{"title":"On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds","authors":"A. Panchenko","doi":"10.1145/2815317.2815325","DOIUrl":"https://doi.org/10.1145/2815317.2815325","url":null,"abstract":"Common anonymizers focus only on a part of the users' personal identification information, namely on the network addresses of the communicating parties. In the light of the entire communication stack, even if the network addresses are perfectly anonymized, information leakage at one of the other layers can completely wipe out the entire effort. No popular anonymization network follows a holistic approach; all neglect the other layers. For example, at the application layer, they neither filter out nor even warn about information that may look innocent to the end-user, though it may be revealing. Security analysis of anonymizing networks usually also focuses only on a single layer. It has been shown that in theory taking more layers into account may help to enhance attacks. In this paper, we show how innocent-looking application layer data can be practically used to speedup the network-layer attack in the Crowds anonymization system, which is often applied in wireless and mobile networks. To this end, we define two new attacks -- the cross-layer and the combined attack -- to facilitate the process and show their superiority compared to the earlier predecessor attack. The attacks we propose allow not only building extensive user profiles at low cost, but also speeding up traditional network layer attacks, which are targeted at the identification of users' peer partners. Our analysis uncovers the consequences of ignoring the consideration of information that is available to the attacker. Without a holistic approach to analysis, it is not possible to perform a realistic threat assessment.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129917240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Madalena Pereira da Silva, M. Dantas, A. Gonçalves, A. R. Pinto
{"title":"A Managing QoE Approach for Provisioning User Experience Aware Services Using SDN","authors":"Madalena Pereira da Silva, M. Dantas, A. Gonçalves, A. R. Pinto","doi":"10.1145/2815317.2815321","DOIUrl":"https://doi.org/10.1145/2815317.2815321","url":null,"abstract":"Provision and delivery of services with quality is a classic research problem, however the computational resources available in the network infrastructure of providers are, usually, managed with conventional Quality of Service (QoS) parameters. This paper presents an approach of Quality of Experience (QoE) management for providing services aware of the user experience. QoE modeling and architecture are proposed, with a semantic engine able to learn the user's experience during the use of a service, detecting violations of QoS metrics and providing information, allowing the controller to perform actions in the elements of the Software Defined Networking. The experimental results demonstrate that the proposal is feasible and functional and that the time spent between QoE detection and adaptation of policies in network resources do not influence the quality perceived by the user.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks","authors":"Markus Jung, A. Hergenröder","doi":"10.1145/2815317.2815331","DOIUrl":"https://doi.org/10.1145/2815317.2815331","url":null,"abstract":"High-quality simulation tools are crucial to evaluate the energy efficiency of applications and protocols for wireless sensor networks in the most realistic way. Sensor node emulators like Avrora are well-suited for homogeneous networks but can not cope with heterogeneous networking scenarios. Wireless sensor networks have been used mostly isolated for special purposes in the past. But use cases like the so called smart environments require wireless sensor nodes to communicate and interact with other devices too. In this paper, we present OMNeTA as a solution to this problem, offering the ability to simulate highly heterogeneous networks of different device classes. Our hybrid simulation approach combines the proven hardware emulation by Avrora, radio communication simulation by mixim and the flexibility of OMNeT++. Bridging the abstraction gap between hardware emulation and network simulation, OMNeTA may also reduce the effort required to experiment with new protocols, applications or other varying parameters, by enabling rapid-prototyping like development processes.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","authors":"","doi":"10.1145/2815317","DOIUrl":"https://doi.org/10.1145/2815317","url":null,"abstract":"","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}