首页 > 最新文献

Ad Hoc & Sensor Wireless Networks最新文献

英文 中文
Enumeration of the Number of Spanning Trees of the Globe Network and its Subdivision 全球网络生成树数目的枚举及其细分
4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.5121/jgraphoc.2023.15301
Basma Mohamed, Mohamed Amin
The complexity of a graph can be determined using a network-theoretic method, which is given. This strategy is based on the connection between graph theory and the theory of determinants in linear algebra. In this article, we provide a unique algebraic method that makes use of linear algebra to derive simple formulas for the complexity of diverse novel networks. We can derive the explicit formulas for the globe network and its subdivision using this method. In the final least, we also determine their spanning trees entropy and compare it to each other
图的复杂度可以用网络理论的方法来确定。这种策略是基于图论与线性代数中行列式理论之间的联系。在本文中,我们提供了一种独特的代数方法,利用线性代数推导出各种新型网络复杂性的简单公式。利用这种方法可以推导出全球网及其细分的显式公式。最后,我们还确定了它们的生成树熵,并将其相互比较
{"title":"Enumeration of the Number of Spanning Trees of the Globe Network and its Subdivision","authors":"Basma Mohamed, Mohamed Amin","doi":"10.5121/jgraphoc.2023.15301","DOIUrl":"https://doi.org/10.5121/jgraphoc.2023.15301","url":null,"abstract":"The complexity of a graph can be determined using a network-theoretic method, which is given. This strategy is based on the connection between graph theory and the theory of determinants in linear algebra. In this article, we provide a unique algebraic method that makes use of linear algebra to derive simple formulas for the complexity of diverse novel networks. We can derive the explicit formulas for the globe network and its subdivision using this method. In the final least, we also determine their spanning trees entropy and compare it to each other","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A HYBRID OPTIMIZATION ALGORITHMS FOR SOLVING METRIC DIMENSION PROBLEM 一种求解度量尺寸问题的混合优化算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-27 DOI: 10.5121/jgraphoc.2023.15201
Basma Mohamed, Mohamed Amin
In this paper, we consider the NP-hard problem of finding the minimum resolving set of graphs. A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the vertices in B. The cardinality of the minimal resolving set is the metric dimension of G. The metric dimension appears in various fields such as network discovery and verification, robot navigation, combinatorial optimization and pharmaceutical chemistry, etc. In this study, we introduce a hybrid approach (WCA_WOA) for computing the metric dimension of graphs that combines the water cycle algorithm and a whale optimisation algorithm. The WOA algorithm hybridises the WCA in order to obtain the optimal result and manage the optimization process. The results of the experiments show that the WCA_WOA hybrid algorithm outperforms the WCA, WOA, and particle swarm optimization methods
在本文中,我们考虑寻找图的最小解析集的np困难问题。如果连通图G的每个顶点与B中的顶点的距离向量唯一地标识,则连通图G的顶点集B可以解析G。最小解析集的基数就是G的度量维数。度量维数出现在网络发现与验证、机器人导航、组合优化和药物化学等各个领域。在本研究中,我们引入了一种混合方法(WCA_WOA)来计算图的度量维度,该方法结合了水循环算法和鲸鱼优化算法。WOA算法通过混合WCA来获得最优结果,并对优化过程进行管理。实验结果表明,WCA_WOA混合算法优于WCA、WOA和粒子群优化方法
{"title":"A HYBRID OPTIMIZATION ALGORITHMS FOR SOLVING METRIC DIMENSION PROBLEM","authors":"Basma Mohamed, Mohamed Amin","doi":"10.5121/jgraphoc.2023.15201","DOIUrl":"https://doi.org/10.5121/jgraphoc.2023.15201","url":null,"abstract":"In this paper, we consider the NP-hard problem of finding the minimum resolving set of graphs. A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the vertices in B. The cardinality of the minimal resolving set is the metric dimension of G. The metric dimension appears in various fields such as network discovery and verification, robot navigation, combinatorial optimization and pharmaceutical chemistry, etc. In this study, we introduce a hybrid approach (WCA_WOA) for computing the metric dimension of graphs that combines the water cycle algorithm and a whale optimisation algorithm. The WOA algorithm hybridises the WCA in order to obtain the optimal result and manage the optimization process. The results of the experiments show that the WCA_WOA hybrid algorithm outperforms the WCA, WOA, and particle swarm optimization methods","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"10 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90157081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Based Prediction with Parameters Tuning of Multi-Label Real Road Vehicles Characteristics 基于机器学习的多标签真实道路车辆特征参数整定预测
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558606
R. Qaddoura, Maram Bani Younes, A. Boukerche
The real-time traffic characteristics on the road network highly affect the safety conditions and the driving behaviors there. Early detection of crowded areas or hazardous conditions on the road network should affect the drivers' decisions and behavior to guarantee smooth and comfortable trips. Machine learning mechanisms have been mainly used for general prediction after extensive training processes. Over the road networks, trained machines could be really helpful to obtain instant predictions that assist drivers and autonomous vehicles there. However, the quality and efficiency of these machines are affected by several criteria including the quality of the used dataset and the tuning of the parameters of the regression algorithm. In this work, we investigate the performance of the most popular regression algorithms in terms of temporal prediction of the traffic characteristics in a real road scenario. Moreover, we optimize the regression algorithm by tuning the parameters using the grid search technique. From the experimental results, we can clearly notice the enhancements in predicting the traffic characteristics for different periods of time. We have observed that the number of neighbors, the distance, and the metric parameters' values are best tuned with the values of 4, 'Manhattan', and 'Distance', respectively, for the K-Nearest Neighbor (KNN) regression algorithm.
道路网络上的实时交通特性对道路的安全状况和驾驶行为影响很大。早期发现道路网络上的拥挤区域或危险状况应该影响驾驶员的决策和行为,以保证平稳舒适的旅行。机器学习机制主要用于经过大量训练过程后的一般预测。在道路网络上,训练有素的机器可以帮助驾驶员和自动驾驶汽车获得即时预测。然而,这些机器的质量和效率受到几个标准的影响,包括使用的数据集的质量和回归算法参数的调整。在这项工作中,我们研究了最流行的回归算法在真实道路场景中交通特征的时间预测方面的性能。此外,我们还利用网格搜索技术通过调整参数来优化回归算法。从实验结果中,我们可以清楚地看到在预测不同时间段的流量特征方面的增强。我们已经观察到,对于k -最近邻(KNN)回归算法,邻居的数量、距离和度量参数的值最好分别使用值4、“Manhattan”和“distance”进行调优。
{"title":"Machine Learning Based Prediction with Parameters Tuning of Multi-Label Real Road Vehicles Characteristics","authors":"R. Qaddoura, Maram Bani Younes, A. Boukerche","doi":"10.1145/3551663.3558606","DOIUrl":"https://doi.org/10.1145/3551663.3558606","url":null,"abstract":"The real-time traffic characteristics on the road network highly affect the safety conditions and the driving behaviors there. Early detection of crowded areas or hazardous conditions on the road network should affect the drivers' decisions and behavior to guarantee smooth and comfortable trips. Machine learning mechanisms have been mainly used for general prediction after extensive training processes. Over the road networks, trained machines could be really helpful to obtain instant predictions that assist drivers and autonomous vehicles there. However, the quality and efficiency of these machines are affected by several criteria including the quality of the used dataset and the tuning of the parameters of the regression algorithm. In this work, we investigate the performance of the most popular regression algorithms in terms of temporal prediction of the traffic characteristics in a real road scenario. Moreover, we optimize the regression algorithm by tuning the parameters using the grid search technique. From the experimental results, we can clearly notice the enhancements in predicting the traffic characteristics for different periods of time. We have observed that the number of neighbors, the distance, and the metric parameters' values are best tuned with the values of 4, 'Manhattan', and 'Distance', respectively, for the K-Nearest Neighbor (KNN) regression algorithm.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"2 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90545504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cost-effective Measurements of 5G Radio Resources Allocation for Telecom Market Regulator's Monitoring 面向电信市场监管机构监管的5G无线资源配置成本效益测度
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558684
J. M. Batalla, Sławomir Sujecki, Jacek Oko, J. Kelner
The Regulatory Authority monitors and regulates the telecom market at a national-wide range. One of its main tasks is to put spectrum at disposal of the Mobile Network Operators (MNO) for serving the increase number of users and services. For this scope, the Regulator needs to have an independent estimation of the usage of the radio resources by the operators, so that it may anticipate future needs and to initiate actions (e.g., liberation of frequency bands) directed to fulfill the demands of the market. This paper presents a methodology for Regulator-triggered monitoring of 5G radio resources allocation. The requirements of the methodology are: (1) monitoring measurements must be external to the network, (2) information from the MNO is limited to the data of the radio infrastructure, such as localization and technical data of the antennas, and (3) any measurements need to be cost-effective since it is supposed that the Regulator will make extended test campaigns through the whole national territory. Our results of 5G measurements validate the methodology and show the limitations of the estimation of radio resource allocation.
监管局在全国范围内监督和管理电信市场。它的主要任务之一是将频谱提供给移动网络运营商(MNO),以服务于越来越多的用户和服务。对于这一范围,监管机构需要对运营商的无线电资源使用情况进行独立估计,以便它可以预测未来的需求,并采取行动(例如,释放频带),以满足市场的需求。本文提出了一种由监管机构触发的5G无线电资源分配监测方法。该方法的要求是:(1)监测测量必须在网络外部进行,(2)来自移动运营商的信息仅限于无线电基础设施的数据,例如天线的定位和技术数据,以及(3)任何测量都需要具有成本效益,因为假定监管机构将在整个国家范围内进行扩展的测试活动。我们的5G测量结果验证了该方法,并显示了无线电资源分配估计的局限性。
{"title":"Cost-effective Measurements of 5G Radio Resources Allocation for Telecom Market Regulator's Monitoring","authors":"J. M. Batalla, Sławomir Sujecki, Jacek Oko, J. Kelner","doi":"10.1145/3551663.3558684","DOIUrl":"https://doi.org/10.1145/3551663.3558684","url":null,"abstract":"The Regulatory Authority monitors and regulates the telecom market at a national-wide range. One of its main tasks is to put spectrum at disposal of the Mobile Network Operators (MNO) for serving the increase number of users and services. For this scope, the Regulator needs to have an independent estimation of the usage of the radio resources by the operators, so that it may anticipate future needs and to initiate actions (e.g., liberation of frequency bands) directed to fulfill the demands of the market. This paper presents a methodology for Regulator-triggered monitoring of 5G radio resources allocation. The requirements of the methodology are: (1) monitoring measurements must be external to the network, (2) information from the MNO is limited to the data of the radio infrastructure, such as localization and technical data of the antennas, and (3) any measurements need to be cost-effective since it is supposed that the Regulator will make extended test campaigns through the whole national territory. Our results of 5G measurements validate the methodology and show the limitations of the estimation of radio resource allocation.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"28 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86667358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Aware Vehicle Emissions Control System for Traffic Light Intersections 基于隐私感知的交通信号灯交叉口车辆排放控制系统
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558686
Pablo Andrés Barbecho Bautista, L. Urquiza-Aguiar, M. Aguilar-Igartua
This paper proposes a privacy-aware reinforcement learning (RL) framework to reduce carbon emissions of vehicles approaching light traffic intersections. Taking advantage of vehicular communications, traffic lights disseminate their state (i.e., traffic light cycle) among vehicles in their proximity. Then, the RL model is trained using public traffic lights data while preserving private car information locally (i.e., at the vehicle premises). Vehicles act as the agents of the model, and traffic infrastructure serves as the environment where the agent lives. Each time, the RL model decides if the vehicle should accelerate or decelerate (i.e., the model action) based on received traffic light observations. The optimal RL model strategy, dictating vehicles' driving speed, is learned following the proximal policy optimization algorithm. Results show that by moderating vehicles' speed when approximating traffic light intersections, gas emissions are reduced by 25% CO2 and 38% NOx emissions. The same happens for EVs that reduce energy consumption by 20W/h compared to not using the model. at intersections. The final impact of using the model refers to a negligible increment of 20s in the trip duration.
本文提出了一种隐私感知强化学习(RL)框架,以减少车辆接近轻交通路口时的碳排放。利用车辆通信,交通灯在其附近的车辆之间传播其状态(即交通灯周期)。然后,RL模型使用公共交通信号灯数据进行训练,同时在本地(即车辆所在地)保留私家车信息。车辆作为模型的代理,交通基础设施作为代理生活的环境。每次,RL模型都会根据接收到的交通灯观察结果决定车辆是应该加速还是减速(即模型动作)。根据最优策略优化算法学习最优RL模型策略,决定车辆的行驶速度。结果表明,在接近红绿灯路口时,通过减缓车辆速度,二氧化碳排放量减少25%,氮氧化物排放量减少38%。与不使用该模型相比,电动汽车的能耗降低了20W/h,情况也是如此。在十字路口。使用该模型的最终影响是指在行程持续时间中可以忽略不计的20s增量。
{"title":"Privacy-Aware Vehicle Emissions Control System for Traffic Light Intersections","authors":"Pablo Andrés Barbecho Bautista, L. Urquiza-Aguiar, M. Aguilar-Igartua","doi":"10.1145/3551663.3558686","DOIUrl":"https://doi.org/10.1145/3551663.3558686","url":null,"abstract":"This paper proposes a privacy-aware reinforcement learning (RL) framework to reduce carbon emissions of vehicles approaching light traffic intersections. Taking advantage of vehicular communications, traffic lights disseminate their state (i.e., traffic light cycle) among vehicles in their proximity. Then, the RL model is trained using public traffic lights data while preserving private car information locally (i.e., at the vehicle premises). Vehicles act as the agents of the model, and traffic infrastructure serves as the environment where the agent lives. Each time, the RL model decides if the vehicle should accelerate or decelerate (i.e., the model action) based on received traffic light observations. The optimal RL model strategy, dictating vehicles' driving speed, is learned following the proximal policy optimization algorithm. Results show that by moderating vehicles' speed when approximating traffic light intersections, gas emissions are reduced by 25% CO2 and 38% NOx emissions. The same happens for EVs that reduce energy consumption by 20W/h compared to not using the model. at intersections. The final impact of using the model refers to a negligible increment of 20s in the trip duration.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"7 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81691584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RPL+: An Improved Parent Selection Strategy for RPL in Wireless Smart Grid Networks RPL+:一种改进的无线智能电网RPL选择策略
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558677
Carlos Lester Dueñas Santos, J. León, A. M. Mezher, J. Cardenas-Barrera, J. Meng, Eduardo Castillo Guerra
Routing protocols play an important role in a Wireless Smart Grid Network (WSGN). The implementation of efficient routing strategies becomes paramount to guarantee the necessary interaction between utilities smart devices like smart meters, and the control centers. This research is focused on improving one of the well known routing protocols for WSGN, the Routing Protocol for Low-Power and Lossy Networks (RPL). More specifically, this paper presents a new parent selection strategy designed to choose the best parent when two or more candidates have the same ranking. The goal is to make better forwarding decisions on the best next-hop node to transmit packets to the destination. The proposed method takes into account the most important routing metrics in this type of network determined by applying Machine Learning (ML) feature importance analysis using Random Forest. The performance evaluation of the proposed strategy shows a significant improvement in terms of Packet Delivery Ratio when comparing to RPL standard implementations.
路由协议在无线智能电网(WSGN)中起着重要作用。高效路由策略的实施对于保证公用事业智能设备(如智能电表)和控制中心之间必要的交互至关重要。本研究的重点是改进WSGN的一个著名路由协议,低功耗和有损网络路由协议(RPL)。更具体地说,本文提出了一种新的亲本选择策略,当两个或两个以上的候选人具有相同的排名时,该策略旨在选择最佳亲本。目标是在最佳的下一跳节点上做出更好的转发决策,以便将数据包传输到目的地。该方法考虑了该类型网络中最重要的路由指标,通过使用随机森林应用机器学习(ML)特征重要性分析确定。与RPL标准实现相比,所提出的策略的性能评估显示在分组投递率方面有了显著的改进。
{"title":"RPL+: An Improved Parent Selection Strategy for RPL in Wireless Smart Grid Networks","authors":"Carlos Lester Dueñas Santos, J. León, A. M. Mezher, J. Cardenas-Barrera, J. Meng, Eduardo Castillo Guerra","doi":"10.1145/3551663.3558677","DOIUrl":"https://doi.org/10.1145/3551663.3558677","url":null,"abstract":"Routing protocols play an important role in a Wireless Smart Grid Network (WSGN). The implementation of efficient routing strategies becomes paramount to guarantee the necessary interaction between utilities smart devices like smart meters, and the control centers. This research is focused on improving one of the well known routing protocols for WSGN, the Routing Protocol for Low-Power and Lossy Networks (RPL). More specifically, this paper presents a new parent selection strategy designed to choose the best parent when two or more candidates have the same ranking. The goal is to make better forwarding decisions on the best next-hop node to transmit packets to the destination. The proposed method takes into account the most important routing metrics in this type of network determined by applying Machine Learning (ML) feature importance analysis using Random Forest. The performance evaluation of the proposed strategy shows a significant improvement in terms of Packet Delivery Ratio when comparing to RPL standard implementations.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"25 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78660039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis 利用流量统计分析检测DoH隧道的恶意使用
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558605
Marta Moure-Garrido, Celeste Campo, C. García-Rubio
DNS plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need DNS to work, both for traditional domain name to IP address translation, and for more advanced services such as resource discovery. At first, the DNS communication protocol presented certain security problems: integrity, authenticity and confidentiality. DNSSEC provides security but still does not guarantee confidentiality. To solve this problem, DNS over TLS (DoT) and DNS over HTTPS (DoH) were defined. In recent years, DNS tunneling, a covert form of encapsulating data transmission, has been used to encapsulate malicious traffic in a DNS connection. DoT and DoH versions complicate the detection of these tunnels because the encrypted data prevents performing an analysis of the content of the DNS traffic. Previous work has used machine learning techniques to identify DoH tunnels, but these have limitations. In this study, we identify the most significant features that singularize malicious traffic from benign traffic by statistical analysis. Based on the selected features, we obtain satisfactory results in the classification between benign and malicious DoH traffic. The study reveals that it is possible to differentiate traffic based on certain statistical parameters.
DNS在泛在网络的运行中起着基础性的作用。所有连接到这些网络的设备都需要DNS工作,无论是传统的域名到IP地址的转换,还是更高级的服务,如资源发现。首先,DNS通信协议存在一定的安全性问题:完整性、真实性和保密性。DNSSEC提供了安全性,但仍然不能保证机密性。为了解决这个问题,定义了DNS over TLS (DoT)和DNS over HTTPS (DoH)。近年来,DNS隧道作为一种隐蔽的数据传输封装形式,被用于在DNS连接中封装恶意流量。DoT和DoH版本使这些隧道的检测变得复杂,因为加密的数据阻止对DNS流量的内容进行分析。以前的工作使用机器学习技术来识别DoH隧道,但这些技术有局限性。在本研究中,我们通过统计分析确定了将恶意流量与良性流量区分开来的最重要特征。根据选取的特征,对良性和恶意DoH流量进行分类,得到了满意的结果。研究表明,基于一定的统计参数区分流量是可能的。
{"title":"Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis","authors":"Marta Moure-Garrido, Celeste Campo, C. García-Rubio","doi":"10.1145/3551663.3558605","DOIUrl":"https://doi.org/10.1145/3551663.3558605","url":null,"abstract":"DNS plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need DNS to work, both for traditional domain name to IP address translation, and for more advanced services such as resource discovery. At first, the DNS communication protocol presented certain security problems: integrity, authenticity and confidentiality. DNSSEC provides security but still does not guarantee confidentiality. To solve this problem, DNS over TLS (DoT) and DNS over HTTPS (DoH) were defined. In recent years, DNS tunneling, a covert form of encapsulating data transmission, has been used to encapsulate malicious traffic in a DNS connection. DoT and DoH versions complicate the detection of these tunnels because the encrypted data prevents performing an analysis of the content of the DNS traffic. Previous work has used machine learning techniques to identify DoH tunnels, but these have limitations. In this study, we identify the most significant features that singularize malicious traffic from benign traffic by statistical analysis. Based on the selected features, we obtain satisfactory results in the classification between benign and malicious DoH traffic. The study reveals that it is possible to differentiate traffic based on certain statistical parameters.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"104 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75992092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation and Testbed for Delivering SRT Live Content using DASH Low Latency Streaming Systems 使用DASH低延迟流媒体系统交付SRT实时内容的性能评估和测试平台
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558674
R. Belda, P. Arce, I. D. Fez, J. C. Guerri
The work presented in this paper focuses on the implementation of a testbed for the evaluation of content distribution systems using LL-DASH (Low Latency DASH -Dynamic Adaptive Streaming over HTTP-) and devices that provide real-time sources or servers using real-time protocols, such as RTSP (Real Time Streaming Protocol) or SRT (Secure Reliable Transport). These protocols are widely used by IP (Internet Protocol) cameras or by production and transmission systems, such as OBS Studio or vMix. The objective is to show the necessary processes in detail (so they can be reproduced in future works related to low latency services) and to minimize the end-to-end delay, obtaining values in the order of 2 seconds or less. The implementation has been done using FFmpeg software, players like Dash.js or Shaka-Player and implementing a Python web server with LL-DASH support to optimize the transmission delay.
本文介绍的工作重点是实现一个测试平台,用于评估使用LL-DASH(低延迟DASH -基于HTTP的动态自适应流)的内容分发系统,以及使用实时协议(如RTSP(实时流协议)或SRT(安全可靠传输)提供实时源或服务器的设备。这些协议被IP(互联网协议)摄像机或生产和传输系统(如OBS Studio或vMix)广泛使用。目标是详细显示必要的流程(以便在将来与低延迟服务相关的工作中再现它们),并最小化端到端延迟,获得2秒或更短的值。该实现是使用FFmpeg软件、Dash.js或Shaka-Player等播放器完成的,并实现了支持LL-DASH的Python web服务器来优化传输延迟。
{"title":"Performance Evaluation and Testbed for Delivering SRT Live Content using DASH Low Latency Streaming Systems","authors":"R. Belda, P. Arce, I. D. Fez, J. C. Guerri","doi":"10.1145/3551663.3558674","DOIUrl":"https://doi.org/10.1145/3551663.3558674","url":null,"abstract":"The work presented in this paper focuses on the implementation of a testbed for the evaluation of content distribution systems using LL-DASH (Low Latency DASH -Dynamic Adaptive Streaming over HTTP-) and devices that provide real-time sources or servers using real-time protocols, such as RTSP (Real Time Streaming Protocol) or SRT (Secure Reliable Transport). These protocols are widely used by IP (Internet Protocol) cameras or by production and transmission systems, such as OBS Studio or vMix. The objective is to show the necessary processes in detail (so they can be reproduced in future works related to low latency services) and to minimize the end-to-end delay, obtaining values in the order of 2 seconds or less. The implementation has been done using FFmpeg software, players like Dash.js or Shaka-Player and implementing a Python web server with LL-DASH support to optimize the transmission delay.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"74 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79609528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Wi-Fi HaLow, NB-IoT and LoRa for Smart City Applications 面向智慧城市应用的Wi-Fi HaLow、NB-IoT和LoRa性能评估
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558596
R. Verhoeven, Stash Kempinski, N. Meratnia
Long-range wireless technologies are at the core of Internet of Things (IoT) and smart city applications. While they offer many advantages in terms of ease of deployment, flexibility, mobility, and ubiquity, to name but a few, they are not equally suitable for smart city applications. Since 'one size fits all' does not hold in this context, finding out which long-range wireless technology is the best requires a thorough performance evaluation of these technologies in specific context and scenarios. In this paper, we focus on performance evaluation of three prominent long-range wireless communications, namely LoRa and Wi-Fi HaLow in the ISM band and NB-IoT in the licensed band, to better understand their benefits and limitations in the context of four smart city application scenarios. These scenarios cover both under and above ground applications in areas with different propagation properties.
远程无线技术是物联网(IoT)和智慧城市应用的核心。虽然它们在易于部署、灵活性、移动性和普遍性等方面提供了许多优势,但它们并不同样适用于智慧城市应用。由于“一刀切”在这种情况下并不适用,因此要找出哪种远程无线技术是最好的,需要在特定的环境和场景中对这些技术进行全面的性能评估。本文重点对ISM频段的LoRa和Wi-Fi HaLow以及许可频段的NB-IoT这三种著名的远程无线通信进行性能评估,以更好地了解它们在四种智慧城市应用场景下的优势和局限性。这些场景涵盖了具有不同传播特性区域的地下和地上应用程序。
{"title":"Performance Evaluation of Wi-Fi HaLow, NB-IoT and LoRa for Smart City Applications","authors":"R. Verhoeven, Stash Kempinski, N. Meratnia","doi":"10.1145/3551663.3558596","DOIUrl":"https://doi.org/10.1145/3551663.3558596","url":null,"abstract":"Long-range wireless technologies are at the core of Internet of Things (IoT) and smart city applications. While they offer many advantages in terms of ease of deployment, flexibility, mobility, and ubiquity, to name but a few, they are not equally suitable for smart city applications. Since 'one size fits all' does not hold in this context, finding out which long-range wireless technology is the best requires a thorough performance evaluation of these technologies in specific context and scenarios. In this paper, we focus on performance evaluation of three prominent long-range wireless communications, namely LoRa and Wi-Fi HaLow in the ISM band and NB-IoT in the licensed band, to better understand their benefits and limitations in the context of four smart city application scenarios. These scenarios cover both under and above ground applications in areas with different propagation properties.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89911969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Behind the Mix-Zones Scenes: On the Evaluation of the Anonymization Quality 混区场景背后:匿名化质量评价研究
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-24 DOI: 10.1145/3551663.3558601
Ekler Paulino de Mattos, A. C. Domingues, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro
In the flowering of ubiquitous computing, networks like the Internet of Things and the Internet of Vehicles have contributed to connecting objects and sharing location services in broad environments like smart cities bringing many benefits to citizens. However, these services yield massive and unrestricted mobility data of citizens that pose privacy concerns, among them recovering the identity of citizens with linking attacks. Although several privacy mechanisms have been proposed to solve anonymization problems, there are few studies about their behavior and analysis of the data quality anonymized by these techniques. In this paper, we introduce the anonymization quality. For this, we propose analyzing the mix-zones metrics Amount of Cars on Mix-zone (ACM), Interval of Arrival Time between Cars on Mix-zones (ITM), and Activation Time of the Mix-zone (ATM) for characterizing and evaluating the impacts of anonymization quality over time and space in mobility data. The results showed that mix-zone metrics reflect anonymization behavior and can measure the anonymization quality over time. This insight can contribute significantly to building privacy proposes based on anonymization more effectively than based only on traffic flow. To our knowledge, this is the first work that uses mix-zones metrics analysis to observe the anonymization behavior in quality terms.
在泛在计算的蓬勃发展中,物联网和车联网等网络为智能城市等广泛环境中的物体连接和共享位置服务做出了贡献,为市民带来了许多好处。然而,这些服务产生了大量不受限制的公民移动数据,这些数据构成了隐私问题,其中包括通过链接攻击恢复公民的身份。虽然已经提出了几种隐私机制来解决匿名化问题,但关于它们的行为和对这些技术匿名化的数据质量分析的研究很少。本文介绍了匿名化质量。为此,我们建议分析混合区域指标混合区域上的汽车数量(ACM),混合区域上的汽车到达时间间隔(ITM)和混合区域的激活时间(ATM),以表征和评估移动数据中匿名化质量随时间和空间的影响。结果表明,混合区域指标反映匿名化行为,可以衡量匿名化质量随时间的变化。这一见解对于构建基于匿名的隐私建议比仅基于流量的隐私建议更有效。据我们所知,这是第一个使用混合区域指标分析来观察质量方面的匿名化行为的工作。
{"title":"Behind the Mix-Zones Scenes: On the Evaluation of the Anonymization Quality","authors":"Ekler Paulino de Mattos, A. C. Domingues, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3551663.3558601","DOIUrl":"https://doi.org/10.1145/3551663.3558601","url":null,"abstract":"In the flowering of ubiquitous computing, networks like the Internet of Things and the Internet of Vehicles have contributed to connecting objects and sharing location services in broad environments like smart cities bringing many benefits to citizens. However, these services yield massive and unrestricted mobility data of citizens that pose privacy concerns, among them recovering the identity of citizens with linking attacks. Although several privacy mechanisms have been proposed to solve anonymization problems, there are few studies about their behavior and analysis of the data quality anonymized by these techniques. In this paper, we introduce the anonymization quality. For this, we propose analyzing the mix-zones metrics Amount of Cars on Mix-zone (ACM), Interval of Arrival Time between Cars on Mix-zones (ITM), and Activation Time of the Mix-zone (ATM) for characterizing and evaluating the impacts of anonymization quality over time and space in mobility data. The results showed that mix-zone metrics reflect anonymization behavior and can measure the anonymization quality over time. This insight can contribute significantly to building privacy proposes based on anonymization more effectively than based only on traffic flow. To our knowledge, this is the first work that uses mix-zones metrics analysis to observe the anonymization behavior in quality terms.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"34 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82773475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Ad Hoc & Sensor Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1