{"title":"Adaptive IoT Service Configuration Optimization in Edge Networks","authors":"Mengyu Sun, Zhangbing Zhou, Walid Gaaloul","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484465","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484465","url":null,"abstract":"The collaboration of Internet of Things (IoT) devices promotes the computation at the network edge to satisfy latency-sensitive requests. The functionalities provided by IoT devices are encapsulated as IoT services, and the satisfaction of requests is reduced to the composition of services. Due to the hard-to-prediction of forthcoming requests, an adaptive service configuration is essential, when latency constraints are satisfied by composed services. This problem is formulated as a continuous time Markov decision process model constructed with updating system states, taking actions and assessing rewards constantly. A temporal-difference learning approach is developed to optimize the configuration, while taking long-term service latency and energy efficiency into consideration. Experimental results show that our approach outperforms the state-of-art’s techniques for achieving close-to-optimal service configurations.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daisy Roberts, A. Srivastava, Fraida Fund, S. Panwar
{"title":"Tackling the latency divide with Copa","authors":"Daisy Roberts, A. Srivastava, Fraida Fund, S. Panwar","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484571","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484571","url":null,"abstract":"As voice- and video-based services that require low latency become increasingly essential, a tremendous research effort has been devoted to improving the latency performance of networks. However, there remains a \"latency divide\" between those whose Internet access is subject to high latency and those with low-latency access. Furthermore, it is unclear whether the aforementioned research efforts narrow this divide (by improving the latency performance of poor-quality connections the most), maintain the divide (by improving poor- and high-quality connections equally), or even widen the divide (by mostly reducing latency of high-quality network connections). In this work, we design a reproducible experiment for evaluating the performance of Copa, a delay-based congestion control protocol, in different categories of residential broadband connections. We use empirical data from U.S. home network connections to evaluate whether Copa leads to more equitable network access. We confirm that Copa has potential to narrow the \"digital divide\" by improving latency performance for users with a low-quality residential broadband connection, although care must be taken to set appropriate parameters for best performance.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingshan Liu, Ke Xiong, Yang Lu, Pingyi Fan, K. Letaief
{"title":"Age-constrained Energy Minimization in UAV-Assisted Wireless Powered Sensor Networks: A DQN-based Approach","authors":"Lingshan Liu, Ke Xiong, Yang Lu, Pingyi Fan, K. Letaief","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484487","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484487","url":null,"abstract":"This paper proposes a deep Q network (DQN)-based solution framework to minimize UAV’s energy consumption in UAV-assisted wireless powered sensor network under the age of information (AoI) constraint, where a UAV wirelessly charges ground sensors and then the sensors use harvested energy to upload their freshly collected information to the UAV. The corresponding non-convex energy-minimization problem is first modeled as a Markov process, and then the state spaces, action spaces and reward function are designed. Simulation results show that the proposed DQN achieves much smaller energy consumption than traditional greedy-based scheme, and when the number of sensors is more than 8, traditional greedy-based scheme becomes very difficult to solve the problem, while our presented DQN method can still find an optimal solution. Moreover, the UAV’s energy consumption increases with the decrease of AoI or the increment of sensors’ amount, and with the rotation angle constraint, UAV’s trajectory becomes smooth.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aerial Wireless Networks: Proposed Solution for Coverage Optimisation","authors":"Shadi Eltanani, Ibrahim Ghafir","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484609","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484609","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs), commercially known as drones, have received great attention. This is due to their versatility and applicability to a large number of domains such as surveillance system, aerial photography, traffic control, flyable base stations to provide a broadband coverage and even for future urban transportation services. In this paper, the optimal distance between multiple aerial base stations has analytically been derived, based on an aerial coverage area computation. This is a fundamental wireless metric that can significantly minimise the intra-overlapped coverage and also can enhance wireless coverage connectivity and performance of aerial wireless networks. The novelty of our approach brings a better aerial optimal design understanding for UAVs communications performance without the need for establishing an aerial deployment setup.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Adversarial Attacks Against Executable Raw Byte Classifiers","authors":"Justin Burr, Shengjie Xu","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484612","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484612","url":null,"abstract":"Machine learning models serve as a powerful new technique for detecting malware. However, they are extremely vulnerable to attacks using adversarial examples. Machine learning models that classify Windows Portable Executable (PE) files are challenging to attack using this method due to the difficulty of manipulating executable file formats without compromising their functionality. In this paper, our objective is to propose and develop advanced attacks against models such as MalConv, which forgo feature engineering in favor of ingesting the entire executable file as a raw byte sequence. We will attempt to discover attack methods that are much more sophisticated and difficult to detect than current methods that simply append large amounts of specially-crafted byte sequences to the end of the PE file.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115789232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OctoBot: An Open-Source Orchestration System for a Wide Range Network Activity Generation","authors":"A. C. Risdianto, E. Chang","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484537","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484537","url":null,"abstract":"Experimentation in a large-scale testbed environment requires a large amount of emulated traffic to ensure realistic scenario execution and better experiment results. A large number of human-generated network activities can emulate traffic from real network users. Deploying and producing a single activity from an individual user is simple, but emulating and automating it from multiple users with a wide range of activities is challenging. We designed a containerized human agent (i.e., bot) to generate a single activity. Thus, a large number of bots can be deployed and controlled by a single orchestration system. Due to the complexity and wide-range usage of container orchestration systems, we need to develop a simpler system that leverages widely-used open-source container orchestrator. So, researchers and scientists can easily use it to define and execute activity requirements with a few command lines or a single specification file. This work shows the implementation of an orchestration system with several unique bots and their deployment in a production testbed environment. Several activity use cases are also presented to verify their functionality to support large-scale experimentation.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Service Pricing Model for UAV Swarms: A Stackelberg Game Approach","authors":"Gaurang Bansal, B. Sikdar","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484577","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484577","url":null,"abstract":"Unmanned Aerial Vehicles, popularly known as UAVs, have been used in many applications, from healthcare services to military assignments with diverse capabilities such as data transmission, cellular service provisioning, and computational offloading tasks. UAV’s have been recently used to provide Security as a Service (SaaS). SaaS involves technical solutions like anti-virus and anti-spam software, firewalls, using secure operating systems, etc. UAV’s are resource-constrained devices, and thus they are connected to the base station (BS) so that they may avail the computational facilities of the BS. The UAV’s connect themselves to the base station using cluster heads (intermediary devices). At times several UAVs cooperatively come together to serve a given region and such a group of UAVs is called a swarm of UAVs. In real-world scenarios, many stakeholders come together to form UAV swarm configuration proving services to users. Each stakeholder wants to maximize his gains. In this work, we propose a pricing Stackelberg game among UAVs, Cluster heads, and BS by formulating their behavioral utilities. Using particle swarm optimization on each entity’s utility functions, we create an optimal price strategy for each entity to maximize their profit.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lizhuang Tan, Wei Su, Yanwen Liu, Xiaochuan Gao, Wei Zhang
{"title":"DCQUIC: Flexible and Reliable Software-defined Data Center Transport","authors":"Lizhuang Tan, Wei Su, Yanwen Liu, Xiaochuan Gao, Wei Zhang","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484596","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484596","url":null,"abstract":"Numerous innovations based on the data center TCP support the rapid development of data center. However, with changes in topology, scale and traffic patterns, the new requirements of data center on transport protocol are more agile and more reliable. Improving transport performance by patching TCP seems to be facing a bottleneck. We explored the possibility of applying QUIC inside the datacenter networking. This paper proposes a new data center transport scheme based on QUIC, called data center QUIC (DCQUIC). We especially proposed an proactive connection migration mechanism suitable for datacenter networking. Like the efficiency of UDP and the reliability of TCP, DCQUIC exhibits exciting performance and scalability, and may become a potential transport technology to support the development and innovation of data centers in the future.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126584519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Immersive Surveillance of Inaccessible Regions using UAV Network","authors":"Anuj Bist, Chetna Singhal","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484539","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484539","url":null,"abstract":"In this paper, we propose a Real-Time Immersive Surveillance System with a reduced number of Unmanned Aerial Vehicles (UAVs) required to cover any inaccessible area for video surveillance. To start with, we have developed a twin servo based camera assembly which is capable to move in horizontal and vertical axis (Pan and Tilt) providing us flexibility to change our field of view without physically moving the UAV. The movable assembly for sensor can be controlled in two ways - Auto mode and Movement Based on accelerometer data of mobile phone. The Real Time video feed can be viewed on Big screens as well as on HMDs (Head Mounted Displays) using mobile phones. Furthermore, a holistic view of this area can be created using feed from multiple drones, which provides an immersive experience. The maximum distance between GCS and Anchor UAV have been obtained experimentally based on acceptable packet loss and Quality-of-Experience (QoE) for video streaming. In order to minimise the number of drones to cover the entire area, we have utilised the capability of this movable camera setup. To calculate the area covered in various position of sensor, the concept of Field of View (FOV) of the on-board camera has been used. We have also discussed the necessary limitations of the extent of camera movement and the camera setup.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125187523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Malicious Hosts in SDN through System Call Learning","authors":"D. Chasaki, Christopher Mansour","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484586","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484586","url":null,"abstract":"Software Defined Networking (SDN) has changed the way of designing and managing networks through programmability. However, programmability also introduces security threats. In this work we address the issue of malicious hosts running malicious applications that bypass the standard SDN based detection mechanisms. The SDN security system we are proposing periodically monitors the system calls utilization of the different SDN applications installed, learns from past system behavior using machine learning classifiers, and thus accurately detects the existence of an unusual activity or a malicious application.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}