Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365304
M. Damasceno, J. A. Arnez, Walmir Acioli E Silva, Caio B. Bezerra De Souza, Renata K. Gomes Dos Reis, Lucas Beltrão Cavalcante Tribuzy
The emergency call (eCall) service is an important part of the mobile communication networks since helps mobile users to be able to communicate during alert circumstances. eCall services were already widely used by 3G networks and can be utilized by 4G Long-Term Evolution (LTE) networks as well as by Wireless Local Network (WLAN) networks, both of them using IP Multimedia Subsystem (IMS) core. The present paper provides a guideline about how eCall services are used in Voice over Long-Term Evolution (VoLTE) and Voice over Wi-Fi (VoWiFi) technologies over IMS. Furthermore, the work assesses the Quality of Service (QoS) of calls over VoLTE and VoWiFi. Additionally, using a packet analyzer software, there were analyzed in detail the Session Initiation Protocol (SIP) message headers, the way each technology collects the information of the user location and the signaling process for eCall over VoLTE and VoWiFi.
紧急呼叫(eCall)服务是移动通信网络的重要组成部分,可帮助移动用户在紧急情况下进行通信。eCall 服务已在 3G 网络中广泛使用,并可在 4G 长期演进(LTE)网络和无线局域网(WLAN)网络中使用,这两种网络都使用 IP 多媒体子系统(IMS)核心。本文就如何将 eCall 服务用于 IMS 上的长期演进语音(VoLTE)和 Wi-Fi 语音(VoWiFi)技术提供了指导。此外,本文还评估了 VoLTE 和 VoWiFi 通话的服务质量(QoS)。此外,还使用数据包分析软件详细分析了会话启动协议(SIP)信息头、每种技术收集用户位置信息的方式以及 VoLTE 和 VoWiFi eCall 的信令过程。
{"title":"Comparison between Emergency Calls over VoLTE and VoWiFi using IMS network","authors":"M. Damasceno, J. A. Arnez, Walmir Acioli E Silva, Caio B. Bezerra De Souza, Renata K. Gomes Dos Reis, Lucas Beltrão Cavalcante Tribuzy","doi":"10.1109/CommNet60167.2023.10365304","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365304","url":null,"abstract":"The emergency call (eCall) service is an important part of the mobile communication networks since helps mobile users to be able to communicate during alert circumstances. eCall services were already widely used by 3G networks and can be utilized by 4G Long-Term Evolution (LTE) networks as well as by Wireless Local Network (WLAN) networks, both of them using IP Multimedia Subsystem (IMS) core. The present paper provides a guideline about how eCall services are used in Voice over Long-Term Evolution (VoLTE) and Voice over Wi-Fi (VoWiFi) technologies over IMS. Furthermore, the work assesses the Quality of Service (QoS) of calls over VoLTE and VoWiFi. Additionally, using a packet analyzer software, there were analyzed in detail the Session Initiation Protocol (SIP) message headers, the way each technology collects the information of the user location and the signaling process for eCall over VoLTE and VoWiFi.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"50 9","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365252
Alireza Sadighian, Ines Abbes, Gabriele Oligeri
Online social networks (OSNs) spread information worldwide and in a fast and effective way. Given the terrific number of sources, OSNs can be used for event forecasting and its characterization. Although the vast majority of information is noise, OSNs can be a source of data for the early detection and characterization of malware spreading-this representing a significant advantage for the defense team, which can be informed much in advance of when the malware affects the system. In this paper, we propose an early malware characterization technique that combines statistical analysis with Natural Language Processing (NLP). Using this approach, we analyze various malware behaviors over time and discover their characteristics, such as target system types, target applications, vulnerabilities, locations, propagation scale, etc., in order to appropriately prevent/detect/mitigate their malicious activities and implement suitable actions effectively. We tested and evaluated our approach on a dataset collected from Twitter that includes widespread ransomware indicators. The results show that our approach is effective in early characterizing various types of malware, thus can be considered as one of the first line of defense.
在线社交网络(OSN)以快速有效的方式在全球范围内传播信息。鉴于信息来源的巨大数量,OSN 可用于事件预测及其特征描述。虽然绝大多数信息都是噪音,但 OSN 可以成为早期检测和鉴定恶意软件传播的数据源,这对防御团队来说是一个重大优势,因为他们可以在恶意软件影响系统之前提前获得信息。在本文中,我们提出了一种结合统计分析和自然语言处理(NLP)的早期恶意软件特征描述技术。利用这种方法,我们可以分析恶意软件在一段时间内的各种行为,发现它们的特征,如目标系统类型、目标应用程序、漏洞、位置、传播规模等,从而适当地预防/检测/缓解它们的恶意活动,并有效地实施适当的行动。我们在从 Twitter 收集的数据集上测试并评估了我们的方法,该数据集包含了广泛的勒索软件指标。结果表明,我们的方法能有效地对各种类型的恶意软件进行早期特征描述,因此可被视为第一道防线之一。
{"title":"Early Malware Characterization based on Online Social Networks","authors":"Alireza Sadighian, Ines Abbes, Gabriele Oligeri","doi":"10.1109/CommNet60167.2023.10365252","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365252","url":null,"abstract":"Online social networks (OSNs) spread information worldwide and in a fast and effective way. Given the terrific number of sources, OSNs can be used for event forecasting and its characterization. Although the vast majority of information is noise, OSNs can be a source of data for the early detection and characterization of malware spreading-this representing a significant advantage for the defense team, which can be informed much in advance of when the malware affects the system. In this paper, we propose an early malware characterization technique that combines statistical analysis with Natural Language Processing (NLP). Using this approach, we analyze various malware behaviors over time and discover their characteristics, such as target system types, target applications, vulnerabilities, locations, propagation scale, etc., in order to appropriately prevent/detect/mitigate their malicious activities and implement suitable actions effectively. We tested and evaluated our approach on a dataset collected from Twitter that includes widespread ransomware indicators. The results show that our approach is effective in early characterizing various types of malware, thus can be considered as one of the first line of defense.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"23 4","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365272
Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih
In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.
{"title":"DoS Attack Detection with NIDS in Docker Environment","authors":"Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih","doi":"10.1109/CommNet60167.2023.10365272","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365272","url":null,"abstract":"In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"48 10","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365286
Cheng-Yen Lee, Kyler R. Scott, Sunil P. Khatri, Ali Ghrayeb
As the use of low-power Internet of Things (IoT) devices becomes widespread, the volume of data generated and transmitted is increasing rapidly. However, transmitting sensitive data over unreliable wireless networks gives rise to an increased attack surface due to the lack of secure communication. Accordingly, a lightweight and secure communication protocol is required for transmitting data between IoT devices. In this paper, we present results of experiments to conduct the hardware validation of a novel secure communication protocol which was introduced in [1]. This previously developed protocol utilizes multiple factors for authentication, which are updated after every protocol iteration. Ensuring that the same factors are not reused for authentication reduces the risk of potential attacks. Our implementation of this protocol utilizes a True Random Number Generator (TRNG) for factor updates to ensure that the factors are not based on a deterministic algorithm. In addition, our experiments validate the unicast and multicast communication features of the protocol. Our hardware platform is based on a network of Raspberry Pi boards and is designed to be both fast and computationally lightweight. We present results of experiments we conducted to assess the ability of our implementation to withstand network errors and delays. We also present an approach to choose the timeout value for a hardware implementation of the protocol. Our results demonstrate that our unicast and multicast implementations are scalable, while exhibiting good power, energy, and delay characteristics, thereby making our approach suitable for secure communication for smart IoT applications.
{"title":"A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol","authors":"Cheng-Yen Lee, Kyler R. Scott, Sunil P. Khatri, Ali Ghrayeb","doi":"10.1109/CommNet60167.2023.10365286","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365286","url":null,"abstract":"As the use of low-power Internet of Things (IoT) devices becomes widespread, the volume of data generated and transmitted is increasing rapidly. However, transmitting sensitive data over unreliable wireless networks gives rise to an increased attack surface due to the lack of secure communication. Accordingly, a lightweight and secure communication protocol is required for transmitting data between IoT devices. In this paper, we present results of experiments to conduct the hardware validation of a novel secure communication protocol which was introduced in [1]. This previously developed protocol utilizes multiple factors for authentication, which are updated after every protocol iteration. Ensuring that the same factors are not reused for authentication reduces the risk of potential attacks. Our implementation of this protocol utilizes a True Random Number Generator (TRNG) for factor updates to ensure that the factors are not based on a deterministic algorithm. In addition, our experiments validate the unicast and multicast communication features of the protocol. Our hardware platform is based on a network of Raspberry Pi boards and is designed to be both fast and computationally lightweight. We present results of experiments we conducted to assess the ability of our implementation to withstand network errors and delays. We also present an approach to choose the timeout value for a hardware implementation of the protocol. Our results demonstrate that our unicast and multicast implementations are scalable, while exhibiting good power, energy, and delay characteristics, thereby making our approach suitable for secure communication for smart IoT applications.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365263
Rachida Boufouss, A. Najid
In this article, an 8-port, 8-element dual-band multiple input and multiple output (MIMO) Planar Inverted F-Antenna (PIFA) having a height of 2.5 mm is proposed for the 5G/WLAN sub-6 GHz mobile terminal. For achieving dual-band operation with wide bandwidth, a parasitic element and L-slot are added to the PIFA, whereas a rectangular open-ended ring is printed on the top substrate next to the parasitic element. The results show that the proposed MIMO antenna system operates at 3.43–3.8 GHz and 5.15–5.85 GHz with −6dB impedance bandwidth condition. The minimum isolation achieved between two adjacent antenna elements is better than 12.1 dB in the lower band, while in the upper band is 16 dB without using any extra decoupling techniques. Moreover, radiation efficiency, radiation pattern, envelop correlation coefficient and diversity gain are all presented in this article, showing good MIMO performances of the proposed antenna which makes it promising for 5G sub-6 GHz mobile terminal.
{"title":"A Low-Profile Dual-Band Eight-Port MIMO PIFA Antenna for 5G/WLAN Sub-6 GHz Mobile Terminal","authors":"Rachida Boufouss, A. Najid","doi":"10.1109/CommNet60167.2023.10365263","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365263","url":null,"abstract":"In this article, an 8-port, 8-element dual-band multiple input and multiple output (MIMO) Planar Inverted F-Antenna (PIFA) having a height of 2.5 mm is proposed for the 5G/WLAN sub-6 GHz mobile terminal. For achieving dual-band operation with wide bandwidth, a parasitic element and L-slot are added to the PIFA, whereas a rectangular open-ended ring is printed on the top substrate next to the parasitic element. The results show that the proposed MIMO antenna system operates at 3.43–3.8 GHz and 5.15–5.85 GHz with −6dB impedance bandwidth condition. The minimum isolation achieved between two adjacent antenna elements is better than 12.1 dB in the lower band, while in the upper band is 16 dB without using any extra decoupling techniques. Moreover, radiation efficiency, radiation pattern, envelop correlation coefficient and diversity gain are all presented in this article, showing good MIMO performances of the proposed antenna which makes it promising for 5G sub-6 GHz mobile terminal.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"414 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365310
Oussama Sbayti, Said Ouhmi, Brahim Es-Sousy, Khalid Housni
In the transport domain, vehicles share a variety of information among themselves, including speed, road conditions, and accident data. Using the Vehicular Ad hoc Networks (VANETs), these vehicles effectively exchange this information. However, the issue lies in the quality of data transmission and reception. In another way, Enhancing Routing Services (ERS) improves the rate of data transmission and reception in VANETs. Our goal is to enhance routing services in VANETs based on the proactive Optimized Link State Routing (OLSR) protocol. This protocol relies on the concept of MultiPoint Relays (MPR) for neighbor selection and an intelligent algorithm for determining the shortest path between source and destination vehicles. Our idea consists of enhancing the MPR selection algorithm by increasing the maximum number of hops to three. We conducted simulations using the Simulation of Urban Mobility (SUMO) and the Network Simulator (NS3). The simulation results demonstrate favorable outcomes for the modified OLSR in various scenarios. We evaluated a set of metrics such as End-To-End Delay (E2ED), Packet Loss Rate (PLR), Overhead, and ERS.
在运输领域,车辆之间共享各种信息,包括速度、路况和事故数据。利用车载 Ad hoc 网络(VANET),这些车辆可以有效地交换这些信息。然而,问题在于数据传输和接收的质量。从另一个角度看,增强路由服务(ERS)可以提高 VANET 的数据收发率。我们的目标是在主动优化链路状态路由(OLSR)协议的基础上增强 VANET 中的路由服务。该协议依靠多点中继(MPR)的概念来选择邻居,并采用智能算法来确定源车和目的车之间的最短路径。我们的想法是通过将最大跳数增加到三跳来增强 MPR 选择算法。我们使用城市交通仿真(SUMO)和网络仿真器(NS3)进行了仿真。仿真结果表明,改进后的 OLSR 在各种场景下都取得了良好的结果。我们评估了一系列指标,如端到端延迟(E2ED)、丢包率(PLR)、开销和 ERS。
{"title":"Enhancement in Quality of Routing Service in Vehicular ad-hoc Networks Based on the MPR Selection Algorithm of the OLSR Protocol","authors":"Oussama Sbayti, Said Ouhmi, Brahim Es-Sousy, Khalid Housni","doi":"10.1109/CommNet60167.2023.10365310","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365310","url":null,"abstract":"In the transport domain, vehicles share a variety of information among themselves, including speed, road conditions, and accident data. Using the Vehicular Ad hoc Networks (VANETs), these vehicles effectively exchange this information. However, the issue lies in the quality of data transmission and reception. In another way, Enhancing Routing Services (ERS) improves the rate of data transmission and reception in VANETs. Our goal is to enhance routing services in VANETs based on the proactive Optimized Link State Routing (OLSR) protocol. This protocol relies on the concept of MultiPoint Relays (MPR) for neighbor selection and an intelligent algorithm for determining the shortest path between source and destination vehicles. Our idea consists of enhancing the MPR selection algorithm by increasing the maximum number of hops to three. We conducted simulations using the Simulation of Urban Mobility (SUMO) and the Network Simulator (NS3). The simulation results demonstrate favorable outcomes for the modified OLSR in various scenarios. We evaluated a set of metrics such as End-To-End Delay (E2ED), Packet Loss Rate (PLR), Overhead, and ERS.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"51 6","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365289
Khadija Sabri, O. E. Maguiri, A. Farchi
This paper solves the problem of controlling maximum power in photovoltaic systems connected to the grid in order to track changes and meet energy demand. Our work focuses on two crucial objectives: i. extracting the maximum available power (MPPT) in case of partial shading, ii. unifying the power factor (FPU). To accomplish this, we integrated a non-linear backstepping controller to extract the Maximum Power Point (MPP) using the Particle Swarming Algorithm (PSO), influencing the duty cycle of the DC/DC converter. Additionally, we applied this approach to the three-phase voltage-source inverter for achieving a unified power factor (FPU). We validated the efficacy of the introduced system through modeling and simulation in MATLAB/Simulink. The controlled system’s asymptotic stability is demonstrated mathematically, and simulation results show that the controller has successfully accomplished all of its goals with excellent dynamic performance even in the partial shading conditions. The suggested controller also exhibits excellent robustness against system disturbances, which is its primary advantage over alternative control systems.
{"title":"Backstepping Control of a Double-Stage Photovoltaic System Connected to the Tree-Phase Grid Under Partial Shading Conditions","authors":"Khadija Sabri, O. E. Maguiri, A. Farchi","doi":"10.1109/CommNet60167.2023.10365289","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365289","url":null,"abstract":"This paper solves the problem of controlling maximum power in photovoltaic systems connected to the grid in order to track changes and meet energy demand. Our work focuses on two crucial objectives: i. extracting the maximum available power (MPPT) in case of partial shading, ii. unifying the power factor (FPU). To accomplish this, we integrated a non-linear backstepping controller to extract the Maximum Power Point (MPP) using the Particle Swarming Algorithm (PSO), influencing the duty cycle of the DC/DC converter. Additionally, we applied this approach to the three-phase voltage-source inverter for achieving a unified power factor (FPU). We validated the efficacy of the introduced system through modeling and simulation in MATLAB/Simulink. The controlled system’s asymptotic stability is demonstrated mathematically, and simulation results show that the controller has successfully accomplished all of its goals with excellent dynamic performance even in the partial shading conditions. The suggested controller also exhibits excellent robustness against system disturbances, which is its primary advantage over alternative control systems.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"52 12","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365255
David Carrascal, Elisa Rojas, D. Lopez-Pajares, Nicolas Manso, Emma Gutierrez
The proliferation of intelligent Machine-to-Machine (M2M) environments provided by the Internet of Things (IoT) has led to an increase in concurrent communications, thereby generating new demands in terms of capacity, performance, latency, and network efficiency that must be addressed. While it is true that the fifth generation of mobile technologies (5G) is already in place, addressing some of the mentioned needs, the upcoming the sixth generation of mobile technologies (6G) communication network is positioned as a technology to address future requirements, with a particular emphasis in the field of IoT. 6G harnesses the Software-Defined Networking (SDN) technology as a pivotal component of its architecture due to the flexibility and programmability it offers to enhance performance and optimize the network’s backbone. However, the SDN paradigm has drawbacks in IoT environments, such as the connectivity scheme between each network node and the SDN controller. This paper introduces the implementation of a scalable SDN in-band control protocol, which leverages the data network for control information transmission, particularly suitable for IoT networks. This implementation has been designed and implemented for both wired and wireless networks, utilizing the Basic OpenFlow User-space Software Switch (BOFUSS).
由物联网(IoT)提供的智能机器对机器(M2M)环境的激增导致了并发通信的增加,从而在容量、性能、延迟和网络效率方面产生了必须解决的新需求。诚然,第五代移动技术(5G)已经到位,满足了上述部分需求,但即将推出的第六代移动技术(6G)通信网络被定位为满足未来需求的技术,尤其侧重于物联网领域。6G 利用软件定义网络(SDN)技术作为其架构的关键组成部分,因为该技术具有灵活性和可编程性,可提高性能并优化网络主干。然而,SDN 范式在物联网环境中存在一些缺陷,例如每个网络节点与 SDN 控制器之间的连接方案。本文介绍了一种可扩展的 SDN 带内控制协议的实现,该协议利用数据网络进行控制信息传输,尤其适用于物联网网络。利用基本 OpenFlow 用户空间软件交换机(BOFUSS)设计并实现了有线和无线网络。
{"title":"A scalable SDN in-band control protocol for IoT networks in 6G environments","authors":"David Carrascal, Elisa Rojas, D. Lopez-Pajares, Nicolas Manso, Emma Gutierrez","doi":"10.1109/CommNet60167.2023.10365255","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365255","url":null,"abstract":"The proliferation of intelligent Machine-to-Machine (M2M) environments provided by the Internet of Things (IoT) has led to an increase in concurrent communications, thereby generating new demands in terms of capacity, performance, latency, and network efficiency that must be addressed. While it is true that the fifth generation of mobile technologies (5G) is already in place, addressing some of the mentioned needs, the upcoming the sixth generation of mobile technologies (6G) communication network is positioned as a technology to address future requirements, with a particular emphasis in the field of IoT. 6G harnesses the Software-Defined Networking (SDN) technology as a pivotal component of its architecture due to the flexibility and programmability it offers to enhance performance and optimize the network’s backbone. However, the SDN paradigm has drawbacks in IoT environments, such as the connectivity scheme between each network node and the SDN controller. This paper introduces the implementation of a scalable SDN in-band control protocol, which leverages the data network for control information transmission, particularly suitable for IoT networks. This implementation has been designed and implemented for both wired and wireless networks, utilizing the Basic OpenFlow User-space Software Switch (BOFUSS).","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"244 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365292
F. Ghazil, A. Benkuider, F. Ayoub, M. Zraidi, K. Ibrahimi
Osteoporosis is a serious disease due to the fractures it causes which can lead to pain, impotence, loss of independence and excess mortality (femoral neck fractures). In addition, it is a disease with a high recurrence rate and is age-specific. Therefore, the impact of osteoporosis on the already sensitive healthcare system will increase, and thus several preventive measures can be taken to reduce its impact Based on texture analysis, which is crucial for image interpretation in the biomedical domain. We propose a fresh approach for classifying medical images in this context using bidimensional empirical multimodal decomposition (BEMD), this approach is based on the fractal analysis of BIMFs. BEMD is an extension of the one-dimensional case because it has proven to be an adaptive way to represent non-stationary and non-linear signals. Its application to image processing breaks down a image into the total of a number of hierarchical elements “bidimensional intrinsic mode functions (BIMFs)” and residues and the decomposition procedure is iterative. In order to objectively assess the effectiveness of the various BIMF modes and to characterize two states: osteoporotic and healthy, the fractal dimension was calculated for each BIMF using the DBC “Differential Box Counting” method. This novel strategy was applied on a database of CT-Scan medical images of bone textures which contains images of normal and pathological cases. Experimental results indicate that the third mode BIMF achieves higher separation rates compared to the other mode between normal and osteoporotic cases. We use classification rate evaluation criteria, such that the classification rate is given by KNN
{"title":"Fractal analysis to BEMD’s IMFs: Application CT-Scan","authors":"F. Ghazil, A. Benkuider, F. Ayoub, M. Zraidi, K. Ibrahimi","doi":"10.1109/CommNet60167.2023.10365292","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365292","url":null,"abstract":"Osteoporosis is a serious disease due to the fractures it causes which can lead to pain, impotence, loss of independence and excess mortality (femoral neck fractures). In addition, it is a disease with a high recurrence rate and is age-specific. Therefore, the impact of osteoporosis on the already sensitive healthcare system will increase, and thus several preventive measures can be taken to reduce its impact Based on texture analysis, which is crucial for image interpretation in the biomedical domain. We propose a fresh approach for classifying medical images in this context using bidimensional empirical multimodal decomposition (BEMD), this approach is based on the fractal analysis of BIMFs. BEMD is an extension of the one-dimensional case because it has proven to be an adaptive way to represent non-stationary and non-linear signals. Its application to image processing breaks down a image into the total of a number of hierarchical elements “bidimensional intrinsic mode functions (BIMFs)” and residues and the decomposition procedure is iterative. In order to objectively assess the effectiveness of the various BIMF modes and to characterize two states: osteoporotic and healthy, the fractal dimension was calculated for each BIMF using the DBC “Differential Box Counting” method. This novel strategy was applied on a database of CT-Scan medical images of bone textures which contains images of normal and pathological cases. Experimental results indicate that the third mode BIMF achieves higher separation rates compared to the other mode between normal and osteoporotic cases. We use classification rate evaluation criteria, such that the classification rate is given by KNN","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"256 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365268
Youssra Baja, Khalid Chougdali, A. Kobbane
With the increasing use of Internet of Things (IoT) devices in various domains, including offices, homes, hospitals, cities, and transportation, cyberattacks using malicious attacks have become more frequent and complex, posing new challenges and risks. Therefore, it is crucial to enhance the speed and accuracy of security measures. In this paper, we propose an ensemble machine-learning model that utilizes various techniques, such as Stacking and Bagging, in combination with individual classifiers based on machine learning models to detect botnet attacks using the N-BaIoT dataset. Our results demonstrate the efficiency and efficacy of the proposed stacking model, which outperformed other techniques for every evaluation metric. We conclude that the selected model can achieve a very good accuracy rate.
{"title":"Improving IoT Botnet Detection Using Ensemble Learning","authors":"Youssra Baja, Khalid Chougdali, A. Kobbane","doi":"10.1109/CommNet60167.2023.10365268","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365268","url":null,"abstract":"With the increasing use of Internet of Things (IoT) devices in various domains, including offices, homes, hospitals, cities, and transportation, cyberattacks using malicious attacks have become more frequent and complex, posing new challenges and risks. Therefore, it is crucial to enhance the speed and accuracy of security measures. In this paper, we propose an ensemble machine-learning model that utilizes various techniques, such as Stacking and Bagging, in combination with individual classifiers based on machine learning models to detect botnet attacks using the N-BaIoT dataset. Our results demonstrate the efficiency and efficacy of the proposed stacking model, which outperformed other techniques for every evaluation metric. We conclude that the selected model can achieve a very good accuracy rate.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"71 4","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}