首页 > 最新文献

2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Vehicle Update Management in Software Defined Vehicles 软件定义车辆中的车辆更新管理
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843360
S. Aust
An integral part of software defined vehicles (SDVs) is the vehicle update manager that is used to frequently update the vehicle’s software. The vehicle update manager connects the in-car communication network with the out-car services, such as diagnostic or cloud vehicle services. The out-car services provide the latest software of a fleet, which is sent to each vehicle’s update manager to update the in-car software. How the software update architecture is designed is outlined in this demo. Furthermore, a vehicle’s update master unit receives the updates and forwards them to connected subordinates. The update process in this demo is based on the adaptive AUTOSAR platform, that uses the concept of update and configuration manager (UCM), which demonstrates the latest development in vehicle updates in SDVs.
软件定义车辆(sdv)的一个组成部分是车辆更新管理器,用于频繁更新车辆的软件。车辆更新管理器将车内通信网络与车外服务(如诊断或云车辆服务)连接起来。车外服务提供车队的最新软件,这些软件被发送给每辆车的更新管理器,以更新车内软件。本演示将概述软件更新体系结构的设计方法。此外,车辆的更新主单元接收更新并将其转发给连接的下级。本演示中的更新过程基于自适应AUTOSAR平台,该平台使用了更新和配置管理器(UCM)的概念,展示了sdv中车辆更新的最新发展。
{"title":"Vehicle Update Management in Software Defined Vehicles","authors":"S. Aust","doi":"10.1109/LCN53696.2022.9843360","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843360","url":null,"abstract":"An integral part of software defined vehicles (SDVs) is the vehicle update manager that is used to frequently update the vehicle’s software. The vehicle update manager connects the in-car communication network with the out-car services, such as diagnostic or cloud vehicle services. The out-car services provide the latest software of a fleet, which is sent to each vehicle’s update manager to update the in-car software. How the software update architecture is designed is outlined in this demo. Furthermore, a vehicle’s update master unit receives the updates and forwards them to connected subordinates. The update process in this demo is based on the adaptive AUTOSAR platform, that uses the concept of update and configuration manager (UCM), which demonstrates the latest development in vehicle updates in SDVs.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DisruptaBLE: Opportunistic BLE Networking
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843509
Patrick Rathje, O. Landsiedel
Bluetooth Low Energy (BLE) is the prevalent IoT radio technology and perfectly suited for mobile and battery-driven applications. However, it is not designed for intermittent connectivity and opportunistic networking. Hence, the vast infrastructure that BLE-equipped devices such as smartphones, wearables, and sensors provide, remains untapped, even with its potential for data collection, sharing, or emergency communication in disaster scenarios. This paper introduces DISRUPTABLE to unfold this potential: A universal BLE-based store-and-forward architecture for delay-tolerant and opportunistic networking. Tailored to the resource constraints of IoT nodes and the feature set of BLE, DISRUPTABLE enables opportunistic interactions between BLE-equipped devices, providing a resilient network even when established communication over cellular networks or Wi-Fi fails. In our evaluation, we show that in a highly dynamic pedestrian scenario in downtown Stockholm, broadcasts reliably inform pedestrians in 7.1 seconds, while unicast messages arrive within 20 minutes in 48.1% of cases.
低功耗蓝牙(BLE)是流行的物联网无线电技术,非常适合移动和电池驱动的应用。然而,它不是为间歇性连接和机会性网络而设计的。因此,配备ble的设备(如智能手机、可穿戴设备和传感器)提供的大量基础设施仍未得到开发,即使它具有数据收集、共享或灾难场景中的紧急通信的潜力。本文介绍了DISRUPTABLE来展现这种潜力:一种通用的基于ble的存储和转发架构,用于延迟容忍和机会网络。根据物联网节点的资源限制和BLE的功能集,DISRUPTABLE可以在配备BLE的设备之间进行机会性交互,即使在通过蜂窝网络或Wi-Fi建立的通信失败时也可以提供弹性网络。在我们的评估中,我们表明,在斯德哥尔斯德哥尔市中心高度动态的行人场景中,广播在7.1秒内可靠地通知行人,而单播消息在20分钟内到达的情况占48.1%。
{"title":"DisruptaBLE: Opportunistic BLE Networking","authors":"Patrick Rathje, O. Landsiedel","doi":"10.1109/LCN53696.2022.9843509","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843509","url":null,"abstract":"Bluetooth Low Energy (BLE) is the prevalent IoT radio technology and perfectly suited for mobile and battery-driven applications. However, it is not designed for intermittent connectivity and opportunistic networking. Hence, the vast infrastructure that BLE-equipped devices such as smartphones, wearables, and sensors provide, remains untapped, even with its potential for data collection, sharing, or emergency communication in disaster scenarios. This paper introduces DISRUPTABLE to unfold this potential: A universal BLE-based store-and-forward architecture for delay-tolerant and opportunistic networking. Tailored to the resource constraints of IoT nodes and the feature set of BLE, DISRUPTABLE enables opportunistic interactions between BLE-equipped devices, providing a resilient network even when established communication over cellular networks or Wi-Fi fails. In our evaluation, we show that in a highly dynamic pedestrian scenario in downtown Stockholm, broadcasts reliably inform pedestrians in 7.1 seconds, while unicast messages arrive within 20 minutes in 48.1% of cases.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service-Based Identification of Highly Coupled Mobile Applications 基于服务的高耦合移动应用识别
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843423
Hua Wu, Rui Wang, Guang Cheng, Xiaoyan Hu
Identifying mobile applications from network traffic is important for Internet service providers (ISPs) to manage their networks at a fine-grained level. However, the rise of public services has led to a gradual increase in service coupling among applications, making it more difficult to identify applications. Existing methods produce classification ambiguities when identifying highly coupled mobile applications, resulting in low application identification accuracy. In this paper, we propose a service-based method to quickly identify highly service coupling applications after the applications are launched. It can accurately identify highly coupled mobile applications based on the features of the services accessed by the applications. Experiments on a real network traffic dataset of highly coupled mobile applications verify that our method can identify applications within 25s after the mobile applications are launched, and the identification accuracy is over 99%.
从网络流量中识别移动应用程序对于互联网服务提供商(isp)在细粒度级别上管理其网络非常重要。然而,公共服务的兴起导致应用程序之间的服务耦合逐渐增加,这使得识别应用程序变得更加困难。现有方法在识别高度耦合的移动应用时会产生分类歧义,导致应用识别精度较低。本文提出了一种基于服务的方法,在应用程序启动后快速识别高服务耦合的应用程序。它可以根据应用程序访问的服务的特征准确地识别高度耦合的移动应用程序。在高耦合移动应用的真实网络流量数据集上的实验验证了我们的方法可以在移动应用启动后的25s内识别应用,识别准确率超过99%。
{"title":"Service-Based Identification of Highly Coupled Mobile Applications","authors":"Hua Wu, Rui Wang, Guang Cheng, Xiaoyan Hu","doi":"10.1109/LCN53696.2022.9843423","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843423","url":null,"abstract":"Identifying mobile applications from network traffic is important for Internet service providers (ISPs) to manage their networks at a fine-grained level. However, the rise of public services has led to a gradual increase in service coupling among applications, making it more difficult to identify applications. Existing methods produce classification ambiguities when identifying highly coupled mobile applications, resulting in low application identification accuracy. In this paper, we propose a service-based method to quickly identify highly service coupling applications after the applications are launched. It can accurately identify highly coupled mobile applications based on the features of the services accessed by the applications. Experiments on a real network traffic dataset of highly coupled mobile applications verify that our method can identify applications within 25s after the mobile applications are launched, and the identification accuracy is over 99%.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114138167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to build socio-organizational information from remote IP addresses to enrich security analysis? 如何从远程IP地址构建社会组织信息以丰富安全分析?
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843570
Camille Moriot, François Lesueur, N. Stouls, F. Valois
There is a constant threat of having our computing systems under attack. Information regarding the origins of the traffic we receive can be valuable. Currently, the AS-number and the localization are the most commonly used IP-related information to characterize an attack.In this paper, we propose expanding knowledge about a remote IP’s owner to improve defensive reaction effectiveness and obtain in-depth analyzes of attacker profiles. We introduce the enrichment with socio-organizational information (such as organization type, activity field, etc.) about the entities owning the IP in addition to infrastructural information. This integration is driven by combining RDAP and Wikidata. We demonstrate that this proposal is promising.
我们的计算机系统经常受到攻击的威胁。关于我们收到的流量来源的信息可能是有价值的。目前,最常用的攻击特征信息是as号和定位信息。在本文中,我们建议扩展关于远程IP所有者的知识,以提高防御反应的有效性,并获得对攻击者配置文件的深入分析。除了基础设施信息外,我们还引入了关于拥有IP的实体的社会组织信息(如组织类型,活动领域等)的丰富。这种集成是由RDAP和Wikidata的结合驱动的。我们证明这个建议是有希望的。
{"title":"How to build socio-organizational information from remote IP addresses to enrich security analysis?","authors":"Camille Moriot, François Lesueur, N. Stouls, F. Valois","doi":"10.1109/LCN53696.2022.9843570","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843570","url":null,"abstract":"There is a constant threat of having our computing systems under attack. Information regarding the origins of the traffic we receive can be valuable. Currently, the AS-number and the localization are the most commonly used IP-related information to characterize an attack.In this paper, we propose expanding knowledge about a remote IP’s owner to improve defensive reaction effectiveness and obtain in-depth analyzes of attacker profiles. We introduce the enrichment with socio-organizational information (such as organization type, activity field, etc.) about the entities owning the IP in addition to infrastructural information. This integration is driven by combining RDAP and Wikidata. We demonstrate that this proposal is promising.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid Systems 基于sdn的零接触智能电网系统入侵检测集成学习
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843645
Zakaria Abou El Houda, B. Brik, L. Khoukhi
Software-defined network (SDN) is widely deployed on Smart Grid (SG) systems. It consists in decoupling control and data planes, to automate the monitoring and management of the communication network, and thus enabling zero touch management of SG systems. However, SDN-based SG is prone to several security threats and varios type of new attacks. To alleviate these issues, various Machine/Deep learning (ML/DL)-based intrusion detection systems (IDS) were designed to improve the detection accuracy of conventional IDS. However, they suffer from high variance and/or bias, which may lead to an inaccurate security threat detection. In this context, ensemble learning is an emerging ML technique that aims at combining several ML models; the objective is to generate less data-sensitive (i.e., less variance) and more flexible (i.e., less bias) machine learning models. In this paper, we design a novel framework, called BoostIDS, that leverages ensemble learning to efficiently detect and mitigate security threats in SDN-based SG system. BoostIDS comprises two main modules: (1) A data monitoring and feature selection module that makes use of an efficient Boosting Feature Selection Algorithm to select the best/relevant SG-based features; and (2) An ensemble learning-based threats detection moel that implements a Lightweight Boosting Algorithm (LBA) to timely and effectively detects SG-based attacks in a SDN environment. We conduct extensive experiments to validate BoostIDS on top of multiple real attacks; the obtained results using NSL-KDD and UNSW-NB15 datasets, confirm that BoostIDS can effectively detect/mitigate security threats in SDN-based SG systems, while optimizing training/test time complexity.
软件定义网络(SDN)在智能电网系统中得到了广泛的应用。它包括解耦控制和数据平面,使通信网络的监测和管理自动化,从而实现SG系统的零接触管理。但是,基于sdn的SG容易受到多种安全威胁和各种新型攻击。为了缓解这些问题,设计了各种基于机器/深度学习(ML/DL)的入侵检测系统(IDS)来提高传统入侵检测系统的检测精度。然而,它们存在很大的方差和/或偏差,这可能导致不准确的安全威胁检测。在这种情况下,集成学习是一种新兴的ML技术,旨在组合多个ML模型;我们的目标是生成更少数据敏感性(即更少方差)和更灵活(即更少偏差)的机器学习模型。在本文中,我们设计了一个新的框架,称为BoostIDS,它利用集成学习来有效地检测和减轻基于sdn的SG系统中的安全威胁。BoostIDS包括两个主要模块:(1)数据监测和特征选择模块,该模块利用高效的Boosting特征选择算法来选择最佳/相关的基于sgd的特征;(2)基于集成学习的威胁检测模型,该模型实现了轻量级增强算法(LBA),能够在SDN环境中及时有效地检测基于SDN的攻击。我们进行了大量的实验来验证BoostIDS在多个真实攻击之上;使用NSL-KDD和UNSW-NB15数据集获得的结果证实,BoostIDS可以有效地检测/缓解基于sdn的SG系统中的安全威胁,同时优化训练/测试时间复杂度。
{"title":"Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid Systems","authors":"Zakaria Abou El Houda, B. Brik, L. Khoukhi","doi":"10.1109/LCN53696.2022.9843645","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843645","url":null,"abstract":"Software-defined network (SDN) is widely deployed on Smart Grid (SG) systems. It consists in decoupling control and data planes, to automate the monitoring and management of the communication network, and thus enabling zero touch management of SG systems. However, SDN-based SG is prone to several security threats and varios type of new attacks. To alleviate these issues, various Machine/Deep learning (ML/DL)-based intrusion detection systems (IDS) were designed to improve the detection accuracy of conventional IDS. However, they suffer from high variance and/or bias, which may lead to an inaccurate security threat detection. In this context, ensemble learning is an emerging ML technique that aims at combining several ML models; the objective is to generate less data-sensitive (i.e., less variance) and more flexible (i.e., less bias) machine learning models. In this paper, we design a novel framework, called BoostIDS, that leverages ensemble learning to efficiently detect and mitigate security threats in SDN-based SG system. BoostIDS comprises two main modules: (1) A data monitoring and feature selection module that makes use of an efficient Boosting Feature Selection Algorithm to select the best/relevant SG-based features; and (2) An ensemble learning-based threats detection moel that implements a Lightweight Boosting Algorithm (LBA) to timely and effectively detects SG-based attacks in a SDN environment. We conduct extensive experiments to validate BoostIDS on top of multiple real attacks; the obtained results using NSL-KDD and UNSW-NB15 datasets, confirm that BoostIDS can effectively detect/mitigate security threats in SDN-based SG systems, while optimizing training/test time complexity.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Quantum Algorithm for RF-based Fingerprinting Localization Systems 基于射频识别的指纹定位系统的量子算法
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843246
A. Shokry, Maged A. Youssef
Fingerprinting is one of the mainstream technologies for localization. However, it needs significant storage overhead and running time, preventing it from scaling to support world-wide indoor/outdoor localization.Quantum computing has the potential to revolutionize computation by making some classically intractable problems solvable on quantum computers. In this paper, we propose a quantum fingerprint-based localization algorithm for enabling large-scale location tracking systems, envisioning future era of location tracking and spatial systems. Specifically, we propose a quantum algorithm that provides an exponential enhancement of both the space and running time complexity compared to the traditional classical systems. We give the details of how to build the quantum fingerprint, how to encode the received signal strength (RSS) measurements in quantum particles, and finally; present a quantum algorithm for calculating the cosine similarity between the online RSS measurements and the fingerprint ones.Results from deploying our algorithm in three real testbeds on IBM Quantum Experience machines confirm the ability of our quantum system to get the same accuracy as the classical one but with the potential exponential saving in both space and running time.
指纹识别是定位的主流技术之一。然而,它需要大量的存储开销和运行时间,这使得它无法扩展到支持世界范围的室内/室外本地化。量子计算有可能通过在量子计算机上解决一些经典的棘手问题来彻底改变计算。在本文中,我们提出了一种基于量子指纹的定位算法,用于实现大规模的位置跟踪系统,展望位置跟踪和空间系统的未来时代。具体来说,我们提出了一种量子算法,与传统的经典系统相比,它提供了空间和运行时间复杂度的指数增强。我们详细介绍了如何构建量子指纹,如何在量子粒子中对接收信号强度(RSS)测量值进行编码,最后;提出了一种计算在线RSS测量值与指纹测量值余弦相似度的量子算法。在IBM Quantum Experience机器上的三个真实测试台上部署我们的算法的结果证实了我们的量子系统能够获得与经典系统相同的精度,但在空间和运行时间上都有潜在的指数级节省。
{"title":"A Quantum Algorithm for RF-based Fingerprinting Localization Systems","authors":"A. Shokry, Maged A. Youssef","doi":"10.1109/LCN53696.2022.9843246","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843246","url":null,"abstract":"Fingerprinting is one of the mainstream technologies for localization. However, it needs significant storage overhead and running time, preventing it from scaling to support world-wide indoor/outdoor localization.Quantum computing has the potential to revolutionize computation by making some classically intractable problems solvable on quantum computers. In this paper, we propose a quantum fingerprint-based localization algorithm for enabling large-scale location tracking systems, envisioning future era of location tracking and spatial systems. Specifically, we propose a quantum algorithm that provides an exponential enhancement of both the space and running time complexity compared to the traditional classical systems. We give the details of how to build the quantum fingerprint, how to encode the received signal strength (RSS) measurements in quantum particles, and finally; present a quantum algorithm for calculating the cosine similarity between the online RSS measurements and the fingerprint ones.Results from deploying our algorithm in three real testbeds on IBM Quantum Experience machines confirm the ability of our quantum system to get the same accuracy as the classical one but with the potential exponential saving in both space and running time.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Eliminating Routing Loops and Oscillations in BGP Using Total Ordering 利用全排序消除BGP中的路由环路和振荡
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843706
J. Garcia-Luna-Aceves
OPERA is a framework recently introduced that formalizes routing etiquettes based on path information. New rules derived from OPERA to provide total ordering among paths are added to the policy mechanisms used in IBGP and EBGP, which results in OPERA-based BGP (OBGP). OBGP is a complete loop-free inter-domain multi-path routing solution based on IBGP and EBGP. OBGP is proven to be stable and loop-free at every instant. Well-known examples of systems in which IBGP and EBGP do not converge are used to illustrate the benefits of OBGP.
OPERA是最近引入的一个框架,它基于路径信息形式化路由规则。在IBGP和EBGP中使用的策略机制中添加了从OPERA派生的新规则,以提供路径之间的总排序,从而产生了基于OPERA的BGP (OBGP)。OBGP是一种基于IBGP和EBGP的完整的无环域间多径路由解决方案。事实证明,OBGP在任何时刻都是稳定的、无环路的。本文使用了IBGP和EBGP不收敛的著名系统示例来说明OBGP的好处。
{"title":"Eliminating Routing Loops and Oscillations in BGP Using Total Ordering","authors":"J. Garcia-Luna-Aceves","doi":"10.1109/LCN53696.2022.9843706","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843706","url":null,"abstract":"OPERA is a framework recently introduced that formalizes routing etiquettes based on path information. New rules derived from OPERA to provide total ordering among paths are added to the policy mechanisms used in IBGP and EBGP, which results in OPERA-based BGP (OBGP). OBGP is a complete loop-free inter-domain multi-path routing solution based on IBGP and EBGP. OBGP is proven to be stable and loop-free at every instant. Well-known examples of systems in which IBGP and EBGP do not converge are used to illustrate the benefits of OBGP.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"115 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120939242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Task Replication in Unreliable Edge Networks 不可靠边缘网络中的任务复制
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843613
I. Amer, Sharief M. A. Oteafy, H. Hassanein
Edge networks provide ample resources for low-latency service recruitment, unlike remote resources in the Cloud. As such, smart devices and Internet of Things (IoT) nodes form a pool of Extreme Edge Devices (EED) that are within reach of Mist and Fog networks, providing significant advantages in latency, geographic cognizance, and reduced communication costs. EEDs are often recruited in Edge networks assuming they are reliable in their commitment to tasks. However, many EEDs may fail to fulfill their tasks because they operate under opportunistic approaches and are prone to intermittent connectivity. To ameliorate task failure, we aim to optimize task allocation under the assumption of failure. Additionally, we optimize CPU utilization to engage reliable EEDs, resorting to replication when needed to exceed a tunable reliability margin. We demonstrate the efficacy of our model in multiple scenarios and present future work in EED utilization.
与云中的远程资源不同,边缘网络为低延迟服务招聘提供了充足的资源。因此,智能设备和物联网(IoT)节点形成了一个位于Mist和Fog网络范围内的极端边缘设备(EED)池,在延迟、地理识别和降低通信成本方面提供了显着优势。边缘网络通常会招募ed,假设他们对任务的承诺是可靠的。然而,许多eed可能无法完成其任务,因为它们在机会主义方法下操作,并且容易出现间歇性连接。为了改善任务失败,我们的目标是在假设失败的情况下优化任务分配。此外,我们优化了CPU利用率,以使用可靠的eed,在需要超出可调可靠性裕度时诉诸复制。我们证明了我们的模型在多种情况下的有效性,并提出了未来在EED利用方面的工作。
{"title":"Task Replication in Unreliable Edge Networks","authors":"I. Amer, Sharief M. A. Oteafy, H. Hassanein","doi":"10.1109/LCN53696.2022.9843613","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843613","url":null,"abstract":"Edge networks provide ample resources for low-latency service recruitment, unlike remote resources in the Cloud. As such, smart devices and Internet of Things (IoT) nodes form a pool of Extreme Edge Devices (EED) that are within reach of Mist and Fog networks, providing significant advantages in latency, geographic cognizance, and reduced communication costs. EEDs are often recruited in Edge networks assuming they are reliable in their commitment to tasks. However, many EEDs may fail to fulfill their tasks because they operate under opportunistic approaches and are prone to intermittent connectivity. To ameliorate task failure, we aim to optimize task allocation under the assumption of failure. Additionally, we optimize CPU utilization to engage reliable EEDs, resorting to replication when needed to exceed a tunable reliability margin. We demonstrate the efficacy of our model in multiple scenarios and present future work in EED utilization.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126564242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Live Demonstration of In-Band Telemetry in OSM-Orchestrated Core Networks osm核心网带内遥测技术的现场演示
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843413
T. Dreibholz, Mah-Rukh Fida, Azza H. Ahmed, Andrés F. Ocampo, Foivos Michelinakis
Network Function Virtualization is a key enabler to building future mobile networks in a flexible and cost-efficient way. Such a network is expected to manage and maintain itself with minimum human intervention. With early deployments of the fifth generation of mobile technologies – 5G – around the world, setting up 4G/5G experimental infrastructure is necessary to optimally design Self-Organising Networks (SON). In this demo, we present a custom small-scale 4G/5G testbed. As a step towards self-healing, the testbed integrates Programming Protocol-independent Packet Processors (P4) virtual switches, that are placed along interfaces between different components of transport and core network. This demo not only shows the administration and monitoring of the Evolved Packet Core VNF components, using Open Source MANO, but also serves as a proof of concept for the potential of P4-based telemetry in detecting anomalous behaviour of the mobile network, such as a congestion in the transport part.
网络功能虚拟化是以灵活和经济高效的方式构建未来移动网络的关键推动者。这样的网络有望在最少的人为干预下管理和维护自己。随着第五代移动技术5G在全球范围内的早期部署,建立4G/5G实验基础设施对于优化设计自组织网络(SON)是必要的。在这个演示中,我们展示了一个定制的小规模4G/5G测试平台。作为自我修复的一步,测试平台集成了编程协议无关的数据包处理器(P4)虚拟交换机,这些虚拟交换机放置在传输和核心网络的不同组件之间的接口上。这个演示不仅展示了使用开源MANO管理和监控演进包核心VNF组件,而且还证明了基于p4的遥测技术在检测移动网络异常行为(例如传输部分的拥塞)方面的潜力。
{"title":"A Live Demonstration of In-Band Telemetry in OSM-Orchestrated Core Networks","authors":"T. Dreibholz, Mah-Rukh Fida, Azza H. Ahmed, Andrés F. Ocampo, Foivos Michelinakis","doi":"10.1109/LCN53696.2022.9843413","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843413","url":null,"abstract":"Network Function Virtualization is a key enabler to building future mobile networks in a flexible and cost-efficient way. Such a network is expected to manage and maintain itself with minimum human intervention. With early deployments of the fifth generation of mobile technologies – 5G – around the world, setting up 4G/5G experimental infrastructure is necessary to optimally design Self-Organising Networks (SON). In this demo, we present a custom small-scale 4G/5G testbed. As a step towards self-healing, the testbed integrates Programming Protocol-independent Packet Processors (P4) virtual switches, that are placed along interfaces between different components of transport and core network. This demo not only shows the administration and monitoring of the Evolved Packet Core VNF components, using Open Source MANO, but also serves as a proof of concept for the potential of P4-based telemetry in detecting anomalous behaviour of the mobile network, such as a congestion in the transport part.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobility-Focused Joining in TSCH Networks 以移动性为重点的TSCH网络加入
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843205
O. Nielsen, Lucas Koefoed Schnügger, Charalampos Orfanidis, Xenofon Fafoutis
TSCH is a MAC protocol able to provide reliable wireless communication to IoT networks. For applications where mobility is necessary research has shown that TSCH presents a suboptimal performance. One of the main issues is that the time required for a device to join a TSCH network is unpredictable and theoretically has no upper limit. The joining process to a TSCH network can take several minutes in some cases which can ensue significant delay and power overheads. In this paper we examine how TSCH can be adapted to support mobile applications, by improving the joining and re-joining procedure. Relevant information about the network topology is aggregated throughout the network to be utilized during the joining process. The results show that the joining time can be reduced by 50% and the re-joining time by 90%.
TSCH是一种MAC协议,能够为物联网网络提供可靠的无线通信。对于需要移动性的应用,研究表明TSCH的性能不是最优的。其中一个主要问题是,设备加入TSCH网络所需的时间是不可预测的,理论上没有上限。在某些情况下,加入TSCH网络的过程可能需要几分钟,这可能会导致严重的延迟和电力开销。在本文中,我们研究如何通过改进连接和重新连接程序来适应TSCH以支持移动应用程序。在加入过程中,将网络拓扑的相关信息聚合到整个网络中,以供使用。结果表明,该方法可使连接时间缩短50%,再连接时间缩短90%。
{"title":"Mobility-Focused Joining in TSCH Networks","authors":"O. Nielsen, Lucas Koefoed Schnügger, Charalampos Orfanidis, Xenofon Fafoutis","doi":"10.1109/LCN53696.2022.9843205","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843205","url":null,"abstract":"TSCH is a MAC protocol able to provide reliable wireless communication to IoT networks. For applications where mobility is necessary research has shown that TSCH presents a suboptimal performance. One of the main issues is that the time required for a device to join a TSCH network is unpredictable and theoretically has no upper limit. The joining process to a TSCH network can take several minutes in some cases which can ensue significant delay and power overheads. In this paper we examine how TSCH can be adapted to support mobile applications, by improving the joining and re-joining procedure. Relevant information about the network topology is aggregated throughout the network to be utilized during the joining process. The results show that the joining time can be reduced by 50% and the re-joining time by 90%.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 47th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1