首页 > 最新文献

2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Limited Size Lossy Compression for WSNs 无线传感器网络的有限大小有损压缩
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843510
Sanku Kumar Roy, I. Nikolaidis
We consider the problem of lossy compression of time series data collected by wireless sensor nodes, such that it produces a limited volume of compressed data for a given amount of raw data. The lossy compression is performed in a manner that minimizes the resulting L∞ reconstruction error. Producing a bounded volume of compressed data is desirable in circumstances where we wish to know, or limit, the rate at which the compressed data are communicated, e.g., for periodic communication scheduling of fixed payload transmissions. The work is also geared to understanding the impact of, and accommodating for, storage limitations of Wireless Sensor Network (WSN) nodes. The proposed scheme belongs to the class of piecewise linear approximations (PLAs) and its performance is compared to other PLA schemes proposed for WSNs. The evaluation is carried out using existing public data sets.
我们考虑了无线传感器节点收集的时间序列数据的有损压缩问题,使得它对给定数量的原始数据产生有限数量的压缩数据。有损压缩以最小化L∞重构误差的方式执行。在我们希望知道或限制压缩数据通信速率的情况下,产生有限数量的压缩数据是可取的,例如,用于固定有效载荷传输的定期通信调度。这项工作还旨在了解无线传感器网络(WSN)节点存储限制的影响和适应。提出的方案属于分段线性逼近(PLA)的范畴,并将其性能与其他用于无线传感器网络的PLA方案进行了比较。评估是使用现有的公共数据集进行的。
{"title":"Limited Size Lossy Compression for WSNs","authors":"Sanku Kumar Roy, I. Nikolaidis","doi":"10.1109/LCN53696.2022.9843510","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843510","url":null,"abstract":"We consider the problem of lossy compression of time series data collected by wireless sensor nodes, such that it produces a limited volume of compressed data for a given amount of raw data. The lossy compression is performed in a manner that minimizes the resulting L∞ reconstruction error. Producing a bounded volume of compressed data is desirable in circumstances where we wish to know, or limit, the rate at which the compressed data are communicated, e.g., for periodic communication scheduling of fixed payload transmissions. The work is also geared to understanding the impact of, and accommodating for, storage limitations of Wireless Sensor Network (WSN) nodes. The proposed scheme belongs to the class of piecewise linear approximations (PLAs) and its performance is compared to other PLA schemes proposed for WSNs. The evaluation is carried out using existing public data sets.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network 面向车联网多层视频流的高性价比分布式边缘车辆选择
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843472
Roy Chowdhury, Sukumar Nandi, D. Goswami
Video traffic demands for vehicle infotainment services have rapidly increased in recent years. To reduce bandwidth costs and delays, content distributors (CD) use edge vehicles to distribute video contents over vehicular networks. CDs usually offer multiple subscription tiers of varying video qualities for their clients. A CD’s business goal is to make a minimal edge vehicle selection to maximize Internet traffic offloading while satisfying heterogeneous video quality requirements of clients belonging to different subscription tiers. This work proposes an optimum cost-effective solution for edge vehicle selection for delay-constrained live video streaming over vehicular networks with multi-tier bitrate agreements. The edge vehicle selection problem is formulated as the minimum set covering problem for optimum results, and a distributed approximation solution is proposed to increase scalability. Simulation results show that the proposed solution is cost-effective for CDs and saves significant control message overhead while satisfying delay constraints and multi-tier bitrate agreements.
近年来,视频交通对车载信息娱乐服务的需求迅速增长。为了降低带宽成本和延迟,内容分发器(CD)使用边缘车辆在车载网络上分发视频内容。cd通常为客户提供不同视频质量的多个订阅层。CD的业务目标是做出最小的边缘车辆选择,以最大限度地卸载互联网流量,同时满足属于不同订阅层的客户的异构视频质量要求。这项工作提出了一种最优的经济高效的解决方案,用于在具有多层比特率协议的车载网络上进行延迟约束的实时视频流边缘车辆选择。将边缘车辆选择问题表述为最优结果的最小集覆盖问题,并提出了一种分布式近似解以增加可扩展性。仿真结果表明,该方案在满足时延约束和多层比特率协议的前提下,节省了大量的控制报文开销。
{"title":"Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network","authors":"Roy Chowdhury, Sukumar Nandi, D. Goswami","doi":"10.1109/LCN53696.2022.9843472","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843472","url":null,"abstract":"Video traffic demands for vehicle infotainment services have rapidly increased in recent years. To reduce bandwidth costs and delays, content distributors (CD) use edge vehicles to distribute video contents over vehicular networks. CDs usually offer multiple subscription tiers of varying video qualities for their clients. A CD’s business goal is to make a minimal edge vehicle selection to maximize Internet traffic offloading while satisfying heterogeneous video quality requirements of clients belonging to different subscription tiers. This work proposes an optimum cost-effective solution for edge vehicle selection for delay-constrained live video streaming over vehicular networks with multi-tier bitrate agreements. The edge vehicle selection problem is formulated as the minimum set covering problem for optimum results, and a distributed approximation solution is proposed to increase scalability. Simulation results show that the proposed solution is cost-effective for CDs and saves significant control message overhead while satisfying delay constraints and multi-tier bitrate agreements.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127686226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRA: Leveraging AF_XDP for Programmable Network Functions with IPv6 Segment Routing SRA:利用AF_XDP可编程网络功能与IPv6段路由
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843244
Baosen Zhao, Yifang Qin, Wanghong Yang, Pengfei Fan, Xu Zhou
The IPv6 Segment Routing (SRv6) is a promising solution to support services such as service function chain (SFC) and network function virtualization (NFV). But the SRv6 implementation in the Linux kernel is being criticized for lack of programmability and scalability. In this paper, we present an efficient implementation of the SRv6 data plane based on AF_XDP (SRA) in userspace. By leveraging the AF_XDP supported in the Linux kernel, we implement a high-performance and programmable framework that allows network operators to encode their own network functions. Moreover, these functions can automatically execute in userspace and Linux network namespaces while processing specific packets. In addition, SRA also implements SR-proxy to support the Virtual Network Functions (VNFs) chaining based on SRv6. Experimental results show that SRA achieves high performance and enhances integration with the kernel ecosystem. In all scenarios, SRA processes faster than other implementations, such as the SRv6 implementation in the Linux kernel and SREXT module, and in some scenarios, SRA is even 10 times faster than the SRv6 implementation in the Linux kernel. Meanwhile, the proposed architecture can be easily extended to support new SRv6 behaviors and network functions.
SRv6 (IPv6 Segment Routing)是一种很有前途的解决方案,可以支持SFC (service function chain)和NFV (network function virtualization)等业务。但是Linux内核中的SRv6实现因缺乏可编程性和可伸缩性而受到批评。在本文中,我们提出了一种在用户空间中基于AF_XDP (SRA)的SRv6数据平面的有效实现。通过利用Linux内核中支持的AF_XDP,我们实现了一个高性能的可编程框架,该框架允许网络运营商对自己的网络功能进行编码。此外,在处理特定的数据包时,这些函数可以在用户空间和Linux网络名称空间中自动执行。此外,SRA还实现了SR-proxy,支持基于SRv6的VNFs (Virtual Network Functions)链。实验结果表明,该算法取得了较高的性能,增强了与内核生态系统的集成。在所有场景中,SRA的处理速度都比其他实现快,例如Linux内核中的SRv6实现和SREXT模块,在某些场景中,SRA甚至比Linux内核中的SRv6实现快10倍。同时,所提出的架构可以很容易地扩展,以支持新的SRv6行为和网络功能。
{"title":"SRA: Leveraging AF_XDP for Programmable Network Functions with IPv6 Segment Routing","authors":"Baosen Zhao, Yifang Qin, Wanghong Yang, Pengfei Fan, Xu Zhou","doi":"10.1109/LCN53696.2022.9843244","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843244","url":null,"abstract":"The IPv6 Segment Routing (SRv6) is a promising solution to support services such as service function chain (SFC) and network function virtualization (NFV). But the SRv6 implementation in the Linux kernel is being criticized for lack of programmability and scalability. In this paper, we present an efficient implementation of the SRv6 data plane based on AF_XDP (SRA) in userspace. By leveraging the AF_XDP supported in the Linux kernel, we implement a high-performance and programmable framework that allows network operators to encode their own network functions. Moreover, these functions can automatically execute in userspace and Linux network namespaces while processing specific packets. In addition, SRA also implements SR-proxy to support the Virtual Network Functions (VNFs) chaining based on SRv6. Experimental results show that SRA achieves high performance and enhances integration with the kernel ecosystem. In all scenarios, SRA processes faster than other implementations, such as the SRv6 implementation in the Linux kernel and SREXT module, and in some scenarios, SRA is even 10 times faster than the SRv6 implementation in the Linux kernel. Meanwhile, the proposed architecture can be easily extended to support new SRv6 behaviors and network functions.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"27 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset 针对船舶雷达系统的网络攻击:分类、模拟环境和数据集
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843801
Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, I. Fink, Marissa Schmidt, Klaus Wehrle, Martin Henze
Shipboard marine radar systems are essential for safe navigation, helping seafarers perceive their surroundings as they provide bearing and range estimations, object detection, and tracking. Since onboard systems have become increasingly digitized, interconnecting distributed electronics, radars have been integrated into modern bridge systems. But digitization increases the risk of cyberattacks, especially as vessels cannot be considered air-gapped. Consequently, in-depth security is crucial. However, particularly radar systems are not sufficiently protected against harmful network-level adversaries. Therefore, we ask: Can seafarers believe their eyes? In this paper, we identify possible attacks on radar communication and discuss how these threaten safe vessel operation in an attack taxonomy. Furthermore, we develop a holistic simulation environment with radar, complementary nautical sensors, and prototypically implemented cyberattacks from our taxonomy. Finally, leveraging this environment, we create a comprehensive dataset (RadarPWN) with radar network attacks that provides a foundation for future security research to secure marine radar communication.
船用雷达系统对安全导航至关重要,它可以提供方位和距离估计、目标检测和跟踪,帮助海员感知周围环境。由于机载系统日益数字化,连接分布式电子设备,雷达已集成到现代舰桥系统中。但数字化增加了网络攻击的风险,尤其是在船舶不能被视为气隙的情况下。因此,深度安全至关重要。然而,特别是雷达系统没有足够的保护来抵御有害的网络级对手。因此,我们要问:海员能相信自己的眼睛吗?在本文中,我们识别了可能对雷达通信的攻击,并在攻击分类中讨论了这些攻击如何威胁船舶的安全操作。此外,我们开发了一个整体的模拟环境,包括雷达、互补的航海传感器,以及从我们的分类法中实现的网络攻击原型。最后,利用这种环境,我们创建了一个全面的雷达网络攻击数据集(RadarPWN),为未来的安全研究提供了基础,以确保船舶雷达通信的安全。
{"title":"Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset","authors":"Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, I. Fink, Marissa Schmidt, Klaus Wehrle, Martin Henze","doi":"10.1109/LCN53696.2022.9843801","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843801","url":null,"abstract":"Shipboard marine radar systems are essential for safe navigation, helping seafarers perceive their surroundings as they provide bearing and range estimations, object detection, and tracking. Since onboard systems have become increasingly digitized, interconnecting distributed electronics, radars have been integrated into modern bridge systems. But digitization increases the risk of cyberattacks, especially as vessels cannot be considered air-gapped. Consequently, in-depth security is crucial. However, particularly radar systems are not sufficiently protected against harmful network-level adversaries. Therefore, we ask: Can seafarers believe their eyes? In this paper, we identify possible attacks on radar communication and discuss how these threaten safe vessel operation in an attack taxonomy. Furthermore, we develop a holistic simulation environment with radar, complementary nautical sensors, and prototypically implemented cyberattacks from our taxonomy. Finally, leveraging this environment, we create a comprehensive dataset (RadarPWN) with radar network attacks that provides a foundation for future security research to secure marine radar communication.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Best Paper Awards for Prior IEEE LCN Conferences 历届IEEE LCN会议最佳论文奖
Pub Date : 2022-09-26 DOI: 10.1109/lcn53696.2022.9843309
{"title":"Best Paper Awards for Prior IEEE LCN Conferences","authors":"","doi":"10.1109/lcn53696.2022.9843309","DOIUrl":"https://doi.org/10.1109/lcn53696.2022.9843309","url":null,"abstract":"","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LCN 2022 Cover Page LCN 2022封面
Pub Date : 2022-09-26 DOI: 10.1109/lcn53696.2022.9843383
{"title":"LCN 2022 Cover Page","authors":"","doi":"10.1109/lcn53696.2022.9843383","DOIUrl":"https://doi.org/10.1109/lcn53696.2022.9843383","url":null,"abstract":"","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microservices Configurations and the Impact on the Performance in Cloud Native Environments 微服务配置及其对云原生环境性能的影响
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843385
Mohamed-Anis Mekki, Nassima Toumi, A. Ksentini
Cloud-native rethinks the application architecture by embracing a micro-service approach, where each microservice is packaged into containers to run in a centralized or an edge cloud. When deploying the container running the micro-service, the tenant has to specify the amount of CPU and memory limit to run their workload. However, it is not straightforward for a tenant to know in advance the computing amount that allows running the microservice optimally. This will impact the service performances and the infrastructure provider, particularly if the resource overprovisioning approach is used. To overcome this issue, we conduct in this paper an experimental study aiming to detect if a tenant’s configuration allows running its service optimally. We run several experiments on a cloud-native platform, using different types of applications under different resource configurations. The obtained results provide insights on how to detect and correct performance degradation due to misconfiguration of the service resource.
云原生通过采用微服务方法重新考虑了应用程序架构,其中每个微服务被打包到容器中,以便在集中式云中或边缘云中运行。在部署运行微服务的容器时,租户必须指定运行其工作负载所需的CPU数量和内存限制。然而,对于租户来说,提前知道允许以最佳方式运行微服务的计算量并不简单。这将影响服务性能和基础设施提供者,特别是在使用资源过度供应方法的情况下。为了克服这个问题,我们在本文中进行了一项实验研究,旨在检测租户的配置是否允许以最佳方式运行其服务。我们在云原生平台上运行了几个实验,在不同的资源配置下使用不同类型的应用程序。获得的结果提供了关于如何检测和纠正由于服务资源配置错误而导致的性能下降的见解。
{"title":"Microservices Configurations and the Impact on the Performance in Cloud Native Environments","authors":"Mohamed-Anis Mekki, Nassima Toumi, A. Ksentini","doi":"10.1109/LCN53696.2022.9843385","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843385","url":null,"abstract":"Cloud-native rethinks the application architecture by embracing a micro-service approach, where each microservice is packaged into containers to run in a centralized or an edge cloud. When deploying the container running the micro-service, the tenant has to specify the amount of CPU and memory limit to run their workload. However, it is not straightforward for a tenant to know in advance the computing amount that allows running the microservice optimally. This will impact the service performances and the infrastructure provider, particularly if the resource overprovisioning approach is used. To overcome this issue, we conduct in this paper an experimental study aiming to detect if a tenant’s configuration allows running its service optimally. We run several experiments on a cloud-native platform, using different types of applications under different resource configurations. The obtained results provide insights on how to detect and correct performance degradation due to misconfiguration of the service resource.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134552777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Neighbor Selection Strategies in the Wild for CDN/V2V WebRTC Live Streaming: Can we learn what a good neighbor is? CDN/V2V WebRTC直播的邻居选择策略:我们能了解什么是好邻居吗?
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843647
Zhejiayu Ma, Soufiane Rouibia, F. Giroire, G. Urvoy-Keller
A hybrid CDN/Viewer-to-Viewer (V2V) architecture is an attractive solution for HTTP (HLS) and MPEG-DASH-based live streaming providers. It combines a traditional CDN with a V2V overlay for exchanging video fragments, reducing the cost of the CDN while maintaining the quality of experience. This work explores machine learning models to address the key challenge of neighbor selection. Our goal is to predict the connection quality between two arbitrary viewers using features such as locality, access providers, operating systems, past CDN, and V2V throughput. The proposed solutions are validated using an A/B testing approach on our production system, demonstrating a significant improvement in key system metrics compared to the traditional locality-based methods. We observe 17% higher V2V throughput, 26% lower delay, 37% fewer lost chunks, 39% fewer re-buffering, and 20% fewer quality switches.
对于HTTP (HLS)和基于mpeg - dash的直播提供商来说,混合式CDN/观看者对观看者(V2V)架构是一个很有吸引力的解决方案。它将传统的CDN与V2V覆盖相结合,用于交换视频片段,在保持体验质量的同时降低了CDN的成本。这项工作探索了机器学习模型来解决邻居选择的关键挑战。我们的目标是使用位置、访问提供商、操作系统、过去的CDN和V2V吞吐量等特性来预测任意两个查看器之间的连接质量。在我们的生产系统上使用A/B测试方法验证了提出的解决方案,与传统的基于位置的方法相比,证明了关键系统指标的显着改进。我们观察到V2V吞吐量提高了17%,延迟降低了26%,丢失块减少了37%,重新缓冲减少了39%,质量开关减少了20%。
{"title":"Neighbor Selection Strategies in the Wild for CDN/V2V WebRTC Live Streaming: Can we learn what a good neighbor is?","authors":"Zhejiayu Ma, Soufiane Rouibia, F. Giroire, G. Urvoy-Keller","doi":"10.1109/LCN53696.2022.9843647","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843647","url":null,"abstract":"A hybrid CDN/Viewer-to-Viewer (V2V) architecture is an attractive solution for HTTP (HLS) and MPEG-DASH-based live streaming providers. It combines a traditional CDN with a V2V overlay for exchanging video fragments, reducing the cost of the CDN while maintaining the quality of experience. This work explores machine learning models to address the key challenge of neighbor selection. Our goal is to predict the connection quality between two arbitrary viewers using features such as locality, access providers, operating systems, past CDN, and V2V throughput. The proposed solutions are validated using an A/B testing approach on our production system, demonstrating a significant improvement in key system metrics compared to the traditional locality-based methods. We observe 17% higher V2V throughput, 26% lower delay, 37% fewer lost chunks, 39% fewer re-buffering, and 20% fewer quality switches.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction and detection model for hierarchical Software-Defined Vehicular Network 分层软件定义车辆网络预测与检测模型
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843483
Houda Amari, L. Khoukhi, Lamia Hadrich Belguith
Vehicle Ad-hoc Network (VANET) is the main component of the intelligent transportation system. With the development of the next-generation intelligent vehicular networks, the latter aims to provide strategic and secure services and communications in roads and smart cities. Due to VANET’s unique characteristics, such as high mobility of its nodes, self-organization, distributed network, and frequently changing topology, security, data integrity, and users’ privacy information are major concerns. Also, attack prevention is still an open issue. Distributed Denial of Service (DDoS) is one of the most dangerous attacks in VANETs, which aims to flood the system’s bandwidth. In this article, we propose a hierarchical architecture for securing Software-Defined Vehicular Network (SDVN) and a security model for predicting and detecting DDoS attacks based on behavioral analysis of nodes achieved by a Markov stochastic process. Simulation results show that our model effectively mitigates DDoS attacks with a high-reliability rate.
车辆自组织网络(VANET)是智能交通系统的主要组成部分。随着下一代智能车辆网络的发展,后者旨在为道路和智慧城市提供战略和安全的服务和通信。由于VANET节点的高移动性、自组织、分布式网络以及拓扑结构的频繁变化等特点,安全性、数据完整性和用户隐私信息成为人们关注的重点。此外,攻击预防仍然是一个悬而未决的问题。分布式拒绝服务(DDoS)是vanet中最危险的攻击之一,其目的是淹没系统的带宽。在本文中,我们提出了一种用于保护软件定义车辆网络(SDVN)的分层架构,以及一种用于预测和检测DDoS攻击的安全模型,该模型基于马尔可夫随机过程实现的节点行为分析。仿真结果表明,该模型能够有效抵御DDoS攻击,具有较高的可靠性。
{"title":"Prediction and detection model for hierarchical Software-Defined Vehicular Network","authors":"Houda Amari, L. Khoukhi, Lamia Hadrich Belguith","doi":"10.1109/LCN53696.2022.9843483","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843483","url":null,"abstract":"Vehicle Ad-hoc Network (VANET) is the main component of the intelligent transportation system. With the development of the next-generation intelligent vehicular networks, the latter aims to provide strategic and secure services and communications in roads and smart cities. Due to VANET’s unique characteristics, such as high mobility of its nodes, self-organization, distributed network, and frequently changing topology, security, data integrity, and users’ privacy information are major concerns. Also, attack prevention is still an open issue. Distributed Denial of Service (DDoS) is one of the most dangerous attacks in VANETs, which aims to flood the system’s bandwidth. In this article, we propose a hierarchical architecture for securing Software-Defined Vehicular Network (SDVN) and a security model for predicting and detecting DDoS attacks based on behavioral analysis of nodes achieved by a Markov stochastic process. Simulation results show that our model effectively mitigates DDoS attacks with a high-reliability rate.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Raising the AWAREness of BFT Protocols for Soaring Network Delays 提高对BFT协议在急剧增长的网络时延中的认识
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843564
Martin Nischwitz, M. Esche, Florian Tschorsch
Classic BFT protocols are often deployed in the LAN setting, with low delays and reliable links. Recent publications of BFT protocols have decreased drastically in their communication complexity and the application to previously unsuited areas such as mobile or sensor networks is getting more traction. To facilitate that development and showcase suitability under harsher network conditions, we take one of the most recent BFT protocols, HotStuff, and analyze the impact of increased and varying network delays on its performance. We apply the delay prediction scheme AWARE and make some simple modifications to the prediction algorithm in order to increase its performance even further.
经典的BFT协议通常部署在局域网设置中,具有低延迟和可靠的链路。最近发表的BFT协议的通信复杂性大大降低,并且在以前不适合的领域(如移动或传感器网络)的应用越来越受到关注。为了促进开发并展示在更恶劣的网络条件下的适用性,我们采用了最新的BFT协议之一HotStuff,并分析了增加和变化的网络延迟对其性能的影响。为了进一步提高延迟预测算法的性能,我们采用了AWARE延迟预测方案,并对预测算法进行了一些简单的修改。
{"title":"Raising the AWAREness of BFT Protocols for Soaring Network Delays","authors":"Martin Nischwitz, M. Esche, Florian Tschorsch","doi":"10.1109/LCN53696.2022.9843564","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843564","url":null,"abstract":"Classic BFT protocols are often deployed in the LAN setting, with low delays and reliable links. Recent publications of BFT protocols have decreased drastically in their communication complexity and the application to previously unsuited areas such as mobile or sensor networks is getting more traction. To facilitate that development and showcase suitability under harsher network conditions, we take one of the most recent BFT protocols, HotStuff, and analyze the impact of increased and varying network delays on its performance. We apply the delay prediction scheme AWARE and make some simple modifications to the prediction algorithm in order to increase its performance even further.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 47th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1