考架构和标准
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00041
Perin Ünal
This study aims to identify the main Internet of Things and big data reference architectures (RAs) available for the manufacturing industry. Besides open RAs developed by national and international consortia, proprietary RAs and frameworks are also discussed. The main building blocks of RAs are governed by viewpoints finding their root in systems and software engineering literature and standards. However, in most RAs, only technical viewpoints are addressed, and business architecture and customer context aspects are usually missing. In this paper, RAs are discussed in terms of their functionality and viewpoints addressed. Additionally, the standards developed by international and European institutions to complement RAs in the manufacturing industry are identified and presented. The RAs, standards and underlying models given can be useful for system architects, service providers, and other users as a guideline in the digital transformation of industry.
本研究旨在确定可用于制造业的主要物联网和大数据参考架构(RAs)。除了由国内和国际联盟开发的开放式RAs之外,还讨论了专有RAs和框架。RAs的主要构建块由在系统和软件工程文献和标准中找到根源的视点来管理。然而,在大多数ra中,只处理技术观点,而通常缺少业务体系结构和客户上下文方面。在本文中,将根据ra的功能和观点进行讨论。此外,确定并介绍了国际和欧洲机构制定的标准,以补充制造业的RAs。本文给出的ra、标准和底层模型对于系统架构师、服务提供者和其他用户来说,可以作为行业数字化转换的指导方针。
{"title":"Reference Architectures and Standards for the Internet of Things and Big Data in Smart Manufacturing","authors":"Perin Ünal","doi":"10.1109/FiCloud.2019.00041","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00041","url":null,"abstract":"This study aims to identify the main Internet of Things and big data reference architectures (RAs) available for the manufacturing industry. Besides open RAs developed by national and international consortia, proprietary RAs and frameworks are also discussed. The main building blocks of RAs are governed by viewpoints finding their root in systems and software engineering literature and standards. However, in most RAs, only technical viewpoints are addressed, and business architecture and customer context aspects are usually missing. In this paper, RAs are discussed in terms of their functionality and viewpoints addressed. Additionally, the standards developed by international and European institutions to complement RAs in the manufacturing industry are identified and presented. The RAs, standards and underlying models given can be useful for system architects, service providers, and other users as a guideline in the digital transformation of industry.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116552054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Trading of Cloud of Things Resources 物云资源的自适应交易
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00030
Ahmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi
Cloud of Things (CoT) consists of heterogeneous Cloud and Internet of Things (IoT) resources. CoT increasingly requires adaptive run-time management due to the CoT dynamism, environmental uncertainties and unpredictable changes in IoT resources. Adapting to these changes benefits particularly trading of CoT resources where the adaptability of traded resources and applications remains a challenge. Run-time changes in CoT trading environments can impact vital aspects including resource allocation, resource utilisation and application performance. This paper adopts monitoring, analysis, planning and execution (MAPE) model from autonomic computing to support adaptations when trading CoT resources. This is achieved by applying the MAPE model to systematically capture and identify changes in CoT environment. Based on the identified adaptations, an adaptive model is proposed to react to these changes.
物联网云(CoT)由异构云和物联网(IoT)资源组成。由于CoT的动态性、环境的不确定性和物联网资源的不可预测变化,CoT越来越需要自适应运行时管理。适应这些变化尤其有利于CoT资源的交易,因为交易资源和应用程序的适应性仍然是一个挑战。CoT交易环境中的运行时更改会影响重要方面,包括资源分配、资源利用和应用程序性能。本文采用自主计算的监测、分析、计划和执行(MAPE)模型来支持交易CoT资源时的适应性。这是通过应用MAPE模型来系统地捕获和识别CoT环境中的变化来实现的。在此基础上,提出了一种适应模型来应对这些变化。
{"title":"Adaptive Trading of Cloud of Things Resources","authors":"Ahmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi","doi":"10.1109/FiCloud.2019.00030","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00030","url":null,"abstract":"Cloud of Things (CoT) consists of heterogeneous Cloud and Internet of Things (IoT) resources. CoT increasingly requires adaptive run-time management due to the CoT dynamism, environmental uncertainties and unpredictable changes in IoT resources. Adapting to these changes benefits particularly trading of CoT resources where the adaptability of traded resources and applications remains a challenge. Run-time changes in CoT trading environments can impact vital aspects including resource allocation, resource utilisation and application performance. This paper adopts monitoring, analysis, planning and execution (MAPE) model from autonomic computing to support adaptations when trading CoT resources. This is achieved by applying the MAPE model to systematically capture and identify changes in CoT environment. Based on the identified adaptations, an adaptive model is proposed to react to these changes.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"547 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Quality Video Traffic Ateb-Forecasting and Fuzzy Logic Management 高质量视频流量预测与模糊逻辑管理
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00051
I. Dronyuk, O. Fedevych, N. Kryvinska
The method for real time high quality video traffic management based on the fuzzy triangular numbers is proposed. Four types of high quality video traffic are investigated. The mathematical model for traffic simulation and prediction with differential equations is created. Solution is obtained using Ateb-functions. The triangular fuzzy numbers matrix based on prediction results is constructed. The matrix is used for optimal control and management in telecommunication network with quality of service criteria. Also influence of traffic self-similarity is discussed.
提出了一种基于模糊三角数的实时高质量视频流量管理方法。研究了四种类型的高质量视频流量。建立了基于微分方程的交通仿真与预测数学模型。通过ateb函数求解。根据预测结果构造三角模糊数矩阵。该矩阵用于具有服务质量标准的电信网络的最优控制和管理。讨论了交通自相似度的影响。
{"title":"High Quality Video Traffic Ateb-Forecasting and Fuzzy Logic Management","authors":"I. Dronyuk, O. Fedevych, N. Kryvinska","doi":"10.1109/FiCloud.2019.00051","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00051","url":null,"abstract":"The method for real time high quality video traffic management based on the fuzzy triangular numbers is proposed. Four types of high quality video traffic are investigated. The mathematical model for traffic simulation and prediction with differential equations is created. Solution is obtained using Ateb-functions. The triangular fuzzy numbers matrix based on prediction results is constructed. The matrix is used for optimal control and management in telecommunication network with quality of service criteria. Also influence of traffic self-similarity is discussed.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124918686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT and Microservice Architecture for Multimobility in a Smart City 智慧城市中多出行的物联网和微服务架构
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00040
Cristian Lai, Francesco Boi, Alberto Buschettu, Renato Caboni
In this paper, we will illustrate how microservice architectures can be adopted to build Internet of Things services for multimobility in a smart city. Traditional centralized architectures are built as monolithic solutions, which lack the flexibility required to deal with heterogeneous devices efficiently. Microservice architectures implement small features bounded within a running process; independent microservices can be deployed separately in a distributed system. We have proposed a draft of architecture for general-purpose Internet of Things applications. Thanks to the choice of the microservice paradigm, the architecture is capable of interfacing with a wide range of heterogeneous IoT devices while implementing scalability by design. On this basis, a web application has been developed bearing in mind a set of real case scenarios mobility services for citizens multimobility in a smart city.
在本文中,我们将说明如何采用微服务架构来构建智能城市中多出行的物联网服务。传统的集中式架构是作为整体解决方案构建的,缺乏有效处理异构设备所需的灵活性。微服务架构实现了一个运行过程中的小特性;独立的微服务可以单独部署在分布式系统中。我们提出了一个通用物联网应用的架构草案。由于选择了微服务范式,该架构能够与各种异构物联网设备接口,同时通过设计实现可扩展性。在此基础上,开发了一个web应用程序,该应用程序考虑了智能城市中公民多重移动出行的一组真实案例场景。
{"title":"IoT and Microservice Architecture for Multimobility in a Smart City","authors":"Cristian Lai, Francesco Boi, Alberto Buschettu, Renato Caboni","doi":"10.1109/FiCloud.2019.00040","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00040","url":null,"abstract":"In this paper, we will illustrate how microservice architectures can be adopted to build Internet of Things services for multimobility in a smart city. Traditional centralized architectures are built as monolithic solutions, which lack the flexibility required to deal with heterogeneous devices efficiently. Microservice architectures implement small features bounded within a running process; independent microservices can be deployed separately in a distributed system. We have proposed a draft of architecture for general-purpose Internet of Things applications. Thanks to the choice of the microservice paradigm, the architecture is capable of interfacing with a wide range of heterogeneous IoT devices while implementing scalability by design. On this basis, a web application has been developed bearing in mind a set of real case scenarios mobility services for citizens multimobility in a smart city.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Framework for Distributed Denial of Service Attack Detection and Reactive Countermeasure in Software Defined Network 软件定义网络中分布式拒绝服务攻击检测与响应对策框架
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00019
A. Sangodoyin, Bashir Mohammed, S. Moyo, I. Awan, Jules Pagna Disso
Software Defined Network is an evolving and promising architecture which allows greater control over network entities by centralising the control plane. Although on the surface SDN provides a simple framework for network programmability and monitoring, few has been said about security measures to make it more robust to hitherto security flaws. Among the identified security flaws, DDoS flooding attack continue to be one of the major security concerns as attack volumes are increasing year on year. In this paper, we developed and implement the feasibility of spoofing and flooding DDoS attack on data plane devices using Mininet emulator, floodlight and network performance testing tools. We further developed a mitigation mechanism to counter these attacks by pushing reactive flow through the controller to the attacking switch port. Our result shows that pushing flows through the controller mitigates the flooding attack with low performance overheads, and requires no change to the controllers mode of operation for deployment, which indicates a good performance of our model.
软件定义网络是一个不断发展和有前途的体系结构,它允许通过集中控制平面对网络实体进行更好的控制。尽管表面上SDN为网络可编程性和监控提供了一个简单的框架,但很少有人说要采取安全措施使其更健壮,以应对迄今为止的安全漏洞。在已发现的安全漏洞中,DDoS洪水攻击仍然是主要的安全问题之一,因为攻击量逐年增加。在本文中,我们利用Mininet仿真器、泛光灯和网络性能测试工具开发并实现了对数据平面设备进行欺骗和泛洪DDoS攻击的可行性。我们进一步开发了一种缓解机制,通过将反应流从控制器推送到攻击交换机端口来对抗这些攻击。我们的结果表明,通过控制器推送流以较低的性能开销减轻了洪水攻击,并且不需要改变控制器的部署操作模式,这表明我们的模型具有良好的性能。
{"title":"A Framework for Distributed Denial of Service Attack Detection and Reactive Countermeasure in Software Defined Network","authors":"A. Sangodoyin, Bashir Mohammed, S. Moyo, I. Awan, Jules Pagna Disso","doi":"10.1109/FiCloud.2019.00019","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00019","url":null,"abstract":"Software Defined Network is an evolving and promising architecture which allows greater control over network entities by centralising the control plane. Although on the surface SDN provides a simple framework for network programmability and monitoring, few has been said about security measures to make it more robust to hitherto security flaws. Among the identified security flaws, DDoS flooding attack continue to be one of the major security concerns as attack volumes are increasing year on year. In this paper, we developed and implement the feasibility of spoofing and flooding DDoS attack on data plane devices using Mininet emulator, floodlight and network performance testing tools. We further developed a mitigation mechanism to counter these attacks by pushing reactive flow through the controller to the attacking switch port. Our result shows that pushing flows through the controller mitigates the flooding attack with low performance overheads, and requires no change to the controllers mode of operation for deployment, which indicates a good performance of our model.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114631282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wake-Up Radio Systems for Cooperative-Intelligent Transport Systems Architecture 协同智能交通系统架构的唤醒无线电系统
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00059
J. Casademont, Elena López-Aguilera, J. Aspas
Cooperative-Intelligent Transport systems are new applications developed on top of communications between vehicles and between vehicles and fixed infrastructure. Their architecture envisages devices deployed along the routes and streets, transmitting and receiving different kind of messages belonging to different services. Quite often, these devices will be located in isolated places with very low number of vehicles passing nearby. Being in isolated places, these devices will require to be feed with rechargeable batteries and alternative power sources, the usage of which need to be very efficient. The fact of continuously transmitting messages whenever there is no vehicle to receive them demands a solution. In this paper, we propose to use a well-known saving power strategy already used in Internet of Things, the Wake-up Radio systems. As vehicular communications are based on IEEE 802.11 standard, we propose to use a Wake-up Radio system based on this standard as well, being thus no additional hardware needed for the wake-up transmitter. The paper analyses the feasibility of using this solution on several vehicular applications.
协作智能交通系统是基于车辆之间以及车辆与固定基础设施之间的通信而开发的新应用。他们的架构设想沿着路线和街道部署设备,发送和接收属于不同服务的不同类型的消息。通常情况下,这些设备将位于附近车辆数量很少的孤立地方。在偏远的地方,这些设备将需要充电电池和替代电源,它们的使用需要非常有效。在没有车辆接收消息的情况下持续传输消息的事实需要一个解决方案。在本文中,我们提出了一种众所周知的节电策略,已经在物联网中使用,唤醒无线电系统。由于车载通信基于IEEE 802.11标准,我们建议使用基于该标准的唤醒无线电系统,因此唤醒发射器不需要额外的硬件。文中分析了该方案在几种车载应用中的可行性。
{"title":"Wake-Up Radio Systems for Cooperative-Intelligent Transport Systems Architecture","authors":"J. Casademont, Elena López-Aguilera, J. Aspas","doi":"10.1109/FiCloud.2019.00059","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00059","url":null,"abstract":"Cooperative-Intelligent Transport systems are new applications developed on top of communications between vehicles and between vehicles and fixed infrastructure. Their architecture envisages devices deployed along the routes and streets, transmitting and receiving different kind of messages belonging to different services. Quite often, these devices will be located in isolated places with very low number of vehicles passing nearby. Being in isolated places, these devices will require to be feed with rechargeable batteries and alternative power sources, the usage of which need to be very efficient. The fact of continuously transmitting messages whenever there is no vehicle to receive them demands a solution. In this paper, we propose to use a well-known saving power strategy already used in Internet of Things, the Wake-up Radio systems. As vehicular communications are based on IEEE 802.11 standard, we propose to use a Wake-up Radio system based on this standard as well, being thus no additional hardware needed for the wake-up transmitter. The paper analyses the feasibility of using this solution on several vehicular applications.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131312413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utilizing 5G in Industrial Robotic Applications 在工业机器人应用中利用5G
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00046
M. Aleksy, F. Dai, Nima Enayati, P. Rost, Guillermo Pocovi
Sensor-based real-time control is being used in robotics for different purposes. The trend is to develop intelligent robots that can understand and react on environmental situations. This leads to the integration of more complex algorithms and involving multiple sensors and mobile assets for a more flexible and intelligent motion control. The requirement on computing power becomes often higher than it could be performed on the robot controller itself. Using an external computer introduces, nowadays, significant communication delays that make real-time control difficult or even impossible. Furthermore, to integrate mobile assets in a motion control scenario wired communication cannot be employed. A 5G network / local factory cloud may bridge this gap. In this paper we describe why 5G technology can make a significant contribution to enable new types of industrial robotics applications. Moreover, we present various use cases and discuss simulation results of a 5G-based robotics application in an industrial environment.
基于传感器的实时控制在机器人中被用于不同的目的。目前的趋势是开发能够理解环境情况并对其做出反应的智能机器人。这导致集成更复杂的算法,涉及多个传感器和移动资产,以实现更灵活和智能的运动控制。对计算能力的要求往往比机器人控制器本身所能执行的要高。如今,使用外部计算机引入了显著的通信延迟,使实时控制变得困难甚至不可能。此外,为了在运动控制场景中集成移动资产,不能采用有线通信。5G网络/本地工厂云可能会弥合这一差距。在本文中,我们描述了为什么5G技术可以为实现新型工业机器人应用做出重大贡献。此外,我们提出了各种用例,并讨论了在工业环境中基于5g的机器人应用的仿真结果。
{"title":"Utilizing 5G in Industrial Robotic Applications","authors":"M. Aleksy, F. Dai, Nima Enayati, P. Rost, Guillermo Pocovi","doi":"10.1109/FiCloud.2019.00046","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00046","url":null,"abstract":"Sensor-based real-time control is being used in robotics for different purposes. The trend is to develop intelligent robots that can understand and react on environmental situations. This leads to the integration of more complex algorithms and involving multiple sensors and mobile assets for a more flexible and intelligent motion control. The requirement on computing power becomes often higher than it could be performed on the robot controller itself. Using an external computer introduces, nowadays, significant communication delays that make real-time control difficult or even impossible. Furthermore, to integrate mobile assets in a motion control scenario wired communication cannot be employed. A 5G network / local factory cloud may bridge this gap. In this paper we describe why 5G technology can make a significant contribution to enable new types of industrial robotics applications. Moreover, we present various use cases and discuss simulation results of a 5G-based robotics application in an industrial environment.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Distributed Network Behaviour Prediction Using Machine Learning and Agent-Based Micro Simulation 基于机器学习和agent的分布式网络行为预测
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00033
O. Makinde, A. Sangodoyin, Bashir Mohammed, D. Neagu, Umaru Adamu
Distributed network behaviour is increasingly attracting huge attention both in academics and industrial initiatives, and most recently machine learning has been used in every possible field, leveraging its advantages.Typically, a distributed networking allows for the execution of distributed applications which results in complex behaviours among connected systems. This complexity in itself can create grey areas and vulnerabilities in the securities of these networks, therefore predicting the behaviour of these systems both at the macro and micro level has become essential. In the past most researchers have predicted network behaviour and network attack patterns by using aggregated data, but in this paper we focus on the application of machine learning at the individual user level such that the prediction of the individual network user behaviour pattern at the micro level becomes a substasive tool in creating a realistic agent based simulation of the whole distributed network, which in turn can serve as a test bed for predicting what-if scenarios such as network attacks on the target system or exposing vulnerabilities within the target system. The simulation result was validated by comparing the simulated interaction within the simulated network to the data logged in the server logs within the real life network system. This produced a correlation above 0.8, indicating a realistic model.
分布式网络行为在学术界和工业界都越来越受到关注,最近机器学习利用其优势被应用于每个可能的领域。通常,分布式网络允许执行分布式应用程序,从而在连接的系统之间产生复杂的行为。这种复杂性本身就会在这些网络的安全性中产生灰色地带和漏洞,因此在宏观和微观层面预测这些系统的行为变得至关重要。在过去,大多数研究人员通过使用聚合数据来预测网络行为和网络攻击模式,但在本文中,我们将重点放在机器学习在个人用户层面的应用上,这样,在微观层面上对个人网络用户行为模式的预测就成为了创建基于智能体的真实的整个分布式网络模拟的实质性工具。这反过来又可以作为一个测试平台,用于预测诸如对目标系统的网络攻击或在目标系统中暴露漏洞之类的假设场景。通过将模拟网络中的模拟交互与实际网络系统中服务器日志中记录的数据进行比较,验证了仿真结果。这产生了高于0.8的相关性,表明这是一个现实的模型。
{"title":"Distributed Network Behaviour Prediction Using Machine Learning and Agent-Based Micro Simulation","authors":"O. Makinde, A. Sangodoyin, Bashir Mohammed, D. Neagu, Umaru Adamu","doi":"10.1109/FiCloud.2019.00033","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00033","url":null,"abstract":"Distributed network behaviour is increasingly attracting huge attention both in academics and industrial initiatives, and most recently machine learning has been used in every possible field, leveraging its advantages.Typically, a distributed networking allows for the execution of distributed applications which results in complex behaviours among connected systems. This complexity in itself can create grey areas and vulnerabilities in the securities of these networks, therefore predicting the behaviour of these systems both at the macro and micro level has become essential. In the past most researchers have predicted network behaviour and network attack patterns by using aggregated data, but in this paper we focus on the application of machine learning at the individual user level such that the prediction of the individual network user behaviour pattern at the micro level becomes a substasive tool in creating a realistic agent based simulation of the whole distributed network, which in turn can serve as a test bed for predicting what-if scenarios such as network attacks on the target system or exposing vulnerabilities within the target system. The simulation result was validated by comparing the simulated interaction within the simulated network to the data logged in the server logs within the real life network system. This produced a correlation above 0.8, indicating a realistic model.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115963760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-layer Approach to Internet of Things (IoT) Security 物联网(IoT)安全的多层方法
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00023
Yusuf Muhammad Tukur, D. Thakker, I. Awan
The Internet of Things (IoT) is a huge, global, distributed network of interlinked heterogeneous devices armed with embedded sensors, actuators and processors enabling them to connect to the internet, exchange data, communicate and interact seamlessly with one another in real time. It enjoys wide range of applications where it holds important data, hence becoming exposed to varying degrees of security and privacy threats which require careful architectural design to address. Consequently, we present in this paper a multi-layer security aware IoT architecture that aims to secure the entire system by providing security at all layers to ensure secure data collection, transfer, analysis, storage and usage. That is necessary because each layer of the IoT has vulnerabilities and a successful attack on any layer can have far-reaching impact on the whole system. We then proposed a novel security algorithm to protect the IoT system against Denial of Service (DoS) attacks at the application layer, the weakest link in IoT. The algorithm logs record of user activities and actions at given times of the day which it employs to regulate access and prevent DoS attacks. Finally, we evaluated our proposed approach against IoT security and privacy requirements, and it demonstrated better level of security.
物联网(IoT)是一个巨大的、全球性的分布式网络,由相互连接的异构设备组成,这些设备配备了嵌入式传感器、执行器和处理器,使它们能够实时连接到互联网、交换数据、通信和相互无缝交互。它拥有广泛的应用程序,其中包含重要数据,因此暴露于不同程度的安全和隐私威胁,需要仔细的架构设计来解决。因此,我们在本文中提出了一个多层安全意识的物联网架构,旨在通过在所有层提供安全性来确保整个系统的安全,以确保安全的数据收集,传输,分析,存储和使用。这是必要的,因为物联网的每一层都有漏洞,对任何一层的成功攻击都可能对整个系统产生深远的影响。然后,我们提出了一种新的安全算法,以保护物联网系统免受应用层(物联网中最薄弱的环节)的拒绝服务(DoS)攻击。该算法记录了用户在一天中给定时间的活动和操作记录,用于规范访问和防止DoS攻击。最后,我们根据物联网安全和隐私要求评估了我们提出的方法,并证明了更好的安全水平。
{"title":"Multi-layer Approach to Internet of Things (IoT) Security","authors":"Yusuf Muhammad Tukur, D. Thakker, I. Awan","doi":"10.1109/FiCloud.2019.00023","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00023","url":null,"abstract":"The Internet of Things (IoT) is a huge, global, distributed network of interlinked heterogeneous devices armed with embedded sensors, actuators and processors enabling them to connect to the internet, exchange data, communicate and interact seamlessly with one another in real time. It enjoys wide range of applications where it holds important data, hence becoming exposed to varying degrees of security and privacy threats which require careful architectural design to address. Consequently, we present in this paper a multi-layer security aware IoT architecture that aims to secure the entire system by providing security at all layers to ensure secure data collection, transfer, analysis, storage and usage. That is necessary because each layer of the IoT has vulnerabilities and a successful attack on any layer can have far-reaching impact on the whole system. We then proposed a novel security algorithm to protect the IoT system against Denial of Service (DoS) attacks at the application layer, the weakest link in IoT. The algorithm logs record of user activities and actions at given times of the day which it employs to regulate access and prevent DoS attacks. Finally, we evaluated our proposed approach against IoT security and privacy requirements, and it demonstrated better level of security.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125332275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MAS5G: Move Around Smartly in 5G MAS5G:在5G中灵活移动
Pub Date : 2019-08-01 DOI: 10.1109/FiCloud.2019.00037
Shylendra Kumar, Rahul Banerji, Naman Gupta, Suman Kumar, Sukhdeep Singh, Avinash Bhat, Seungil Yoon, Shatarupa Dash
5th Generation (5G) mobile networks is anticipated to serve large number of devices with multiple services in the single network. Due to heterogeneous service demand in a single network, 5G is presumed to be service based amalgamated with network slicing. The network will create a dedicated slice with dedicated resources and network elements based on the requested service. With so many devices and services under one umbrella of 5G, mobility becomes one of the crucial aspect, which can further have lot of impact on 5G NR (New Radio) requirements such as, radio resource optimization, seamless connectivity, minimal handovers and Quality of Experience (QoE). MAS5G (Move Smartly in 5G) explores the avenues of mobility management, wherein we consider three main services of 5G i.e. (1) enhanced Mobile Broadband (eMBB), (2) Ultra Reliable Low Latency Communications (URLLC) and (3) massive Machine Type Communications (mMTC). Unlike considering single mobility policy for all type of services (in the current networks), we propose MAS5G Central Mobility Manager (CMM), which will create dedicated schema for each service based on the network slice. With the help of User Equipment (UE) capability if network slice subscribed by subscriber is having skewed features and mobility requirement, MAS5G CMM creates schema as per the requirements of a particular network slice. It can help Access and Mobility Management Function (AMF) to provide dedicated attributes of Access and Mobility applied to devices based on predefined schemas. Through our simulation experiment, based on real time mMTC and eMBB traffic traces, we show that MAS5G is able to curtail the number of handovers, thus, saving the energy at UE significantly, which further helps to boost the QoE.
第五代(5G)移动网络预计将在单个网络中为大量设备提供多种服务。由于单个网络的业务需求是异构的,因此5G被认为是基于业务和网络切片的融合。网络将根据请求的服务创建一个包含专用资源和网络元素的专用切片。由于5G拥有如此多的设备和服务,移动性成为关键方面之一,这可能进一步对5G NR(新无线电)需求产生很大影响,例如无线电资源优化、无缝连接、最小切换和体验质量(QoE)。MAS5G (Move smart in 5G)探索了移动管理的途径,其中我们考虑了5G的三种主要服务,即(1)增强型移动宽带(eMBB),(2)超可靠低延迟通信(URLLC)和(3)大规模机器类型通信(mMTC)。与考虑所有类型服务(在当前网络中)的单一移动策略不同,我们提出MAS5G中央移动管理器(CMM),它将基于网络片为每个服务创建专用模式。如果用户订阅的网络片具有倾斜的特性和移动性需求,MAS5G CMM可以根据特定网络片的需求创建模式。它可以帮助AMF (Access and Mobility Management Function)根据预定义的模式提供应用于设备的Access和Mobility的专用属性。通过我们的仿真实验,基于实时mMTC和eMBB流量轨迹,我们表明MAS5G能够减少切换次数,从而显着节省UE的能量,从而进一步有助于提高QoE。
{"title":"MAS5G: Move Around Smartly in 5G","authors":"Shylendra Kumar, Rahul Banerji, Naman Gupta, Suman Kumar, Sukhdeep Singh, Avinash Bhat, Seungil Yoon, Shatarupa Dash","doi":"10.1109/FiCloud.2019.00037","DOIUrl":"https://doi.org/10.1109/FiCloud.2019.00037","url":null,"abstract":"5th Generation (5G) mobile networks is anticipated to serve large number of devices with multiple services in the single network. Due to heterogeneous service demand in a single network, 5G is presumed to be service based amalgamated with network slicing. The network will create a dedicated slice with dedicated resources and network elements based on the requested service. With so many devices and services under one umbrella of 5G, mobility becomes one of the crucial aspect, which can further have lot of impact on 5G NR (New Radio) requirements such as, radio resource optimization, seamless connectivity, minimal handovers and Quality of Experience (QoE). MAS5G (Move Smartly in 5G) explores the avenues of mobility management, wherein we consider three main services of 5G i.e. (1) enhanced Mobile Broadband (eMBB), (2) Ultra Reliable Low Latency Communications (URLLC) and (3) massive Machine Type Communications (mMTC). Unlike considering single mobility policy for all type of services (in the current networks), we propose MAS5G Central Mobility Manager (CMM), which will create dedicated schema for each service based on the network slice. With the help of User Equipment (UE) capability if network slice subscribed by subscriber is having skewed features and mobility requirement, MAS5G CMM creates schema as per the requirements of a particular network slice. It can help Access and Mobility Management Function (AMF) to provide dedicated attributes of Access and Mobility applied to devices based on predefined schemas. Through our simulation experiment, based on real time mMTC and eMBB traffic traces, we show that MAS5G is able to curtail the number of handovers, thus, saving the energy at UE significantly, which further helps to boost the QoE.","PeriodicalId":268882,"journal":{"name":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1