首页 > 最新文献

2018 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

英文 中文
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis 基于agent Vs .无agent的动态行为分析沙盒
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635598
Muhammad Ali, S. Shiaeles, M. Papadaki, B. Ghita
Malicious software is detected and classified by either static analysis or dynamic analysis. In static analysis, malware samples are reverse engineered and analyzed so that signatures of malware can be constructed. These techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a controlled environment using the sandboxing technique, in order to model the behavior of malware. In this paper, we have analyzed Petya, Spyeye, VolatileCedar, PAFISH etc. through Agent-based and Agentless dynamic sandbox systems in order to investigate and benchmark their efficiency in advanced malware detection.
恶意软件的检测和分类分为静态分析和动态分析两种。在静态分析中,恶意软件样本被逆向工程和分析,从而可以构建恶意软件的签名。这些技术可以很容易地通过多态、变形恶意软件、混淆和打包技术来挫败,而在动态分析中,恶意软件样本是在使用沙箱技术的受控环境中执行的,以便对恶意软件的行为进行建模。在本文中,我们通过基于代理和无代理的动态沙箱系统分析了Petya, Spyeye, VolatileCedar, PAFISH等,以调查和基准测试它们在高级恶意软件检测中的效率。
{"title":"Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis","authors":"Muhammad Ali, S. Shiaeles, M. Papadaki, B. Ghita","doi":"10.1109/GIIS.2018.8635598","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635598","url":null,"abstract":"Malicious software is detected and classified by either static analysis or dynamic analysis. In static analysis, malware samples are reverse engineered and analyzed so that signatures of malware can be constructed. These techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a controlled environment using the sandboxing technique, in order to model the behavior of malware. In this paper, we have analyzed Petya, Spyeye, VolatileCedar, PAFISH etc. through Agent-based and Agentless dynamic sandbox systems in order to investigate and benchmark their efficiency in advanced malware detection.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of LoraWan physical layer integration on IoT devices LoraWan物理层在物联网设备上集成的性能评估
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635715
C. Bouras, V. Kokkinos, Nikolaos Papachristos
Due to the constant motion of wireless devices in the Internet of Things $(mathrm {I}mathrm {o}mathrm {T})$, current wireless networks cannot provide connectivity in each case using altering topolgoies, in comparison with ad hoc networks. LoraWan, as a Long Range Wide Area Network recommended by the LoRa Alliance, is an upcoming candidate for low power and long distance communication $mathrm {I}mathrm {o}mathrm {T}$ environments and applications to different concepts such as tracking, healthcare agriculture. This $mathrm {I}mathrm {o}mathrm {T}$ concept is gaining a rapid growth on the $mathrm {I}mathrm {o}mathrm {T}$ market and is simultaneously improving our living environment. In this paper, we first briefly introduce LoRa as an efficient solution of physical layer integration on the $mathrm {I}mathrm {o}mathrm {T}$ devices. We then conduct a performance evaluation taking into consideration values such as bit error rate, time on air transmission based on Signal to Noise Ratio (SNR) and Spreading Factors modifications for different bandwidth values.
由于物联网$( mathm {I} mathm {o} mathm {T})$中无线设备的不断运动,与自组织网络相比,当前的无线网络无法通过改变拓扑来提供每种情况下的连接。LoraWan是LoRa联盟推荐的一种远程广域网,是低功耗和长距离通信环境的候选者,适用于跟踪、医疗保健、农业等不同概念。这个$ mathm {I} mathm {o} mathm {T}$概念在$ mathm {I} mathm {o} mathm {T}$市场上得到了快速的发展,同时也改善了我们的生活环境。本文首先简要介绍了LoRa作为$ mathm {I} mathm {o} mathm {T}$器件上物理层集成的有效解决方案。然后,我们将考虑误码率、基于信噪比(SNR)的空气传输时间以及不同带宽值的扩展因子修改等值进行性能评估。
{"title":"Performance evaluation of LoraWan physical layer integration on IoT devices","authors":"C. Bouras, V. Kokkinos, Nikolaos Papachristos","doi":"10.1109/GIIS.2018.8635715","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635715","url":null,"abstract":"Due to the constant motion of wireless devices in the Internet of Things $(mathrm {I}mathrm {o}mathrm {T})$, current wireless networks cannot provide connectivity in each case using altering topolgoies, in comparison with ad hoc networks. LoraWan, as a Long Range Wide Area Network recommended by the LoRa Alliance, is an upcoming candidate for low power and long distance communication $mathrm {I}mathrm {o}mathrm {T}$ environments and applications to different concepts such as tracking, healthcare agriculture. This $mathrm {I}mathrm {o}mathrm {T}$ concept is gaining a rapid growth on the $mathrm {I}mathrm {o}mathrm {T}$ market and is simultaneously improving our living environment. In this paper, we first briefly introduce LoRa as an efficient solution of physical layer integration on the $mathrm {I}mathrm {o}mathrm {T}$ devices. We then conduct a performance evaluation taking into consideration values such as bit error rate, time on air transmission based on Signal to Noise Ratio (SNR) and Spreading Factors modifications for different bandwidth values.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
IoT Physical Layer Security Enhancement 物联网物理层安全增强
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635755
D. Efstathiou
Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices. In this paper, we propose a simple technique to increase physical layer security performance for IoT devices, taking advantage of the OFDM transmission characteristics.
在物联网(IoT)中,卓越的安全质量非常重要。过去几年,人们对部署适合低功耗限制和最先进物联网设备复杂性特征的安全技术的研究兴趣越来越大。在本文中,我们提出了一种简单的技术来提高物联网设备的物理层安全性能,利用OFDM传输特性。
{"title":"IoT Physical Layer Security Enhancement","authors":"D. Efstathiou","doi":"10.1109/GIIS.2018.8635755","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635755","url":null,"abstract":"Excellent quality of security is very important in Internet of Things (IoT). The last few years there has been an increased research interest to deploy security techniques that fit to the low power constraints and complexity features of state-of-the art IoT devices. In this paper, we propose a simple technique to increase physical layer security performance for IoT devices, taking advantage of the OFDM transmission characteristics.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115340941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Multi-Channel Offset Assignment for Reliable IEEE 802.15.4 TSCH Networks 可靠IEEE 802.15.4 TSCH网络的自适应多通道偏移分配
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635751
Vasileios Kotsiou, Georgios Z. Papadopoulos, P. Chatzimisios, Fabrice Théoleyre
More and more IoT applications require low-power operations and high reliability (close to 100%). Unfortunately, radio transmissions are unreliable by nature since they are prone to collision and external interference. The IEEE 802.15.4–2015 TSCH standard has been recently proposed to provide high reliability through radio channel hopping and by appropriately scheduling all the transmissions. Since some of the radio channels still suffer from external interference, blacklisting techniques consist in detecting bad radio channels, and in privileging the good ones to transmit the packets. MABO-TSCH is a centralized scheduling algorithm which allocates several channel offsets to allow each radio link to apply a localized blacklist. However, such strategy is inefficient for large blacklists. In this study, we propose to allocate the channel offsets dynamically at each timeslot according to the number of parallel transmissions, while still avoiding collisions. We evaluate the performance of our solution relying on a real experimental dataset, highlighting the relevance of dynamic and per timeslot channel offset assignment for environments with high external interference, such as a smart building.
越来越多的物联网应用需要低功耗运行和高可靠性(接近100%)。不幸的是,无线电传输本质上是不可靠的,因为它们容易受到碰撞和外部干扰。IEEE 802.15.4-2015 TSCH标准最近被提出,通过无线电信道跳变和适当调度所有传输来提供高可靠性。由于一些无线电信道仍然受到外部干扰,黑名单技术包括检测坏的无线电信道,并赋予好的无线电信道传输数据包的特权。MABO-TSCH是一种集中式调度算法,它分配多个信道偏移量,允许每个无线电链路应用本地化黑名单。然而,这种策略对于大型黑名单来说是低效的。在本研究中,我们提出在每个时隙根据并行传输的数量动态分配信道偏移,同时仍然避免冲突。我们根据真实的实验数据集评估了我们的解决方案的性能,突出了动态和每个时隙信道偏移分配在高外部干扰环境(如智能建筑)中的相关性。
{"title":"Adaptive Multi-Channel Offset Assignment for Reliable IEEE 802.15.4 TSCH Networks","authors":"Vasileios Kotsiou, Georgios Z. Papadopoulos, P. Chatzimisios, Fabrice Théoleyre","doi":"10.1109/GIIS.2018.8635751","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635751","url":null,"abstract":"More and more IoT applications require low-power operations and high reliability (close to 100%). Unfortunately, radio transmissions are unreliable by nature since they are prone to collision and external interference. The IEEE 802.15.4–2015 TSCH standard has been recently proposed to provide high reliability through radio channel hopping and by appropriately scheduling all the transmissions. Since some of the radio channels still suffer from external interference, blacklisting techniques consist in detecting bad radio channels, and in privileging the good ones to transmit the packets. MABO-TSCH is a centralized scheduling algorithm which allocates several channel offsets to allow each radio link to apply a localized blacklist. However, such strategy is inefficient for large blacklists. In this study, we propose to allocate the channel offsets dynamically at each timeslot according to the number of parallel transmissions, while still avoiding collisions. We evaluate the performance of our solution relying on a real experimental dataset, highlighting the relevance of dynamic and per timeslot channel offset assignment for environments with high external interference, such as a smart building.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks 面向未来集成m2m -卫星网络的物联网应用协议优化
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635784
R. Soua, M. Palattella, T. Engel
Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for Internet of Things (IoT) are well recognised, to allow a smooth integration of Machine-toMachine (M2M) and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP), identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2MSatellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links.
卫星在推动实现真正互联世界的愿景方面发挥着关键作用,在其他地面技术无法实现的地方提供无处不在的覆盖和可靠性。虽然卫星在物联网(IoT)方面的潜力得到了充分的认识,但为了实现机器对机器(M2M)和卫星网络的顺利整合,仍需要进行大量的调整和优化。由欧洲航天局(ESA)资助的M2MSAT项目正在填补这一空白,研究消息队列遥测传输(MQTT)和约束应用协议(CoAP)的优化,确定为适合卫星上物联网数据收集的物联网应用协议。本文概述了集成m2m卫星网络中MQTT和CoAP的有效配置,并提出了一些考虑到卫星链路特性的优化设计。
{"title":"IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks","authors":"R. Soua, M. Palattella, T. Engel","doi":"10.1109/GIIS.2018.8635784","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635784","url":null,"abstract":"Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for Internet of Things (IoT) are well recognised, to allow a smooth integration of Machine-toMachine (M2M) and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP), identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2MSatellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
There is No Need to Waste Communication Bandwidth on MACs 无需在mac上浪费通信带宽
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635779
M. Kounavis, David M. Durham, Sergej Deutsch, Saeedeh Komijani, Antonios Papadimitriou, K. Grewal
We address the problem of detecting data corruption in computer and device communications without generating, transmitting or verifying integrity metadata. Such metadata typically hold mathematical summaries of the content which is being transmitted, such as checksums, Integrity Check Values (ICVs) or Message Authentication Codes (MACs), and are costly to generate and transmit. In the paper we discuss a data integrity methodology, which is alternative to MACs or ICVs, and is based on a novel concept of ‘implicit integrity’. Implicit integrity supports the detection of corruption based on the observation that regular unencrypted user data typically exhibit patterns, such as repeated bytes words etc. When some encrypted content becomes corrupted and is decrypted, it no longer exhibits patterns. It is the absence or presence of patterns in decrypted content which denotes whether some content is modified or not. In the paper we summarize some of our findings including discovered entropy properties of server and client data, security bounds associated with implicit integrity and proposals for constructions that are practical and can be used in communication systems, supporting implicit integrity at low cost.
我们解决了在不生成、传输或验证完整性元数据的情况下检测计算机和设备通信中的数据损坏的问题。此类元数据通常包含正在传输的内容的数学摘要,例如校验和、完整性检查值(icv)或消息身份验证码(mac),生成和传输成本很高。在本文中,我们讨论了一种数据完整性方法,它可以替代mac或icv,并且基于“隐式完整性”的新概念。隐式完整性支持基于对常规未加密用户数据通常表现出模式(如重复的字节、字等)的观察来检测损坏。当某些加密内容损坏并被解密时,它将不再显示模式。解密内容中模式的缺失或存在表示某些内容是否被修改。在本文中,我们总结了我们的一些发现,包括发现的服务器和客户端数据的熵属性,与隐式完整性相关的安全边界以及可用于通信系统的实用结构的建议,以低成本支持隐式完整性。
{"title":"There is No Need to Waste Communication Bandwidth on MACs","authors":"M. Kounavis, David M. Durham, Sergej Deutsch, Saeedeh Komijani, Antonios Papadimitriou, K. Grewal","doi":"10.1109/GIIS.2018.8635779","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635779","url":null,"abstract":"We address the problem of detecting data corruption in computer and device communications without generating, transmitting or verifying integrity metadata. Such metadata typically hold mathematical summaries of the content which is being transmitted, such as checksums, Integrity Check Values (ICVs) or Message Authentication Codes (MACs), and are costly to generate and transmit. In the paper we discuss a data integrity methodology, which is alternative to MACs or ICVs, and is based on a novel concept of ‘implicit integrity’. Implicit integrity supports the detection of corruption based on the observation that regular unencrypted user data typically exhibit patterns, such as repeated bytes words etc. When some encrypted content becomes corrupted and is decrypted, it no longer exhibits patterns. It is the absence or presence of patterns in decrypted content which denotes whether some content is modified or not. In the paper we summarize some of our findings including discovered entropy properties of server and client data, security bounds associated with implicit integrity and proposals for constructions that are practical and can be used in communication systems, supporting implicit integrity at low cost.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1979 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130234137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collision-Free Sensor Data Collection using LoRaWAN and Drones 使用LoRaWAN和无人机的无碰撞传感器数据收集
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635601
Dimitrios Zorbas, B. O’flynn
An open issue in Wireless Sensor Networks (WSNs) is the data collection from nodes placed at distant positions where no Internet or fixed gateway coverage is available. In this paper, we propose a reliable and energy-efficient solution using drones as mobile gateways that periodically fly over the network and collect data. We consider a point-to-point communication model between the nodes and the drones using the LoRaWAN communication protocol. Due to the nature of the default LoRaWAN MAC protocol, we modify its ALOHA-style transmission policy introducing a synchronized time-scheduled transmission mechanism to eliminate potential packet collisions. Simulation results show that a single drone can collect the data of an entire day (5760 bytes) of an area of more than $1500times 1500m^{2}$ and 80 nodes while achieving 0% packet collisions.
无线传感器网络(wsn)中的一个开放问题是从没有互联网或固定网关覆盖的远距离节点收集数据。在本文中,我们提出了一种可靠且节能的解决方案,使用无人机作为移动网关,定期飞越网络并收集数据。我们考虑使用LoRaWAN通信协议在节点和无人机之间建立点对点通信模型。由于默认的LoRaWAN MAC协议的性质,我们修改了它的aloha式传输策略,引入了同步的时间调度传输机制,以消除潜在的数据包冲突。仿真结果表明,单架无人机可以在超过$1500times 1500m^{2}$和80个节点的面积上收集一整天(5760字节)的数据,同时实现0%的数据包冲突。
{"title":"Collision-Free Sensor Data Collection using LoRaWAN and Drones","authors":"Dimitrios Zorbas, B. O’flynn","doi":"10.1109/GIIS.2018.8635601","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635601","url":null,"abstract":"An open issue in Wireless Sensor Networks (WSNs) is the data collection from nodes placed at distant positions where no Internet or fixed gateway coverage is available. In this paper, we propose a reliable and energy-efficient solution using drones as mobile gateways that periodically fly over the network and collect data. We consider a point-to-point communication model between the nodes and the drones using the LoRaWAN communication protocol. Due to the nature of the default LoRaWAN MAC protocol, we modify its ALOHA-style transmission policy introducing a synchronized time-scheduled transmission mechanism to eliminate potential packet collisions. Simulation results show that a single drone can collect the data of an entire day (5760 bytes) of an area of more than $1500times 1500m^{2}$ and 80 nodes while achieving 0% packet collisions.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
NBIoT Random Access Procedure: System Simulation and Performance NBIoT随机存取程序:系统仿真与性能
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635738
Aarón Garrido Martín, R. P. Leal, A. G. Armada, A. Fernández-Durán
The 3rd Generation Partnership Project (3GPP) has defined the Narrow-Band Internet of Things (NBIoT) standard in Long Term Evolution release 13. This paper presents a model of the NB-IoT random-access procedure (RAP) and analyzes and compares its performance allowing decision-making from a system point of view. It includes a fully configurable signal propagation model, and quantifies the number of users camped on a cell and cell and RAP configuration parameters. The paper shows a novel framework to evaluate the RAP proposed in NB-IoT Re1–13 standard with a comprehensive and realistic approach. The contention-based random access is treated considering Msg3 collisions of the RAP instead of the Msgl collisions, where Msgl collisions are treated as a multi-path transmission. This framework includes the machine traffic generation models defined by the 3GPP, the radio transmission effect on the probability of access success, and the random-access (RA) itself. From the foregoing, single-tone and multi-tone transmission performance results have been obtained to show the impact of some parameters that are not typically considered such as the Msg3 transmission mode, Msg3 modulation and coding scheme (MCS), the use of power control mechanisms, and the power ramping step. The results provide interesting information about how these configuration parameters impact on the RAP global performance and insight into its evolution in future systems.
第三代合作伙伴计划(3GPP)在长期演进第13版中定义了窄带物联网(NBIoT)标准。本文提出了一种NB-IoT随机存取程序(RAP)模型,并从系统的角度对其性能进行了分析和比较。它包括一个完全可配置的信号传播模型,并量化驻留在小区、小区和RAP配置参数上的用户数量。本文展示了一个新的框架,以全面和现实的方法来评估NB-IoT Re1-13标准中提出的RAP。考虑RAP的Msg3冲突而不是Msgl冲突来处理基于争用的随机访问,其中Msgl冲突被视为多路径传输。该框架包括3GPP定义的机器流量生成模型、无线传输对访问成功概率的影响以及随机访问(RA)本身。由此,单音和多音传输性能结果显示了一些通常不被考虑的参数的影响,如Msg3的传输模式、Msg3的调制和编码方案(MCS)、功率控制机制的使用以及功率斜坡步进。结果提供了有关这些配置参数如何影响RAP全局性能的有趣信息,并深入了解RAP在未来系统中的演变。
{"title":"NBIoT Random Access Procedure: System Simulation and Performance","authors":"Aarón Garrido Martín, R. P. Leal, A. G. Armada, A. Fernández-Durán","doi":"10.1109/GIIS.2018.8635738","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635738","url":null,"abstract":"The 3rd Generation Partnership Project (3GPP) has defined the Narrow-Band Internet of Things (NBIoT) standard in Long Term Evolution release 13. This paper presents a model of the NB-IoT random-access procedure (RAP) and analyzes and compares its performance allowing decision-making from a system point of view. It includes a fully configurable signal propagation model, and quantifies the number of users camped on a cell and cell and RAP configuration parameters. The paper shows a novel framework to evaluate the RAP proposed in NB-IoT Re1–13 standard with a comprehensive and realistic approach. The contention-based random access is treated considering Msg3 collisions of the RAP instead of the Msgl collisions, where Msgl collisions are treated as a multi-path transmission. This framework includes the machine traffic generation models defined by the 3GPP, the radio transmission effect on the probability of access success, and the random-access (RA) itself. From the foregoing, single-tone and multi-tone transmission performance results have been obtained to show the impact of some parameters that are not typically considered such as the Msg3 transmission mode, Msg3 modulation and coding scheme (MCS), the use of power control mechanisms, and the power ramping step. The results provide interesting information about how these configuration parameters impact on the RAP global performance and insight into its evolution in future systems.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125747310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Securing IoT Devices Using Robust DRAM PUFs 使用稳健的DRAM puf保护物联网设备
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635789
N. Anagnostopoulos, T. Arul, Yufan Fan, C. Hatzfeld, J. Lotichius, Ratika Sharma, Felipe Fernandes, Fatemeh Tehranipoor, S. Katzenbeisser
In this work, we present a novel way in which DRAM modules, which are found inherently in many IoT devices, can be used to enhance the security of such devices. We test the robustness of two DRAM-based security primitives, namely DRAM retention-based PUFs and Row Hammer PUFs, to two external factors, i.e., ambient temperature and voltage variations. As both types of PUFs are proven to be highly dependent on temperature, we, then, present and discuss ways in which such PUFs can be used to implement cryptographic applications in a robust way, no longer being affected by temperature variations. Finally, we also present a proof-of-concept robust DRAM PUF-based cryptographic protocol that can be adapted for different security applications. In this way, our work demonstrates a cost-efficient, lightweight and practical manner in which even low-end, resource-constrained IoT devices can be easily protected.
在这项工作中,我们提出了一种新颖的方法,可以使用许多物联网设备中固有的DRAM模块来增强此类设备的安全性。我们测试了两种基于DRAM的安全原语(即基于DRAM保留的puf和Row Hammer puf)对两个外部因素(即环境温度和电压变化)的鲁棒性。由于这两种类型的puf都被证明高度依赖于温度,因此,我们提出并讨论了如何使用这些puf以稳健的方式实现加密应用程序,而不再受温度变化的影响。最后,我们还提出了一个概念验证的健壮的基于DRAM puf的加密协议,可以适应不同的安全应用。通过这种方式,我们的工作展示了一种经济高效,轻量级和实用的方式,即使是低端,资源受限的物联网设备也可以轻松保护。
{"title":"Securing IoT Devices Using Robust DRAM PUFs","authors":"N. Anagnostopoulos, T. Arul, Yufan Fan, C. Hatzfeld, J. Lotichius, Ratika Sharma, Felipe Fernandes, Fatemeh Tehranipoor, S. Katzenbeisser","doi":"10.1109/GIIS.2018.8635789","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635789","url":null,"abstract":"In this work, we present a novel way in which DRAM modules, which are found inherently in many IoT devices, can be used to enhance the security of such devices. We test the robustness of two DRAM-based security primitives, namely DRAM retention-based PUFs and Row Hammer PUFs, to two external factors, i.e., ambient temperature and voltage variations. As both types of PUFs are proven to be highly dependent on temperature, we, then, present and discuss ways in which such PUFs can be used to implement cryptographic applications in a robust way, no longer being affected by temperature variations. Finally, we also present a proof-of-concept robust DRAM PUF-based cryptographic protocol that can be adapted for different security applications. In this way, our work demonstrates a cost-efficient, lightweight and practical manner in which even low-end, resource-constrained IoT devices can be easily protected.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Power Consumption and Throughput of Wireless Communication Technologies for Smartphones 智能手机无线通信技术的功耗和吞吐量
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635665
Evan Fallis, P. Spachos
As the popularity of smartphones increases, so does the need for their power efficiency. Many hardware components such as sensors are added to smartphones which contribute to higher power consumption. Although battery efficiency tries to balance this issue, sometimes it is not enough. In this paper, we evaluate the power consumption, throughput, and data transmission efficiency of three wireless technologies on smartphones. Specifically, through extensive experimentation, we examine the performance of Wi-Fi, Bluetooth and LTE of four smartphones. The results can help designers estimate the power usage of wireless technologies commonly found in smartphones of today.
随着智能手机的普及,对其能效的需求也在增加。智能手机中添加了传感器等许多硬件组件,这导致了更高的功耗。虽然电池效率试图平衡这个问题,但有时是不够的。在本文中,我们评估了三种无线技术在智能手机上的功耗、吞吐量和数据传输效率。具体来说,通过大量的实验,我们研究了四款智能手机的Wi-Fi、蓝牙和LTE的性能。研究结果可以帮助设计师估计当今智能手机中常用的无线技术的用电量。
{"title":"Power Consumption and Throughput of Wireless Communication Technologies for Smartphones","authors":"Evan Fallis, P. Spachos","doi":"10.1109/GIIS.2018.8635665","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635665","url":null,"abstract":"As the popularity of smartphones increases, so does the need for their power efficiency. Many hardware components such as sensors are added to smartphones which contribute to higher power consumption. Although battery efficiency tries to balance this issue, sometimes it is not enough. In this paper, we evaluate the power consumption, throughput, and data transmission efficiency of three wireless technologies on smartphones. Specifically, through extensive experimentation, we examine the performance of Wi-Fi, Bluetooth and LTE of four smartphones. The results can help designers estimate the power usage of wireless technologies commonly found in smartphones of today.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 Global Information Infrastructure and Networking Symposium (GIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1