首页 > 最新文献

2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

英文 中文
AI-aided Hidden Camera Detection and Localization based on Raw IoT Network Traffic 基于原始物联网网络流量的ai辅助隐藏摄像头检测与定位
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843203
Jihyeon Lee, Sangwon Seo, Taehun Yang, Soochang Park
This paper proposes a novel scheme to detect and localize the spy cameras based on AI algorithm based raw traffic analytics, named AI-aided Hidden Camera Locator (AHCL). In AHCL, the video streaming data are filtered via the SVM (support vector machine) algorithm to quickly monitor whole raw network traffic from a router to the networks first. Then, gathered traffic data are denoised by the Denoising Autoencoder (DAE) technique to improve the data quality of classification for localization, where a camera transmits video streaming. Based on the proof-of-concept implementation, the proposed scheme can achieve 99.5% positioning accuracy of camera detection with the Ensemble Neural Networks (NNs).
本文提出了一种基于原始流量分析的人工智能算法来检测和定位间谍摄像机的新方案,称为人工智能辅助隐藏摄像机定位器(AHCL)。在AHCL中,视频流数据通过支持向量机(SVM)算法进行过滤,以快速监控从路由器到网络的整个原始网络流量。然后,采集到的交通数据通过去噪自动编码器(DAE)技术进行去噪,以提高定位分类的数据质量,其中摄像机传输视频流。基于概念验证的实现,该方案使用集成神经网络(nn)可以实现99.5%的摄像机检测定位精度。
{"title":"AI-aided Hidden Camera Detection and Localization based on Raw IoT Network Traffic","authors":"Jihyeon Lee, Sangwon Seo, Taehun Yang, Soochang Park","doi":"10.1109/LCN53696.2022.9843203","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843203","url":null,"abstract":"This paper proposes a novel scheme to detect and localize the spy cameras based on AI algorithm based raw traffic analytics, named AI-aided Hidden Camera Locator (AHCL). In AHCL, the video streaming data are filtered via the SVM (support vector machine) algorithm to quickly monitor whole raw network traffic from a router to the networks first. Then, gathered traffic data are denoised by the Denoising Autoencoder (DAE) technique to improve the data quality of classification for localization, where a camera transmits video streaming. Based on the proof-of-concept implementation, the proposed scheme can achieve 99.5% positioning accuracy of camera detection with the Ensemble Neural Networks (NNs).","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Job Completion Time in Vehicular Cloud by Overcoming Resource Volatility 克服资源波动的车辆云作业完成时间研究
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843398
Chinh Tran, M. Mehmet-Ali
Future vehicles are expected to generate large amounts of data which may need to be off-loaded to a proximate server for processing. This led to the introduction of vehicular clouds (VC), which proposes that computing is done at nearby vehicles. However, as the vehicles may leave and join the VC randomly, the computing services of VC are time-varying, which may cause service interruptions. This work analytically evaluates the performance of the VCs under a service strategy that overcomes the interruptions caused by resource volatility. We use order statistics to derive the probability distribution of the number of vehicle arrivals to assign all the tasks of a job, the upper and lower bounds of mean job completion time, and the probability density function of the completion time of the longest task. Finally, we present the numerical results for the analysis and the simulation results to show the correctness of the analysis.
未来的车辆预计将产生大量数据,这些数据可能需要卸载到附近的服务器进行处理。这导致了车辆云(VC)的引入,它提出计算在附近的车辆上完成。然而,由于车辆可能随机离开并加入VC,因此VC的计算服务是时变的,这可能会导致服务中断。这项工作分析地评估了vc在克服由资源波动引起的中断的服务策略下的性能。我们利用序统计量导出了车辆到达数的概率分布来分配作业的所有任务,平均作业完成时间的上界和下界,以及最长任务完成时间的概率密度函数。最后给出了分析的数值结果和仿真结果,验证了分析的正确性。
{"title":"Towards Job Completion Time in Vehicular Cloud by Overcoming Resource Volatility","authors":"Chinh Tran, M. Mehmet-Ali","doi":"10.1109/LCN53696.2022.9843398","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843398","url":null,"abstract":"Future vehicles are expected to generate large amounts of data which may need to be off-loaded to a proximate server for processing. This led to the introduction of vehicular clouds (VC), which proposes that computing is done at nearby vehicles. However, as the vehicles may leave and join the VC randomly, the computing services of VC are time-varying, which may cause service interruptions. This work analytically evaluates the performance of the VCs under a service strategy that overcomes the interruptions caused by resource volatility. We use order statistics to derive the probability distribution of the number of vehicle arrivals to assign all the tasks of a job, the upper and lower bounds of mean job completion time, and the probability density function of the completion time of the longest task. Finally, we present the numerical results for the analysis and the simulation results to show the correctness of the analysis.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering receive: Reinforcement Learning-Controlled Effective Ingress Filtering
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843478
Hauke Heseding, M. Zitterbart
Volumetric Distributed Denial of Service attacks forcefully disrupt the availability of online services by congesting network links with arbitrary high-volume traffic. This brute force approach has collateral impact on the upstream network infrastructure, making early attack traffic removal a key objective. To reduce infrastructure load and maintain service availability, we introduce ReCEIF, a topology-independent mitigation strategy for early, rule-based ingress filtering leveraging deep reinforcement learning. ReCEIF utilizes hierarchical heavy hitters to monitor traffic distribution and detect subnets that are sending high-volume traffic. Deep reinforcement learning subsequently serves to refine hierarchical heavy hitters into effective filter rules that can be propagated upstream to discard traffic originating from attacking systems. Evaluating all filter rules requires only a single clock cycle when utilizing fast ternary content-addressable memory, which is commonly available in software defined networks. To outline the effectiveness of our approach, we conduct a comparative evaluation to reinforcement learning-based router throttling.
容量分布式拒绝服务攻击通过使用任意大容量流量阻塞网络链接来强行破坏在线服务的可用性。这种蛮力方法对上游网络基础设施有附带影响,使早期攻击流量清除成为关键目标。为了减少基础设施负载并保持服务可用性,我们引入了ReCEIF,这是一种利用深度强化学习的基于规则的早期入口过滤的拓扑无关缓解策略。receiif利用分层重击器监视流量分布并检测发送大流量的子网。随后,深度强化学习将分层重击者提炼成有效的过滤规则,这些规则可以向上游传播,以丢弃来自攻击系统的流量。当利用快速三元内容可寻址内存时,评估所有过滤规则只需要一个时钟周期,这在软件定义的网络中通常可用。为了概述我们方法的有效性,我们对基于强化学习的路由器节流进行了比较评估。
{"title":"ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering","authors":"Hauke Heseding, M. Zitterbart","doi":"10.1109/LCN53696.2022.9843478","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843478","url":null,"abstract":"Volumetric Distributed Denial of Service attacks forcefully disrupt the availability of online services by congesting network links with arbitrary high-volume traffic. This brute force approach has collateral impact on the upstream network infrastructure, making early attack traffic removal a key objective. To reduce infrastructure load and maintain service availability, we introduce ReCEIF, a topology-independent mitigation strategy for early, rule-based ingress filtering leveraging deep reinforcement learning. ReCEIF utilizes hierarchical heavy hitters to monitor traffic distribution and detect subnets that are sending high-volume traffic. Deep reinforcement learning subsequently serves to refine hierarchical heavy hitters into effective filter rules that can be propagated upstream to discard traffic originating from attacking systems. Evaluating all filter rules requires only a single clock cycle when utilizing fast ternary content-addressable memory, which is commonly available in software defined networks. To outline the effectiveness of our approach, we conduct a comparative evaluation to reinforcement learning-based router throttling.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115154518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the derivation of AS hidden links and the Discovery of Critical AS 自治系统隐藏链路的推导与关键自治系统的发现研究
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843337
Jiangbin Chen, Yujing Liu, Shuhui Chen, Xiangquan Shi
AS relationships are the basis for studying Internet security, route hijacking, route leakage, etc. To obtain more complete AS relationships, using machine learning (ML) models to learn the similarity between adjacent link groups and predict hidden links is a method that can obtain more complete AS relationships. The features selected by the ML model have a large impact on the accuracy of the prediction results, and we extract 10 ML features by combining the actual geographic location information of AS. After our optimization, the accuracy of the prediction model reaches 91.57%. In the classification of hidden link types, we oversample the small sample type data and optimize the classifier, and the classification accuracy of hidden link categories reaches 97.42%. The recall rate of p2c and c2p links improved by 24.29% and 7.17%, respectively. We found that the hidden links caused the change of network traffic transmission routes by the change of "Critical AS" in the AS network. AS 3549 has the highest number of effective paths, and the network traffic prefers to choose the AS with a lower hierarchy for forwarding.
AS关系是研究网络安全、路由劫持、路由泄漏等问题的基础。为了获得更完整的AS关系,使用机器学习(ML)模型来学习相邻链接组之间的相似性并预测隐藏链接是一种可以获得更完整AS关系的方法。ML模型选择的特征对预测结果的准确性影响较大,我们结合AS的实际地理位置信息提取了10个ML特征。经过优化,预测模型的准确率达到91.57%。在隐藏链接类型分类中,我们对小样本类型数据进行过采样并对分类器进行优化,隐藏链接类别的分类准确率达到97.42%。p2c和c2p链路的召回率分别提高了24.29%和7.17%。我们发现隐藏链路是通过AS网络中“关键AS”的变化引起网络流量传输路由的变化。AS 3549的有效路径数量最多,网络流量更倾向于选择层次较低的AS进行转发。
{"title":"Research on the derivation of AS hidden links and the Discovery of Critical AS","authors":"Jiangbin Chen, Yujing Liu, Shuhui Chen, Xiangquan Shi","doi":"10.1109/LCN53696.2022.9843337","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843337","url":null,"abstract":"AS relationships are the basis for studying Internet security, route hijacking, route leakage, etc. To obtain more complete AS relationships, using machine learning (ML) models to learn the similarity between adjacent link groups and predict hidden links is a method that can obtain more complete AS relationships. The features selected by the ML model have a large impact on the accuracy of the prediction results, and we extract 10 ML features by combining the actual geographic location information of AS. After our optimization, the accuracy of the prediction model reaches 91.57%. In the classification of hidden link types, we oversample the small sample type data and optimize the classifier, and the classification accuracy of hidden link categories reaches 97.42%. The recall rate of p2c and c2p links improved by 24.29% and 7.17%, respectively. We found that the hidden links caused the change of network traffic transmission routes by the change of \"Critical AS\" in the AS network. AS 3549 has the highest number of effective paths, and the network traffic prefers to choose the AS with a lower hierarchy for forwarding.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127218523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic Solution 通过使用主动流量优先方法提高SDN的全局服务时间:一种启发式解决方案
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843558
Manuel Jiménez-Lázaro, J. Berrocal, J. Galán-Jiménez
A TCAM (Ternary Content-Addressable Memory) is a type of memory used in the flow tables of Software Defined Networking (SDN) nodes. Although these memories are very fast, their size is limited. This has an impact on the number of rules that can be installed, and an inefficient rule management can lead to a degradation of the network quality of service. In this work, an heuristic algorithm named Active Traffic First (ATF) is proposed to efficiently manage the content of the flow tables of the SDN nodes in order to maximize the Global Service Time (GST) of the active flows in the network. The idea behind ATF is adopted by deleting flows that are not being used in case a new flow aims to be served and there is no space available. Experimental results show that ATF outperforms other state-of-the-art solutions by improving GST and reducing re-installations.
TCAM(三元内容可寻址内存)是软件定义网络(SDN)节点流表中使用的一种内存。虽然这些存储器非常快,但它们的大小是有限的。这对可以安装的规则数量有影响,并且规则管理效率低下会导致网络服务质量的降低。本文提出一种主动流量优先(Active Traffic First, ATF)的启发式算法,对SDN节点流表内容进行有效管理,使网络中主动流的全局服务时间(Global Service Time, GST)最大化。ATF背后的思想是通过删除未被使用的流来实现的,以防新流的目标是服务,并且没有可用的空间。实验结果表明,通过提高GST和减少重新安装,ATF优于其他最先进的解决方案。
{"title":"Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic Solution","authors":"Manuel Jiménez-Lázaro, J. Berrocal, J. Galán-Jiménez","doi":"10.1109/LCN53696.2022.9843558","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843558","url":null,"abstract":"A TCAM (Ternary Content-Addressable Memory) is a type of memory used in the flow tables of Software Defined Networking (SDN) nodes. Although these memories are very fast, their size is limited. This has an impact on the number of rules that can be installed, and an inefficient rule management can lead to a degradation of the network quality of service. In this work, an heuristic algorithm named Active Traffic First (ATF) is proposed to efficiently manage the content of the flow tables of the SDN nodes in order to maximize the Global Service Time (GST) of the active flows in the network. The idea behind ATF is adopted by deleting flows that are not being used in case a new flow aims to be served and there is no space available. Experimental results show that ATF outperforms other state-of-the-art solutions by improving GST and reducing re-installations.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Intra-Slice Migration in Fog Computing 雾计算中的鲁棒片内迁移
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843470
Atefeh Talebian, Alvin Valera, Jyoti Sahni, W. Seah
Low latency is critical to applications such as control of unmanned aerial vehicles. Such latency-sensitive services can be hosted closer to the user at the fog layer which can reduce overall latency through the reduction of transmission time and network congestion. To keep the latency low for mobile users connected to services deployed at the fog, these services need to be constantly migrated to follow the users. Unlike the cloud nodes, fog nodes are less reliable and are therefore subject to higher failure rate. In this paper, we propose an enhancement to the post-copy live migration algorithm to make it robust against failure. Simulation results show that robust migration reduces total migration time between 10-26% and downtime between 2-23% compared to non-robust migration. Furthermore, when the bandwidth to the backup node is lower, robust migration provides further improvement in both metrics.
低延迟对于无人驾驶飞行器的控制等应用至关重要。这种对延迟敏感的服务可以托管在离用户更近的雾层,这可以通过减少传输时间和网络拥塞来减少总体延迟。为了保持连接到部署在雾中的服务的移动用户的低延迟,需要不断迁移这些服务以跟随用户。与云节点不同,雾节点的可靠性较低,故障率较高。在本文中,我们提出了一种增强后复制实时迁移算法,使其具有抗故障的鲁棒性。仿真结果表明,与非鲁棒迁移相比,鲁棒迁移可减少10-26%的总迁移时间和2-23%的停机时间。此外,当到备份节点的带宽较低时,健壮的迁移可以进一步改善这两个指标。
{"title":"Robust Intra-Slice Migration in Fog Computing","authors":"Atefeh Talebian, Alvin Valera, Jyoti Sahni, W. Seah","doi":"10.1109/LCN53696.2022.9843470","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843470","url":null,"abstract":"Low latency is critical to applications such as control of unmanned aerial vehicles. Such latency-sensitive services can be hosted closer to the user at the fog layer which can reduce overall latency through the reduction of transmission time and network congestion. To keep the latency low for mobile users connected to services deployed at the fog, these services need to be constantly migrated to follow the users. Unlike the cloud nodes, fog nodes are less reliable and are therefore subject to higher failure rate. In this paper, we propose an enhancement to the post-copy live migration algorithm to make it robust against failure. Simulation results show that robust migration reduces total migration time between 10-26% and downtime between 2-23% compared to non-robust migration. Furthermore, when the bandwidth to the backup node is lower, robust migration provides further improvement in both metrics.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT Security 为物联网安全开发可扩展的高交互威胁情报传感器网络
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843744
T. Zimmermann, Eric Lanfer, N. Aschenbruck
In the last decade, numerous Industrial IoT systems have been deployed. Attack vectors and security solutions for these are an active area of research. However, to the best of our knowledge, only very limited insight in the applicability and real-world comparability of attacks exists. To overcome this widespread problem, we have developed and realized an approach to collect attack traces at a larger scale. An easily deployable system integrates well into existing networks and enables the investigation of attacks on unmodified commercial devices.
在过去十年中,已经部署了许多工业物联网系统。攻击媒介和安全解决方案是一个活跃的研究领域。然而,据我们所知,对攻击的适用性和现实世界的可比性只有非常有限的了解。为了克服这个普遍存在的问题,我们开发并实现了一种更大规模收集攻击痕迹的方法。一个易于部署的系统可以很好地集成到现有的网络中,并且可以对未经修改的商业设备进行攻击调查。
{"title":"Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT Security","authors":"T. Zimmermann, Eric Lanfer, N. Aschenbruck","doi":"10.1109/LCN53696.2022.9843744","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843744","url":null,"abstract":"In the last decade, numerous Industrial IoT systems have been deployed. Attack vectors and security solutions for these are an active area of research. However, to the best of our knowledge, only very limited insight in the applicability and real-world comparability of attacks exists. To overcome this widespread problem, we have developed and realized an approach to collect attack traces at a larger scale. An easily deployable system integrates well into existing networks and enables the investigation of attacks on unmodified commercial devices.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Service Function Chaining in the Context of Zero Trust Security 零信任安全环境下的安全业务功能链
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843821
Leonard Bradatsch, M. Haeberle, Benjamin Steinert, F. Kargl, M. Menth
Service Function Chaining (SFC) enables dynamic steering of traffic through a set of service functions based on classification of packets, allowing network operators fine-grained and flexible control of packet flows. New paradigms like Zero Trust (ZT) pose additional requirements to the security of network architectures. This includes client authentication, confidentiality, and integrity throughout the whole network, while also being able to perform operations on the unencrypted payload of packets. However, these requirements are only partially addressed in existing SFC literature. Therefore, we first present a comprehensive analysis of the security requirements for SFC architectures. Based on this analysis, we propose a concept towards the fulfillment of the requirements while maintaining the flexibility of SFC. In addition, we provide and evaluate a proof of concept implementation, and discuss the implications of the design choices.
SFC (Service Function chains)是一种基于报文分类,通过一组业务功能对流量进行动态引导的技术,使网络运营商能够对报文流进行细粒度、灵活的控制。像零信任(ZT)这样的新范式对网络架构的安全性提出了额外的要求。这包括整个网络中的客户端身份验证、机密性和完整性,同时还能够对未加密的数据包有效负载执行操作。然而,这些要求在现有的SFC文献中只得到部分解决。因此,我们首先对SFC架构的安全需求进行了全面的分析。基于这一分析,我们提出了一个在保持SFC灵活性的同时满足需求的概念。此外,我们提供并评估了概念实现的证明,并讨论了设计选择的影响。
{"title":"Secure Service Function Chaining in the Context of Zero Trust Security","authors":"Leonard Bradatsch, M. Haeberle, Benjamin Steinert, F. Kargl, M. Menth","doi":"10.1109/LCN53696.2022.9843821","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843821","url":null,"abstract":"Service Function Chaining (SFC) enables dynamic steering of traffic through a set of service functions based on classification of packets, allowing network operators fine-grained and flexible control of packet flows. New paradigms like Zero Trust (ZT) pose additional requirements to the security of network architectures. This includes client authentication, confidentiality, and integrity throughout the whole network, while also being able to perform operations on the unencrypted payload of packets. However, these requirements are only partially addressed in existing SFC literature. Therefore, we first present a comprehensive analysis of the security requirements for SFC architectures. Based on this analysis, we propose a concept towards the fulfillment of the requirements while maintaining the flexibility of SFC. In addition, we provide and evaluate a proof of concept implementation, and discuss the implications of the design choices.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AlcFier: Adaptive Self-Learning Classifier for Routing in Vehicular Ad-Hoc Network 自适应自学习分类器在车辆自组织网络中的路由
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843737
Ankur Nahar, Himani Sikarwar, D. Das
This paper presents an adaptive self-learning classifier-based clustering algorithm called AlcFier, to support scalability, enhance the stability of the network topology, and provide efficient routing. We incorporate mobility and channel characteristics (i.e., orientation, adjacency, link availability, queue occupancy, and signal-to-noise ratio) into the clustering approach as a channel-aware metric to provide a new direction to the taxonomy of the approaches employed to handle cluster head election, cluster affiliation, and cluster administration challenges. Experimental results show that AlcFier performs efficiently, improves cluster stability, reduces transmission delays, and improves throughput compared with the state-of-the-art routing protocols.
本文提出了一种基于自适应自学习分类器的聚类算法AlcFier,以支持可扩展性,增强网络拓扑的稳定性,并提供高效的路由。我们将移动性和通道特征(即方向、邻接性、链路可用性、队列占用和信噪比)作为通道感知度量纳入集群方法,为用于处理集群头选举、集群隶属关系和集群管理挑战的方法分类提供了新的方向。实验结果表明,与现有的路由协议相比,AlcFier的性能更好,提高了集群的稳定性,降低了传输延迟,提高了吞吐量。
{"title":"AlcFier: Adaptive Self-Learning Classifier for Routing in Vehicular Ad-Hoc Network","authors":"Ankur Nahar, Himani Sikarwar, D. Das","doi":"10.1109/LCN53696.2022.9843737","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843737","url":null,"abstract":"This paper presents an adaptive self-learning classifier-based clustering algorithm called AlcFier, to support scalability, enhance the stability of the network topology, and provide efficient routing. We incorporate mobility and channel characteristics (i.e., orientation, adjacency, link availability, queue occupancy, and signal-to-noise ratio) into the clustering approach as a channel-aware metric to provide a new direction to the taxonomy of the approaches employed to handle cluster head election, cluster affiliation, and cluster administration challenges. Experimental results show that AlcFier performs efficiently, improves cluster stability, reduces transmission delays, and improves throughput compared with the state-of-the-art routing protocols.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134182099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Slicing Weighted Energy-Harvesting Wireless Sensing Networks with Transmission Range Uncertainty 传输距离不确定的切片加权能量采集无线传感网络研究
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843733
Salwa Abougamila, Mohammed Elmorsy, E. Elmallah
In this paper, we deal with a wireless sensor network (WSN) infrastructure management problem where a provider wants to partition a network into a given number of node-disjoint subgraphs (called slices) for running different user applications. Nodes in the given infrastructure use energy harvesting for prolonged service time. The nodes manage fluctuations in their stored energy by adjusting their transmission range. We assume that each node is assigned an importance weight, and model the overall network using a probabilistic graph. In this context, we formalize a problem, denoted k-WBS-RU (for k weighted balanced slices with range uncertainty), to partition the network into k slices subject to some connectivity and operation constraints. We devise a solution to the problem, and present numerical results on the quality of the obtained slices. We also discuss an application of the proposed framework and solution when the assigned weights are derived from an area coverage application.
在本文中,我们处理无线传感器网络(WSN)基础设施管理问题,其中提供商希望将网络划分为给定数量的节点不相交子图(称为切片),以运行不同的用户应用程序。给定基础设施中的节点使用能量收集来延长服务时间。节点通过调整传输范围来控制存储能量的波动。我们假设每个节点被分配一个重要权重,并使用概率图对整个网络建模。在这种情况下,我们形式化了一个问题,记作k- wbs - ru(对于k个具有范围不确定性的加权平衡片),在一些连通性和操作约束下将网络划分为k个片。我们设计了一个解决这个问题的方法,并给出了得到的切片质量的数值结果。当分配的权重来自区域覆盖应用程序时,我们还讨论了所建议的框架和解决方案的应用。
{"title":"On Slicing Weighted Energy-Harvesting Wireless Sensing Networks with Transmission Range Uncertainty","authors":"Salwa Abougamila, Mohammed Elmorsy, E. Elmallah","doi":"10.1109/LCN53696.2022.9843733","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843733","url":null,"abstract":"In this paper, we deal with a wireless sensor network (WSN) infrastructure management problem where a provider wants to partition a network into a given number of node-disjoint subgraphs (called slices) for running different user applications. Nodes in the given infrastructure use energy harvesting for prolonged service time. The nodes manage fluctuations in their stored energy by adjusting their transmission range. We assume that each node is assigned an importance weight, and model the overall network using a probabilistic graph. In this context, we formalize a problem, denoted k-WBS-RU (for k weighted balanced slices with range uncertainty), to partition the network into k slices subject to some connectivity and operation constraints. We devise a solution to the problem, and present numerical results on the quality of the obtained slices. We also discuss an application of the proposed framework and solution when the assigned weights are derived from an area coverage application.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133905326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 47th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1