2022 18th International Conference on Mobility, Sensing and Networking (MSN)最新文献

筛选
英文 中文
Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning* 基于深度学习的5G环境下异常代理语音流量识别*
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00070
Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu
{"title":"Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning*","authors":"Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu","doi":"10.1109/MSN57253.2022.00070","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00070","url":null,"abstract":"With the commercial use of the fifth generation (5G), the rapid popularization of mobile Over- The- Top (OTT) voice applications has brought high-quality voice communication methods to users. The intelligent Internet in the 5G era makes communication terminals not limited to mobile phones. The complex communication environment has higher requirements for the security of data transmission between various terminals to prevent the system from being monitored or breached. At present, many OTT users use encrypted proxy technology to get rid of certain restrictions of network operators, prevent their private information from leaking, and ensure communication security. However, in some cases the encryption proxy may be subject to configuration error or maliciously attacked makes the encryption ineffective. The resulting abnormal proxy traffic may cause privacy leakage when users use voice services. However, little effort has been put on fingerprint the effectiveness of encryption for proxy voice traffic in a 5G environment. To this end, we adopt the VGG deep learning method to identify agent speech traffic, compare it with common deep learning methods, and study the impact on model performance with less abnormal traffic. Extensive experimental results show that the deep learning method we use can identify abnormal encrypted proxy voice traffic with the accuracy up to 99.77%. Moreover, VGG outperform other DL methods on indentifying the encryption algorithms of normal encrypted proxy traffic.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115622501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer Learning based City Similarity Measurement Methods 基于迁移学习的城市相似性度量方法
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00107
Chenxin Qu, Xiaoping Che, Ganghua Zhang
{"title":"Transfer Learning based City Similarity Measurement Methods","authors":"Chenxin Qu, Xiaoping Che, Ganghua Zhang","doi":"10.1109/MSN57253.2022.00107","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00107","url":null,"abstract":"In recent years, in order to solve the problem of deep learning in data deficient cities, especially the cold start problem. Researchers put forward a new idea: transfer the model and knowledge from data abundant cities to data scarce cities, also called urban transfer learning. However, in urban transfer learning, the cost for transferring different target cities and source cities cannot be known in advance. In other words, the effectiveness of urban transfer learning need to be improved. In order to solve this problem, we propose a general method for city similarity measurement in urban transfer learning. Through this method, we carry out transfer learning among the cities with higher degree of similarity, which obviously improve the effectiveness of transfer learning at the data level. At the same time, we have also effectively combined this city similarity measurement method with urban transfer learning, and demonstrated the relevant experiment results.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RTSS: Robust Tuple Space Search for Packet Classification RTSS:数据包分类的鲁棒元组空间搜索
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00157
Jiayao Wang, Ziling Wei, Baosheng Wang, Shuhui Chen, Jincheng Zhong
{"title":"RTSS: Robust Tuple Space Search for Packet Classification","authors":"Jiayao Wang, Ziling Wei, Baosheng Wang, Shuhui Chen, Jincheng Zhong","doi":"10.1109/MSN57253.2022.00157","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00157","url":null,"abstract":"Packet classification shows an essential role in net-work functions. Traditional classification algorithms assume that all field values are available and valid. However, such a premise is being challenged as networks become more complex now. Scenarios with field-missing poses great challenges to packet classifiers. Existing approaches can only list all possible situations in such cases, increasing the workload exponentially. RFC algorithm is proved to be helpful for this issue in our previous work, but its spacial performance is much poor. In this paper, we propose a novel classification scheme using Tuple Space Search (TSS) to deal with missing fields. We redesign the hash calculation method and raise a new data structure to recover field-missing packets. The experiment shows that RTSS reduce the memory consumption and construction time by several orders of magnitude. At the same time, RTSS has better classification performance than previous work, while supporting fast updates.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115193699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Secure Node-sampling Consensus Mechanism for Blockchain Systems 区块链系统中高效安全的节点采样共识机制
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00067
Zhelin Liang, Hao Xu, Xiulong Liu, Shan Jiang, Keqiu Li
{"title":"An Efficient and Secure Node-sampling Consensus Mechanism for Blockchain Systems","authors":"Zhelin Liang, Hao Xu, Xiulong Liu, Shan Jiang, Keqiu Li","doi":"10.1109/MSN57253.2022.00067","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00067","url":null,"abstract":"The consensus mechanism plays a pivotal role in guaranteeing the security and consistency of blockchain systems and substantially affects system performance. However, an increasing number of blockchain nodes degrade the consensus performance dramatically because of the high communication complexity in traditional consensus mechanisms. In this paper, we propose NS-consensus, a secure node-sampling blockchain consensus mechanism reducing the communication complexity significantly. The key novelty lies in the sampling of blockchain nodes so that the leader only needs to interact with the sampling nodes in each consensus epoch. However, NS-consensus imposes two challenges in determining an optimal sample size and denying malicious proposals. To address the challenges, we determine the sample size under the constraints of a confidence level and a margin of error to enhance communication efficiency without compromising system security. Furthermore, we design a mechanism to enable the leader to interact with all blockchain nodes in the last consensus phase, ensuring the denial of malicious proposals. The extensive experimental results indicate that NS-consensus outperforms the state-of-the-art with up to 175.1% higher system throughput and 79.9% lower time overhead in the sampling phases.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynotes: MSN 2022 主题演讲:MSN 2022
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/msn57253.2022.00010
{"title":"Keynotes: MSN 2022","authors":"","doi":"10.1109/msn57253.2022.00010","DOIUrl":"https://doi.org/10.1109/msn57253.2022.00010","url":null,"abstract":"","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122874753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leakage Detection via Edge Processing in LoRaWAN-based Smart Water Distribution Networks 基于lorawan的智能配水网络边缘处理的泄漏检测
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00047
D. Garlisi, Gabriele Restuccia, I. Tinnirello, F. Cuomo, I. Chatzigiannakis
{"title":"Leakage Detection via Edge Processing in LoRaWAN-based Smart Water Distribution Networks","authors":"D. Garlisi, Gabriele Restuccia, I. Tinnirello, F. Cuomo, I. Chatzigiannakis","doi":"10.1109/MSN57253.2022.00047","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00047","url":null,"abstract":"The optimization and digitalization of Water Distribution Networks (WDNs) are becoming key objectives in our modern society. Indeed, WDNs are typically old, worn and obsolete. These inadequate conditions of the infrastructures lead to significant water loss due to leakages inside pipes, junctions and nodes. It has been measured that in Europe the average value of lost water is about 26 %. Leakage control in current WDNs is typically passive, repairing leaks only when they are visible. Emerging Low Power Wide Area Network (LPWAN) technologies, and especially IoT ones, can help monitor water consumption and automatically detect leakages. In this context, LoRaWAN can be the right way to deploy a smart monitoring system for WDNs. Moreover, most of the current smart WDNs solutions just collect measurements from the smart metres and send the data to the cloud servers, in order to execute the intended analyses, in centralised way. In this paper, we propose new solutions to improve monitoring, leak management and prediction by exploiting edge processing capabilities inside LoRaWAN networks. Our approach is based on an IoT system of water sensors that are placed at junctions of the WDN to have measurements in correspondence to various smart metres in the network and Machine Learning (ML) algorithms to process the data directly at the edge in order to visualise and predict leakages. We present a numerical simulation tool useful to evaluate the suggested monitoring method. Based on our results, we examine whether it is possible to identify network leaks using the edges without having a complete or accurate overview of the collected measurements of the full WDN. System performance is shown separately at gateways network.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rendezvous Delay-Aware Multi-Hop Routing Protocol for Cognitive Radio Networks 认知无线网络的交会延迟感知多跳路由协议
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00020
Zengqi Zhang, Sheng Sun, Min Liu, Zhongcheng Li, Qiuping Zhang
{"title":"Rendezvous Delay-Aware Multi-Hop Routing Protocol for Cognitive Radio Networks","authors":"Zengqi Zhang, Sheng Sun, Min Liu, Zhongcheng Li, Qiuping Zhang","doi":"10.1109/MSN57253.2022.00020","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00020","url":null,"abstract":"In cognitive radio networks (CRNs), due to the external interference from primary users, secondary users (SUs) cannot reserve a common control channel (CCC). Hence, it is essential to consider the impact of channel rendezvous on the end-to-end delay in multi-hop CRNs. For this reason, we propose a High Probabilistic Transmission Efficiency Multi-hop Routing (HPTEMR) protocol without utilizing a CCC. In HPTEMR, we design an efficient waiting channel hopping sequence to achieve fast channel rendezvous between neighborhood SUs. We then propose a novel link metric, i.e., transmission efficiency, which characterizes the transmission distance and channel-rendezvous delay. Based on the link metric, a sender SU transmits data packets to the receiver SU with the highest probability that data packets can be forwarded to the destination SU with the shortest end-to-end delay. Evaluation results verify the effectiveness of HPTEMR and show its superiority in end-to-end delay and ratio of effective packets.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128433815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T2C: A Multi-User System for Deploying DNNs in a Thing-to-Cloud Continuum T2C:用于在物到云连续体中部署dnn的多用户系统
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00052
C. Hsieh, Praveen Venkateswaran, N. Venkatasubramanian, Cheng-Hsin Hsu
{"title":"T2C: A Multi-User System for Deploying DNNs in a Thing-to-Cloud Continuum","authors":"C. Hsieh, Praveen Venkateswaran, N. Venkatasubramanian, Cheng-Hsin Hsu","doi":"10.1109/MSN57253.2022.00052","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00052","url":null,"abstract":"The importance of IoT analytics in smart deploy-ments has resulted in an increased use of powerful Deep Neural Network (DNN) models to extract insights from the growing amount of IoT sensor data. Traditional approaches that entirely offload computation and model deployment to cloud servers have been shown to be inefficient due to network congestion and latency concerns. However, with the improved capabilities of IoT devices, it has now become possible to distribute and host DNNs across IoT devices, edge servers and the cloud. In this paper, we propose a multi-user system, called T2C, to dynamically choose, deploy, monitor and control DNN-driven IoT analytics in a thing-to-cloud continuum. T2C leverages strategies such as multi-task learning, hitchhiking, early exit, and dynamic reconfiguration, to maximize the number of served user requests while simultaneously satisfying accuracy and latency requirements. We propose a suite of deployment planning and reconfiguration algorithms to dynamically deploy and migrate DNN layers between IoT devices, edge servers, and the cloud. We implement T2C in a prototype testbed and show that our system: (i) achieves 6.8X throughput boost compared to baseline algorithms in the planning phase, and (ii) improves the satisfied ratio by up to 35% in the operation and reconfiguration phase.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Motion Propagation Prediction based Sim2Real Strategy Migration for Clutter Removal 基于运动传播预测的Sim2Real策略移动杂波去除
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00092
Jiaxin Zhang, Ping Zhang
{"title":"A Motion Propagation Prediction based Sim2Real Strategy Migration for Clutter Removal","authors":"Jiaxin Zhang, Ping Zhang","doi":"10.1109/MSN57253.2022.00092","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00092","url":null,"abstract":"When objects are densely placed, training in the simulation with artificial samples and removing clutter are helpful to reduce the cost and risk. However, the performance of control strategy decreases in sim2real is still a challenge. This paper introduces a clutter removal method of sim2real using object motion propagation prediction. In this method, based on deep reinforcement learning, push and grasp actions are used to remove clutter. The reward of push action is calculated based on the object divergence of quadtree. The action strategy is trained in the simulation environment. Due to the position error caused by the robot pushing the object in the simulation and real environment, the object motion propagation prediction network based on graph neural network is used to predict the pushing results in the real environment and replace the real push action to training pushing strategy to improve the reward value. The pushing strategy learned in the simulation is subject to fine-tuning based on differential evolution. Compared with applying the action strategy directly to the real environment, the method in this paper has higher action efficiency and completion rate.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of DoH Tunnels with Dual-Tier Classifier 基于双层分类器的DoH隧道检测
2022 18th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2022-12-01 DOI: 10.1109/MSN57253.2022.00073
Yuqi Qiu, Baiyang Li, Liang Jiao, Yujia Zhu, Qingyun Liu
{"title":"Detection of DoH Tunnels with Dual-Tier Classifier","authors":"Yuqi Qiu, Baiyang Li, Liang Jiao, Yujia Zhu, Qingyun Liu","doi":"10.1109/MSN57253.2022.00073","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00073","url":null,"abstract":"DNS over HTTPS (DoH) has been deployed to provide confidentiality in the DNS resolution process. However, encryption is a double-edged sword in providing security while increasing the risk of data tunneling attacks. Current approaches for plaintext DNS tunnel detection are disabled. Due to the diversity of tunneling tool variations and the low proportion of tunneled traffic in real situations, detecting malicious behaviors is becoming more and more challenging. In this paper, we propose a novel behavior-based model with Dual-Tier Tunnel Classifier (DTC) for tool-level DoH tunneling detection. The major advantage of DTC is that it can not only capture existing tunneling tools but also explore unknown ones in the wild. In particular, DTC considers data imbalance, which improves robustness of the model in the open environment. Our method has been proven successful in both closed and open scenarios, achieving 99.99 % accuracy in detecting known malicious DoH traffic, 96.93% accuracy in unknown and 95.31 % accuracy in identifying malicious DoH tunnel tools.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121728906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信