Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994409
Gianluca Verin
Guaranteed and reliable access to mobile communications is important for consumers but it is fundamental for mission-critical business applications and in disaster recovery scenarios. During emergencies and events that gather many people in the same place, mobile networks typically become congested or even unavailable. Technologies such as WiFi, that operate on an unlicensed frequency spectrum, are affected by congestion and are susceptible to external interference that can make the technology unusable. Licensed frequencies are not subjected to interference but current solutions based on trasportable base stations (e.g. cells-on-wheels) that are dependent on backhaul connectivity cannot adequately serve the needs of mission critical communications. Mobile operator networks lack disaster recovery and congestion control mechanisms that allow the system to work even in case of a failure of key backhaul network links. Instead a private mobile network based on the latest cellular technology can deliver IP connectivity efficiently during emergencies, events and in general for mission critical communications. This demo shows how a private LTE network can offer privileged access to voice and video services for enterprise and government using standardized cellular technology.
{"title":"Demonstration of an LTE portable network for private and emergency use - Introducing a fully distributed LTE network architecture","authors":"Gianluca Verin","doi":"10.1109/CCNC.2014.6994409","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994409","url":null,"abstract":"Guaranteed and reliable access to mobile communications is important for consumers but it is fundamental for mission-critical business applications and in disaster recovery scenarios. During emergencies and events that gather many people in the same place, mobile networks typically become congested or even unavailable. Technologies such as WiFi, that operate on an unlicensed frequency spectrum, are affected by congestion and are susceptible to external interference that can make the technology unusable. Licensed frequencies are not subjected to interference but current solutions based on trasportable base stations (e.g. cells-on-wheels) that are dependent on backhaul connectivity cannot adequately serve the needs of mission critical communications. Mobile operator networks lack disaster recovery and congestion control mechanisms that allow the system to work even in case of a failure of key backhaul network links. Instead a private mobile network based on the latest cellular technology can deliver IP connectivity efficiently during emergencies, events and in general for mission critical communications. This demo shows how a private LTE network can offer privileged access to voice and video services for enterprise and government using standardized cellular technology.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994390
Sanghong An, Hyeontaek Oh, Sangmin Park, Jinhong Yang, Jun Choi
Browser-based Web content sharing system is designed for users to share and distribute what they're watching Web contents to other users or system via Web browser. The demonstration will show the novel method to distribute partial Web contents on browsers to other screens in Web browsing environment, especially for e-learning situations.
{"title":"Browser-based web content sharing system","authors":"Sanghong An, Hyeontaek Oh, Sangmin Park, Jinhong Yang, Jun Choi","doi":"10.1109/CCNC.2014.6994390","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994390","url":null,"abstract":"Browser-based Web content sharing system is designed for users to share and distribute what they're watching Web contents to other users or system via Web browser. The demonstration will show the novel method to distribute partial Web contents on browsers to other screens in Web browsing environment, especially for e-learning situations.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994396
Jose Aelio de Oliveira, L. Lima, Gil Eduardo de Andrade, G. Michelon
The typical low rate of unicast message delivery in DTNs (Delay Tolerant Networks) makes this kind of network unfit for many real-world applications. However, when it is sufficient to deliver a message to at least one node within a set of multiple potential destinations - which is called anycasting - then DTN's message delivery rate become acceptable. This paper presents an adaptation of the Virtual Magnetic Fields algorithm for routing anycast messages in DTNs. The algorithm performs routing through message attraction rather than the traditional approach of message forwarding.
{"title":"Anycasting in DTNs using virtual magnetic fields","authors":"Jose Aelio de Oliveira, L. Lima, Gil Eduardo de Andrade, G. Michelon","doi":"10.1109/CCNC.2014.6994396","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994396","url":null,"abstract":"The typical low rate of unicast message delivery in DTNs (Delay Tolerant Networks) makes this kind of network unfit for many real-world applications. However, when it is sufficient to deliver a message to at least one node within a set of multiple potential destinations - which is called anycasting - then DTN's message delivery rate become acceptable. This paper presents an adaptation of the Virtual Magnetic Fields algorithm for routing anycast messages in DTNs. The algorithm performs routing through message attraction rather than the traditional approach of message forwarding.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994426
Rui-ping Lua, C. H. Wah, W. Ng
Overlay networks are vital to the continued evolution of web services and content distribution. We propose a reactive mechanism to mitigate flooding attacks in overlay networks. Our approach enhances detection and filtering capability in accordance to the size of an attack. As the DDoS traffic flow increases, we intensify detection and scrubbing in a decentralized manner. Flow resistance increases to minimize penetration and attack flows from reaching their destination. We demonstrate their effectiveness in simulations.
{"title":"Cornstarch effect: intensifying flow resistance for increasing DDoS attacks in autonomous overlays","authors":"Rui-ping Lua, C. H. Wah, W. Ng","doi":"10.1109/CCNC.2014.6994426","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994426","url":null,"abstract":"Overlay networks are vital to the continued evolution of web services and content distribution. We propose a reactive mechanism to mitigate flooding attacks in overlay networks. Our approach enhances detection and filtering capability in accordance to the size of an attack. As the DDoS traffic flow increases, we intensify detection and scrubbing in a decentralized manner. Flow resistance increases to minimize penetration and attack flows from reaching their destination. We demonstrate their effectiveness in simulations.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994405
Satoshi Takahashi, Hyunho Kang, Keiichi Iwamura
The asymmetric secret sharing scheme that we proposed at AINA2013 has a feature that reduces the required storage capacity of a specific server. This means that it can be used as the server not only for the entity of a cloud system but also for a device that is managed by a user, such as a smart phone. In this paper, first we propose a new method, which is an AINA method modified such that it is more suitable for application in a cloud system in which multiple users participate, and then, we propose an application to a life log, as an example of a specific application to which this method can be applied.
{"title":"Asymmetric secret sharing scheme suitable for cloud systems","authors":"Satoshi Takahashi, Hyunho Kang, Keiichi Iwamura","doi":"10.1109/CCNC.2014.6994405","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994405","url":null,"abstract":"The asymmetric secret sharing scheme that we proposed at AINA2013 has a feature that reduces the required storage capacity of a specific server. This means that it can be used as the server not only for the entity of a cloud system but also for a device that is managed by a user, such as a smart phone. In this paper, first we propose a new method, which is an AINA method modified such that it is more suitable for application in a cloud system in which multiple users participate, and then, we propose an application to a life log, as an example of a specific application to which this method can be applied.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994423
Haneul Ko, Younghyun Kim, Dongeun Suh, Sangheon Pack
Information-centric network (ICN) opens a new networking paradigm optimized for contents-oriented services by exploiting in-network caching and mitigating redundant transmissions. When such an ICN is deployed in mobile environments (i.e., the content provider or consumer is a mobile node), an appropriate mobility support protocol needs to be developed. Since the content consumer mobility can be tactically handled through the content consumer driven nature of ICN, the content provider mobility is investigated in this work. Specifically, we propose a proactive content pushing (PCP) scheme, in which the content provider proactively sends a set of contents that are expected to be requested in the near future to proximity ICN routers. Consequently, the PCP scheme can reduce the service disruption time owing to the content provider mobility.
{"title":"A proactive content pushing scheme for provider mobility support in information centric networks","authors":"Haneul Ko, Younghyun Kim, Dongeun Suh, Sangheon Pack","doi":"10.1109/CCNC.2014.6994423","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994423","url":null,"abstract":"Information-centric network (ICN) opens a new networking paradigm optimized for contents-oriented services by exploiting in-network caching and mitigating redundant transmissions. When such an ICN is deployed in mobile environments (i.e., the content provider or consumer is a mobile node), an appropriate mobility support protocol needs to be developed. Since the content consumer mobility can be tactically handled through the content consumer driven nature of ICN, the content provider mobility is investigated in this work. Specifically, we propose a proactive content pushing (PCP) scheme, in which the content provider proactively sends a set of contents that are expected to be requested in the near future to proximity ICN routers. Consequently, the PCP scheme can reduce the service disruption time owing to the content provider mobility.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994415
P. Urien
This demonstration shows an innovative and secure framework targeting access control in the internet of things, with NFC (Near Field Communication) enabled smartphones. NFC peer to peer communications are protected by the well known TLS protocol; services working over this stack are identified, according to NFC standards, by a name. Two use cases are presented in order to control an electronic lock. In the first one a password, is securely pushed from the mobile to the lock according to legacy NFC protocol. In the second one the key is stored in an EMV bank card plugged to a server, and is remotely checked. Parts of this framework are detailed by IETF drafts.
{"title":"A secure cloud of electronic keys for NFC locks securely controlled by NFC smartphones","authors":"P. Urien","doi":"10.1109/CCNC.2014.6994415","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994415","url":null,"abstract":"This demonstration shows an innovative and secure framework targeting access control in the internet of things, with NFC (Near Field Communication) enabled smartphones. NFC peer to peer communications are protected by the well known TLS protocol; services working over this stack are identified, according to NFC standards, by a name. Two use cases are presented in order to control an electronic lock. In the first one a password, is securely pushed from the mobile to the lock according to legacy NFC protocol. In the second one the key is stored in an EMV bank card plugged to a server, and is remotely checked. Parts of this framework are detailed by IETF drafts.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994394
S. Seo, Taehong Kim, Myeon-gwuk Jang
Content Centric Network (CCN) is one of the promising architectures for the future Internet that shifts the communication paradigm from the IP-based end-to-end to the content-centric. CCN enables users to obtain contents what they want regardless of where the contents are stored, and the contents are cached into network routers for future requests. Existing privacy-preserving approaches, like Onion routing in IP network, protect the privacy of the sender and recipient of a message as well as provide protection of contents during the traversal of a network. It is natural to prevent the intermediate routers or other nodes interpreting the contents if the contents are private such as Internet banking and shopping. But if contents are public such as YouTube video and New York Times articles, Onion routing loses chance of content caching and utilization, which is one of the main advantages of CCN. In this paper, we propose a new privacy-preserving protocol in CCN, which enables Interest aggregation and content caching which are CCN's main advantages. The experimental result shows that the proposed protocol is still able to use caching effect of CCN while providing user privacy.
{"title":"A privacy-preserving approach in content centric","authors":"S. Seo, Taehong Kim, Myeon-gwuk Jang","doi":"10.1109/CCNC.2014.6994394","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994394","url":null,"abstract":"Content Centric Network (CCN) is one of the promising architectures for the future Internet that shifts the communication paradigm from the IP-based end-to-end to the content-centric. CCN enables users to obtain contents what they want regardless of where the contents are stored, and the contents are cached into network routers for future requests. Existing privacy-preserving approaches, like Onion routing in IP network, protect the privacy of the sender and recipient of a message as well as provide protection of contents during the traversal of a network. It is natural to prevent the intermediate routers or other nodes interpreting the contents if the contents are private such as Internet banking and shopping. But if contents are public such as YouTube video and New York Times articles, Onion routing loses chance of content caching and utilization, which is one of the main advantages of CCN. In this paper, we propose a new privacy-preserving protocol in CCN, which enables Interest aggregation and content caching which are CCN's main advantages. The experimental result shows that the proposed protocol is still able to use caching effect of CCN while providing user privacy.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994403
M. Tortelli, L. Grieco, G. Boggia, Kostas Pentikousisy
Named Data Networking (NDN) is an emerging Information Centric Networking architecture based on hierarchical content names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN networking primitives and routing are based on content names and therefore efficient content discovery of permanent as well as temporarily available cached copies is a key problem to address. This paper examines current NDN approaches and proposes a fully distributed, content-driven, bloom filter-based intra-domain routing algorithm (COBRA), which outperforms previous solutions in this area. COBRA creates routes based on paths used previously for content retrieval, and maintains routing information up-to-date without the need for extensive signaling between nodes. We evaluate COBRA using simulation and compare its performance with other established routing strategies over the European research network GEANT topology as an example of a ndnSIM core network. Our results illustrate that COBRA can significantly reduce overhead with respect to flood-based routing while ensuring hit distances of the same order as when using Dijkstra's algorithm.
{"title":"COBRA: Lean intra-domain routing in NDN","authors":"M. Tortelli, L. Grieco, G. Boggia, Kostas Pentikousisy","doi":"10.1109/CCNC.2014.6994403","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994403","url":null,"abstract":"Named Data Networking (NDN) is an emerging Information Centric Networking architecture based on hierarchical content names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN networking primitives and routing are based on content names and therefore efficient content discovery of permanent as well as temporarily available cached copies is a key problem to address. This paper examines current NDN approaches and proposes a fully distributed, content-driven, bloom filter-based intra-domain routing algorithm (COBRA), which outperforms previous solutions in this area. COBRA creates routes based on paths used previously for content retrieval, and maintains routing information up-to-date without the need for extensive signaling between nodes. We evaluate COBRA using simulation and compare its performance with other established routing strategies over the European research network GEANT topology as an example of a ndnSIM core network. Our results illustrate that COBRA can significantly reduce overhead with respect to flood-based routing while ensuring hit distances of the same order as when using Dijkstra's algorithm.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940522
Quang-Dung Ho, T. Le-Ngoc
This p aper presents the design and implementation of an intelligent vital sign capture platform, namely iVS, which provides end-to-end connectivity between patient monitors and Electronic Healthcare Record (EHR) by using smartphones. By replacing manual operations with automatic machine-to-machine (M2M) communications, iVS aims to enhance reliability, save time and costs for patient's monitoring routines carried out in hospitals, clinics and emergency sites. Using advanced wireless communication technologies, it also allows medical staff to access to patient health conditions and other information (e.g., medications, prescriptions, medical treatment history, etc.) from EHR from anywhere at anytime in order to have fast and efficient responses to emergency situations. Network architecture and system design of iVS are first presented. M2M communication protocols to enable inter-operable data exchange between various system entities are explained. Theoretical maximum user data throughput that can be obtained over the Bluetooth Low Energy (BLE) communication link connecting patient monitors and smartphones is also calculated. Experiments results are also presented and discussed.
{"title":"iVS: An intelligent end-to-end vital sign capture platform using smartphones","authors":"Quang-Dung Ho, T. Le-Ngoc","doi":"10.1109/CCNC.2014.6940522","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940522","url":null,"abstract":"This p aper presents the design and implementation of an intelligent vital sign capture platform, namely iVS, which provides end-to-end connectivity between patient monitors and Electronic Healthcare Record (EHR) by using smartphones. By replacing manual operations with automatic machine-to-machine (M2M) communications, iVS aims to enhance reliability, save time and costs for patient's monitoring routines carried out in hospitals, clinics and emergency sites. Using advanced wireless communication technologies, it also allows medical staff to access to patient health conditions and other information (e.g., medications, prescriptions, medical treatment history, etc.) from EHR from anywhere at anytime in order to have fast and efficient responses to emergency situations. Network architecture and system design of iVS are first presented. M2M communication protocols to enable inter-operable data exchange between various system entities are explained. Theoretical maximum user data throughput that can be obtained over the Bluetooth Low Energy (BLE) communication link connecting patient monitors and smartphones is also calculated. Experiments results are also presented and discussed.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"113 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123124052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}