{"title":"BoTM: Basestation-on-the-move, a Radio Access Network Management Primitive","authors":"Aashish Gottipati, J. Merwe","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484447","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484447","url":null,"abstract":"Software-defined Radio Access Networks (SD-RANs) enable unparalleled flexibility and the opportunity to customize and/or optimize network operations. In particular, network function virtualization suggests that network functions are no longer tightly coupled to any specific hardware instance or location. In this paper we present our work on BoTM, basestationon-the-move, where we exploit network function virtualization in an SD-RAN environment to dynamically \"move\" a mobile base station from one location to another to realize a general RAN management primitive. Specifically, we show how an SD-RAN environment enables orchestration across both the virtual infrastructure layer (i.e., the base station) as well as the mobile network functional layer (i.e., the protocol interactions in a mobile network), allowing a base station and its associated endpoints to be moved, fostering new network management functionality. We present the design and implementation of this network management primitive using Open Air Interface and the FlexRAN framework, with experimental results and efficiency metrics.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134159001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuan Gao, Cheng Yang, Weidang Lu, Yi Wenchen, Yu Zhang, Guoxing Huang, Jiang Cao
{"title":"Joint Resource Optimization in Two-way Relaying Energy Harvesting Cognitive Sensor Network","authors":"Yuan Gao, Cheng Yang, Weidang Lu, Yi Wenchen, Yu Zhang, Guoxing Huang, Jiang Cao","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484617","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484617","url":null,"abstract":"Simultaneous wireless information and power transfer (SWIPT) and cognitive radio (CR) can enable wireless sensor networks (WSNs) overcome the problem of limited service lifetime and the scarcity of spectrum. Cooperative relaying can further improve the performance and capacity of WSNs. This paper mainly investigates the performance of an OFDM based two-way decode-and-forward (DF) relaying cognitive sensor network (CSN) with energy harvesting. The cognitive sensor node serves as an energy harvesting relay which divides the subcarriers into two groups for transmitting the information of the primary users and itself. In order to maximize the transmission rate of CSN, we propose a joint resource optimization algorithm. Simulation results demonstrate the performance of the joint optimization algorithm.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131056975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Job Multi-Edge Allocation in Edge Computing Environments","authors":"Shihao Li, Weiwei Miao, Zeng Zeng, Lei Wei, Chengling Jiang, Chuanjun Wang, Mingxuan Zhang","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484470","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484470","url":null,"abstract":"With the rapid advancement of Internet of Things (IoT) and social networking application, the clouds is moving towards the network edges. It is foreseeable that more and more data will be processed in edge, and research organizations estimate that over 90% of the data will be stored and processed locally. This paper focus on the resource allocation for the multi-job multi-edge environments. We formulate the allocation problem as the concurrent job scheduling problem (CJSP), which is shown to be NP-complete. We propose the Weight Balance (WB) Algorithm to solve a special case of CJSP and we show that WB is optimal under some conditions. We then expand WB to solve the general CJSP. Extensive simulations demonstrate that the performance of our algorithm at small user and edge scale is almost as good as the optimal algorithm.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiMatch: Wireless Resource Matchmaking","authors":"Kirk Webb, S. Kasera, Neal Patwari, J. Merwe","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484538","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484538","url":null,"abstract":"Real world testbeds, like the POWDER platform (Platform for Open Wireless Data-driven Experimental Research), enable a broad range of mobile and wireless research. Given the flexibility of this platform, a key concern for platform users is selecting a set of wireless resources that will satisfy the requirements of their experiments. In this paper we present the design and implementation of WiMatch a wireless resource matchmaking system. We illustrate the utility of our approach by evaluating it in the POWDER platform.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hadeel Alrubayyi, G. Goteng, Mona Jaber, James Kelly
{"title":"A Novel Negative and Positive Selection Algorithm to Detect Unknown Malware in the IoT","authors":"Hadeel Alrubayyi, G. Goteng, Mona Jaber, James Kelly","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484483","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484483","url":null,"abstract":"The Internet of Things (IoT) paradigm is a key enabler to many critical applications, thus demands reliable security measures. IoT devices have limited computational power, hence, are inadequate to carry rigorous security mechanisms. This paper proposes the Negative-Positive-Selection (NPS) method which uses an artificial immunity system technique for malware detection. NPS is suitable for the computation restrictions and security challenges associated with IoT. The performance of NPS is benchmarked against state-of-the-art malware detection schemes using a real dataset. Our results show a 21% improvement in malware detection and a 65% reduction in the number of detectors. NPS meets IoT-specific requirements as it outperforms other malware detection mechanisms whilst having less demanding computational requirements.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralised Internet Infrastructure: Securing Inter-Domain Routing (DEMO)","authors":"Miquel Ferriol Galmés, A. Cabellos-Aparicio","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484629","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484629","url":null,"abstract":"The Border Gateway Protocol (BGP) is the inter-domain routing protocol that glues the Internet. BGP does not incorporate security and instead, it relies on careful configuration and manual filtering to offer some protection. As a consequence, the current inter-domain routing infrastructure is partially vulnerable to prefix and path hijacks as well as in misconfigurations that results in route leaks. There are many instances of these vulnerabilities being exploited by malicious actors on the Internet, resulting in disruption of services. To address this issue the IETF has designed RPKI, a centralised trust architecture that relies on Public Key Infrastructure. RPKI has slow adoption and its centralised nature is problematic: network administrators are required to trust CAs and do not have the ultimate control of their own critical Internet resources (e.g,. IP blocks, AS Numbers). In this context, we have built the Decentralised Internet Infrastructure (DII), a distributed ledger to securely store inter-domain routing information. The main advantages of DII are (i) it offers flexible trust models where the Internet community can define the rules of a consensus algorithm that properly reflects the power balance of its members and, (ii) offers protection against vulnerabilities (path hijack and route leaks) that goes well beyond what RPKI offers. We have deployed the prototype on the wild in a worldwide testbed including 7 ASes, we will use the testbed to demonstrate in a realistic scenario how allocation and delegation of Internet resources in DII work, and how this protects ASes against artificially produced path and prefix hijack as well as a route leak.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115086015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interactive and Immersive Remote Education Platform based on Commodity Devices","authors":"Jiangong Chen, Feng Qian, Bin Li","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484492","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484492","url":null,"abstract":"Virtual reality (VR) holds a great potential to provide interactive and immersive learning experiences for students in remote education by using existing mobile devices, which is extremely meaningful during the current pandemic. In such a VR application, satisfactory user experience requires: 1) high-resolution panoramic image rendering; 2) high frame rate; 3) synchronization among users. This requires that either mobile devices perform fast image rendering or today’s wireless network can support multi-Gbps traffic with extremely low delay, neither of which is the case in current practice. In this demo, we develop a platform for interactive and immersive remote education based on commodity devices, where a server performs rendering to ensure that the rendered images have high-resolution (2560×1440 pixels) and are displayed at a high frame rate (60 frames per second) on the client-side. We further leverage motion prediction to overcome the diverse round-trip time (RTT) between a server and users and ensure synchronization among users (average 9.2 ms frame latency difference among users), which improves at least 60% and 20% compared to the existing local-rendering and server-rendering methods, respectively.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116884156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features","authors":"Hua Wu, Xin Li, Guang Cheng, Xiaoyan Hu","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484509","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484509","url":null,"abstract":"With the rapid growth of mobile video traffic, a wide range of third-party entities need to better understand the status of video quality for QoE monitoring and network management. Video resolution, as a direct reflection of video quality, is a key influence factor of QoE. However, the existing approaches cannot accurately identify the resolution of video traffic under HTTP/2 due to the multiplexing mechanism of HTTP/2. To address this issue, we proposed a method, dubbed as H2CI, to consider the size of the mixed data calculated based on HTTP/2 features as the fingerprint for identification. H2CI can accurately restore the original length of chunks from encrypted video streaming and perform the fine-grained resolution identification. The experimental results show the promise of our method, yielding more than 99% accuracy for fine-grained video resolution identification. Our method can be effectively applied to infer the adaption behavior of video streaming and monitor the QoE of mobile video services under HTTP/2.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A system for detecting third-party tracking through the combination of dynamic analysis and static analysis","authors":"Jingxue Sun, Zhiqiu Huang, Ting Yang, Wengjie Wang, Yuqing Zhang","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484564","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484564","url":null,"abstract":"With the continuous development of Internet technology, people pay more and more attention to private security. In particular, third-party tracking is a major factor affecting privacy security. So far, the most effective way to prevent third-party tracking is to create a blacklist. However, blacklist generation and maintenance need to be carried out manually which is inefficient and difficult to maintain. In order to generate blacklists more quickly and accurately in this era of big data, this paper proposes a machine learning system MFTrackerDetector against third-party tracking. The system is based on the theory of structural hole and only detects third-party trackers. The system consists of two subsystems, DMTrackerDetector and DFTrackerDetector. DMTrackerDetector is a JavaScript-based subsystem and DFTrackerDetector is a Flash-based subsystem. Because tracking code and non-tracking code often call different APIs, DMTrackerDetector builds a classifier using all the APIs in JavaScript as features and extracts the API features in JavaScript through dynamic analysis. Unlike static analysis method, the dynamic analysis method can effectively avoid code obfuscation. DMTrackerDetector eventually generates a JavaScript-based third-party tracker list named Jlist. DFTrackerDetector constructs a classifier using all the APIs in ActionScript as features and extracts the API features in the flash script through static analysis. DFTrackerDetector finally generates a Flash-based third-party tracker list named Flist. DFTrackerDetector achieved 92.98% accuracy in the Flash test set and DMTrackerDetector achieved 90.79% accuracy in the JavaScript test set. MFTrackerDetector eventually generates a list of third-party trackers, which is a combination of Jlist and Flist.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"47 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Credit Framework in the Remote Work Era","authors":"Yongjin Kim","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484486","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484486","url":null,"abstract":"Traditional corporate device and network security principles and threat modeling are largely based on the physical location of a device. It poses significant challenges in the new-norm of remote work era since employees’ devices are no longer confined within company’s physical perimeter. Employees are accessing critical corporate resources from anywhere with corporate-issued devices. Zero Trust networks is a promising solution since it provides a unified network security framework regardless of its location. However, it is challenging to implement Zero Trust networks due to the lack of standard technology and interoperable solution. In this paper, we propose a framework to materialize Zero Trust networks efficiently by introducing a novel concept - virtual device credit. Based on the proposed virtual credit concept, Zero Trust network can be materialized in a seamless way allowing reuse of existing network security and access control technologies.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}