Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454815
Matthew Boeding, Paul Scalise, M. Hempel, H. Sharif
5th -Generation (5G) cellular networks enable a new approach to applications that require low latency. As part of 5G infrastructure, Ultra Reliable Low Latency Communication (URLLC) was defined to support low-latency services using small payloads. However, many Operational Technology (OT) protocols designed with latency in mind require larger payloads but allow for latencies that exceed URLLC's 1ms capability for their operation. An example of such protocols is IEC-61850 GOOSE, which mandates a maximum latency of 4ms, but often transports larger payloads. In this paper, we evaluate the latency implications of incorporating the GOOSE protocol over 5G connections. We evaluate network performance by measuring two different Intelligent Electronic Devices' contact closure times and compare those to measurements obtained from a standard GOOSE network setup. This analysis shows the impact on network latency and critical application performance, from which we can derive important network parameters to improve performance for private 5G-based OT network implementations.
{"title":"Evaluating the Latency Impact for Time-Critical Operational Technology Applications of Transitioning IEC-61850 GOOSE Operations to 5G","authors":"Matthew Boeding, Paul Scalise, M. Hempel, H. Sharif","doi":"10.1109/CCNC51664.2024.10454815","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454815","url":null,"abstract":"5th -Generation (5G) cellular networks enable a new approach to applications that require low latency. As part of 5G infrastructure, Ultra Reliable Low Latency Communication (URLLC) was defined to support low-latency services using small payloads. However, many Operational Technology (OT) protocols designed with latency in mind require larger payloads but allow for latencies that exceed URLLC's 1ms capability for their operation. An example of such protocols is IEC-61850 GOOSE, which mandates a maximum latency of 4ms, but often transports larger payloads. In this paper, we evaluate the latency implications of incorporating the GOOSE protocol over 5G connections. We evaluate network performance by measuring two different Intelligent Electronic Devices' contact closure times and compare those to measurements obtained from a standard GOOSE network setup. This analysis shows the impact on network latency and critical application performance, from which we can derive important network parameters to improve performance for private 5G-based OT network implementations.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"93 4","pages":"626-627"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454666
H. S. Rossi, Karan Mitra, C. Åhlund, Irina Cotanis, Niclas Örgen, Per Johansson
Mobile cloud gaming (MCG) lets users play cloud games (CG) on mobile devices anywhere via mobile networks. However, the stochastic nature of network quality of service (QoS) can result in varying user quality of experience (QoE). Understanding, modeling, and predicting the impact of mobile networks' QoS on users' QoE is crucial. This helps stakeholders optimize networks, and game developers efficiently create cloud-hosted games provisioned over mobile networks. This paper investigates the impact of QoS on users' QoE and proposes, develops and validates novel models for predicting QoE for MCG in mobile networks using realistic subjective tests. In particular, we propose and develop three QoE models using multiple, polynomial, and non-linear regression. Our results validate that multiple regression (with R2=0.79, RMSE=0.45) can model complex relationships between QoS factors that impact QoE. Multiple polynomial regression achieved the overall fit with (R2=0.94, RMSE=0.24). Lastly, the non-linear model achieved a good RMSE of 0.24. To select the best model out of the three, we applied the F-test and determined that polynomial regression had the best statistical fit.
{"title":"Objective QoE Models for Cloud-Based First Person Shooter Game over Mobile Networks","authors":"H. S. Rossi, Karan Mitra, C. Åhlund, Irina Cotanis, Niclas Örgen, Per Johansson","doi":"10.1109/CCNC51664.2024.10454666","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454666","url":null,"abstract":"Mobile cloud gaming (MCG) lets users play cloud games (CG) on mobile devices anywhere via mobile networks. However, the stochastic nature of network quality of service (QoS) can result in varying user quality of experience (QoE). Understanding, modeling, and predicting the impact of mobile networks' QoS on users' QoE is crucial. This helps stakeholders optimize networks, and game developers efficiently create cloud-hosted games provisioned over mobile networks. This paper investigates the impact of QoS on users' QoE and proposes, develops and validates novel models for predicting QoE for MCG in mobile networks using realistic subjective tests. In particular, we propose and develop three QoE models using multiple, polynomial, and non-linear regression. Our results validate that multiple regression (with R2=0.79, RMSE=0.45) can model complex relationships between QoS factors that impact QoE. Multiple polynomial regression achieved the overall fit with (R2=0.94, RMSE=0.24). Lastly, the non-linear model achieved a good RMSE of 0.24. To select the best model out of the three, we applied the F-test and determined that polynomial regression had the best statistical fit.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"15 3","pages":"550-553"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454809
Ignacio Astaburuaga, Shamik Sengupta
The objective of this paper is to propose and establish a new area of research and increase awareness of key cybersecurity aspects relating to the manufacturing, creation, development, and maintenance of quantum systems and identify key challenges in this domain. It aims to present areas of focus of cybersecurity in the quantum field. Through research, we have established a new emerging gap in the security of quantum systems. This paper introduces the basics of quantum systems, circuits, and computers. Then, it continues to introduce the current state of quantum technologies. Finally, it introduces cybersecurity and quantum and establishes new avenues of attacks for such systems.
{"title":"Introduction to Quantum Systems and Security Vulnerabilities","authors":"Ignacio Astaburuaga, Shamik Sengupta","doi":"10.1109/CCNC51664.2024.10454809","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454809","url":null,"abstract":"The objective of this paper is to propose and establish a new area of research and increase awareness of key cybersecurity aspects relating to the manufacturing, creation, development, and maintenance of quantum systems and identify key challenges in this domain. It aims to present areas of focus of cybersecurity in the quantum field. Through research, we have established a new emerging gap in the security of quantum systems. This paper introduces the basics of quantum systems, circuits, and computers. Then, it continues to introduce the current state of quantum technologies. Finally, it introduces cybersecurity and quantum and establishes new avenues of attacks for such systems.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"79 3","pages":"345-351"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although it is increasingly common to use digital games for the cognitive training, to date there is still a need for more studies of the effectiveness of neuropsychological treatments based on digital games, especially for populations with Specific Learning Disorders (SLDs). This study aims to present the effectiveness of Eye-Riders, a serious game developed to train executive functions in neurodiverse children. A group of 41 children (age range 7–9 years) participated in the study: 13 with SLDs and 28 with typical development. The training consisted in playing Eye-Riders in 9 sessions of 20 minutes each, with a frequency of 3 times a week for three weeks. The effectiveness of the training was assessed by means of the Nepsy-II battery of executive and attentional function scales, administered before and after the training. The gaming style was measured by Gaming Style Questionnaire (GSQ). The results showed significant improvement in the skills of Auditory Attention, Visual Attention, Inhibition and Switching in both groups. These results had a positive impact in reading abilities. In addition, the results reveal that in children with SLD, the improvement achieved in visual attention skills can be attributed to the improvement in game performance. In conclusion, Eye-Riders is an effective video game to of executive functions in neurodivergent children.
{"title":"Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse Children","authors":"Mariagrazia Benassi, Davide Paolillo, Matilde Spinoso, S. Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi","doi":"10.1109/CCNC51664.2024.10454866","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454866","url":null,"abstract":"Although it is increasingly common to use digital games for the cognitive training, to date there is still a need for more studies of the effectiveness of neuropsychological treatments based on digital games, especially for populations with Specific Learning Disorders (SLDs). This study aims to present the effectiveness of Eye-Riders, a serious game developed to train executive functions in neurodiverse children. A group of 41 children (age range 7–9 years) participated in the study: 13 with SLDs and 28 with typical development. The training consisted in playing Eye-Riders in 9 sessions of 20 minutes each, with a frequency of 3 times a week for three weeks. The effectiveness of the training was assessed by means of the Nepsy-II battery of executive and attentional function scales, administered before and after the training. The gaming style was measured by Gaming Style Questionnaire (GSQ). The results showed significant improvement in the skills of Auditory Attention, Visual Attention, Inhibition and Switching in both groups. These results had a positive impact in reading abilities. In addition, the results reveal that in children with SLD, the improvement achieved in visual attention skills can be attributed to the improvement in game performance. In conclusion, Eye-Riders is an effective video game to of executive functions in neurodivergent children.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Federated learning (FL) has become the next generation of machine learning (ML) by avoiding local data sharing with a central server. While this becomes a major advantage to client-side privacy, it has a trade-off of becoming vulnerable to poisoning attacks and malicious behavior of the central server. As the decentralization of systems enhances security concerns, integrating decentralized defense for the existing FL systems has been extensively studied to eliminate the security issues of FL systems. This paper proposes a decentralized defense approach to FL systems with blockchain technology to overcome the poisoning attack without affecting the existing FL system's performance. We introduce a reliable blockchain-based FL (BCFL) architecture in two different models, namely, Centralized Aggregated BCFL (CA-BCFL) and Fully Decentralized BCFL (FD-BCFL). Both models utilize secure off-chain computations for malicious mitigation as an alternative to high-cost on-chain computations. Our comprehensive analysis shows that the proposed BCFL architectures can defend in a similar manner against poisoning attacks that compromise the aggregator. As a better measure, the paper has included an evaluation of the gas consumption of our two system models.
{"title":"Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems","authors":"Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage","doi":"10.1109/CCNC51664.2024.10454688","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454688","url":null,"abstract":"Federated learning (FL) has become the next generation of machine learning (ML) by avoiding local data sharing with a central server. While this becomes a major advantage to client-side privacy, it has a trade-off of becoming vulnerable to poisoning attacks and malicious behavior of the central server. As the decentralization of systems enhances security concerns, integrating decentralized defense for the existing FL systems has been extensively studied to eliminate the security issues of FL systems. This paper proposes a decentralized defense approach to FL systems with blockchain technology to overcome the poisoning attack without affecting the existing FL system's performance. We introduce a reliable blockchain-based FL (BCFL) architecture in two different models, namely, Centralized Aggregated BCFL (CA-BCFL) and Fully Decentralized BCFL (FD-BCFL). Both models utilize secure off-chain computations for malicious mitigation as an alternative to high-cost on-chain computations. Our comprehensive analysis shows that the proposed BCFL architectures can defend in a similar manner against poisoning attacks that compromise the aggregator. As a better measure, the paper has included an evaluation of the gas consumption of our two system models.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"94 10","pages":"950-955"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454703
Image Bhattarai, Cong Pu, Kim–Kwang Raymond Choo
The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has quickly became the driving force for various civilian applications (e.g., body temperature detecting drones during the global pandemic of coronavirus disease). In the IoD, a fleet of drones are deployed over an area of interest, collect task-specific data, and then deliver them to the ground station for further data exploration and analysis. To fully exploit the potential of IoD in today's dynamic and evolving cyber-threat environment, the security and efficiency challenges existing in the IoD communications should be well addressed. Some researchers have developed security mechanisms to enable the authentication between the ground station and the drones in the IoD systems. Nonetheless, those schemes mainly focus on the security aspect but overlook the importance of communication efficiency to the resource-constrained drones. In order to fill this research gap, this paper proposes a lightweight aggregate authentication scheme (hereafter referred to as liteAGAP) to tackle the challenges of communication security and efficiency together. Specifically, liteAGAP utilizes cryptographic primitives such as physical unclonable function and bilinear pairing to efficiently secure the data exchange between the ground station and a group of drones in the IoD systems. To evaluate its security performance, liteAGAP is first implemented in the security-sensitive protocol modeling language. Then, we analyze and verify liteAGAP using AVISPA, which is a well-known Internet security protocol verification framework. We also implement liteAGAP and its counterpart schemes in a simulation environment, where the simulation-based experiments are conducted to obtain the results of communication overhead, running time, memory storage usage, and energy consumption. According to the results of security verification/analysis and performance evaluation, we conclude that not only liteAGAP meets the expected security requirements, but also provides superior performance compared to the existing schemes.
{"title":"A Lightweight Aggregate Authentication Protocol for Internet of Drones","authors":"Image Bhattarai, Cong Pu, Kim–Kwang Raymond Choo","doi":"10.1109/CCNC51664.2024.10454703","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454703","url":null,"abstract":"The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has quickly became the driving force for various civilian applications (e.g., body temperature detecting drones during the global pandemic of coronavirus disease). In the IoD, a fleet of drones are deployed over an area of interest, collect task-specific data, and then deliver them to the ground station for further data exploration and analysis. To fully exploit the potential of IoD in today's dynamic and evolving cyber-threat environment, the security and efficiency challenges existing in the IoD communications should be well addressed. Some researchers have developed security mechanisms to enable the authentication between the ground station and the drones in the IoD systems. Nonetheless, those schemes mainly focus on the security aspect but overlook the importance of communication efficiency to the resource-constrained drones. In order to fill this research gap, this paper proposes a lightweight aggregate authentication scheme (hereafter referred to as liteAGAP) to tackle the challenges of communication security and efficiency together. Specifically, liteAGAP utilizes cryptographic primitives such as physical unclonable function and bilinear pairing to efficiently secure the data exchange between the ground station and a group of drones in the IoD systems. To evaluate its security performance, liteAGAP is first implemented in the security-sensitive protocol modeling language. Then, we analyze and verify liteAGAP using AVISPA, which is a well-known Internet security protocol verification framework. We also implement liteAGAP and its counterpart schemes in a simulation environment, where the simulation-based experiments are conducted to obtain the results of communication overhead, running time, memory storage usage, and energy consumption. According to the results of security verification/analysis and performance evaluation, we conclude that not only liteAGAP meets the expected security requirements, but also provides superior performance compared to the existing schemes.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"68 3","pages":"143-151"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the remarkable success of deep-learning in image and video recognition, constructing real-time recognition systems for computationally intensive tasks such as spatio-temporal human action localization is still challenging. As computational complexity of these tasks can easily exceed the capacity of edge devices, inference must be performed in remote (cloud) environments. But then, recognition accuracy is subject to fluctuating networking conditions in best-effort networks due to compression artefacts incurred from low-bitrate video streaming. To improve overall recognition accuracy under various networking conditions, we propose SwitchingNet, an edge-assisted inference model switching method. In SwitchingNet, we train multiple recognition models specialized towards different levels of image quality and a neural switching model for dynamically choosing among the specialized recognition models during system operation. Switching decisions are made at the edge given an image quality vector calculated from compressed and uncompressed frames. In the experiments, we show that our approach can on average sustain higher recognition accuracy than plain recognition systems under heavily fluctuating networking conditions. Also, our switching-based recognition approach is far less computationally intensive than competing ensemble methods and allows to significantly reduce cloud computing costs.
{"title":"SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort Networks","authors":"Florian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi","doi":"10.1109/CCNC51664.2024.10454650","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454650","url":null,"abstract":"Despite the remarkable success of deep-learning in image and video recognition, constructing real-time recognition systems for computationally intensive tasks such as spatio-temporal human action localization is still challenging. As computational complexity of these tasks can easily exceed the capacity of edge devices, inference must be performed in remote (cloud) environments. But then, recognition accuracy is subject to fluctuating networking conditions in best-effort networks due to compression artefacts incurred from low-bitrate video streaming. To improve overall recognition accuracy under various networking conditions, we propose SwitchingNet, an edge-assisted inference model switching method. In SwitchingNet, we train multiple recognition models specialized towards different levels of image quality and a neural switching model for dynamically choosing among the specialized recognition models during system operation. Switching decisions are made at the edge given an image quality vector calculated from compressed and uncompressed frames. In the experiments, we show that our approach can on average sustain higher recognition accuracy than plain recognition systems under heavily fluctuating networking conditions. Also, our switching-based recognition approach is far less computationally intensive than competing ensemble methods and allows to significantly reduce cloud computing costs.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"93 2","pages":"37-43"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454742
Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner
Latency-optimized audio communication systems for the Internet have mainly been studied in the context of networked music performances (NMP) and high-end video conferencing systems. To date, the research in this field has focused on approaches for compensating the negative effects of network jitter on the audio transmission. The contribution of this paper is threefold: first, the authors summarize the state of the art in the area of ultra-low latency audio communications; second, they provide a quantitative performance analysis of recent implementations; and finally, they discuss the benefits of real-time-capable endpoint implementations. This discussion shows that not only the network jitter has a significant impact on the overall system performance, but also the timing jitter induced by endpoint systems running non-real-time software. This opens up enormous research potential for future work on real-time systems for latency-optimized audio communication.
{"title":"Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication Systems","authors":"Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner","doi":"10.1109/CCNC51664.2024.10454742","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454742","url":null,"abstract":"Latency-optimized audio communication systems for the Internet have mainly been studied in the context of networked music performances (NMP) and high-end video conferencing systems. To date, the research in this field has focused on approaches for compensating the negative effects of network jitter on the audio transmission. The contribution of this paper is threefold: first, the authors summarize the state of the art in the area of ultra-low latency audio communications; second, they provide a quantitative performance analysis of recent implementations; and finally, they discuss the benefits of real-time-capable endpoint implementations. This discussion shows that not only the network jitter has a significant impact on the overall system performance, but also the timing jitter induced by endpoint systems running non-real-time software. This opens up enormous research potential for future work on real-time systems for latency-optimized audio communication.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"16 4","pages":"77-83"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454642
Akito Ohshima, K. Sanada, Hiroyuki Hatano, Kazuo Mori
In vehicle platooning, relay transmission using sidelink communications, specified by the C-V2X (Cellular Vehicle-to-Everything) standard is considered as a means of information exchange. The autonomous resource management scheme, SB-SPS (Sensing Based Semi Persistent Scheduling), has been standardized for sidelink communications. However, a half duplex problem, one of major problems in the SB-SPS, is not sufficiently resolved for the relay transmission in vehicle platooning. This work proposes an enhanced resource management scheme to mitigate half duplex problem in vehicle platooning employing the SB-SPS scheme. The performance evaluation through computer simulation demonstrates the effectiveness of the proposed scheme.
{"title":"Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle Platooning","authors":"Akito Ohshima, K. Sanada, Hiroyuki Hatano, Kazuo Mori","doi":"10.1109/CCNC51664.2024.10454642","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454642","url":null,"abstract":"In vehicle platooning, relay transmission using sidelink communications, specified by the C-V2X (Cellular Vehicle-to-Everything) standard is considered as a means of information exchange. The autonomous resource management scheme, SB-SPS (Sensing Based Semi Persistent Scheduling), has been standardized for sidelink communications. However, a half duplex problem, one of major problems in the SB-SPS, is not sufficiently resolved for the relay transmission in vehicle platooning. This work proposes an enhanced resource management scheme to mitigate half duplex problem in vehicle platooning employing the SB-SPS scheme. The performance evaluation through computer simulation demonstrates the effectiveness of the proposed scheme.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"107 6","pages":"654-655"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454635
Harichandana B S S, Sumit Kumar, Manjunath B. Ujjinakoppa, Barath Raj Kandur Raja
Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an average life cycle of under 15 hours. This renders the standard practice of keeping a database of malicious URLs ineffective. To this end, we propose a novel on-device pipeline: COPS that intelligently identifies features of fraudulent messages and URLs to alert the user in real-time. COPS is a lightweight pipeline with a detection module based on the Disentangled Variational Autoencoder of size 3.46MB for smishing and URL phishing detection, and we benchmark it on open datasets. We achieve an accuracy of 98.15% and 99.5%, respectively, for both tasks, with a false negative and false positive rate of a mere 0.037 and 0.015, outperforming previous works with the added advantage of ensuring real-time alerts on resource-constrained devices.
{"title":"COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection","authors":"Harichandana B S S, Sumit Kumar, Manjunath B. Ujjinakoppa, Barath Raj Kandur Raja","doi":"10.1109/CCNC51664.2024.10454635","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454635","url":null,"abstract":"Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an average life cycle of under 15 hours. This renders the standard practice of keeping a database of malicious URLs ineffective. To this end, we propose a novel on-device pipeline: COPS that intelligently identifies features of fraudulent messages and URLs to alert the user in real-time. COPS is a lightweight pipeline with a detection module based on the Disentangled Variational Autoencoder of size 3.46MB for smishing and URL phishing detection, and we benchmark it on open datasets. We achieve an accuracy of 98.15% and 99.5%, respectively, for both tasks, with a false negative and false positive rate of a mere 0.037 and 0.015, outperforming previous works with the added advantage of ensuring real-time alerts on resource-constrained devices.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"71 10","pages":"172-179"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}