{"title":"Study on Remote Identification and Integrated Information Management Technology for Unmanned Aerial Vehicles","authors":"Suna Choi, Kyu-min Kang","doi":"10.1109/ICCCN58024.2023.10230213","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230213","url":null,"abstract":"As many unmanned aerial vehicles(UAVs) are applied in various industries and services, concerns about the illegal use of UAVs are highly increasing. Accordingly, the importance of remote identification and information management technology for UAVs is emphasized. The equipment mounted on the UAV periodically transmits identification information, which is remotely received by the ground receiving equipment. The identification information of the UAV is collected and managed in the information integrated management system. Furthermore, the UAV identification technology can be applied to build an enhanced 3-step counter-UAV system consisting of detection, remote identification, and neutralization. For this purpose, a linked process between the detection, remote identification, and neutralization systems is presented.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Analysis of Phase Error in Centralized and Distributed SDR Systems","authors":"Mahmoud Badi, D. Rajan, J. Camp","doi":"10.1109/ICCCN58024.2023.10230196","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230196","url":null,"abstract":"Understanding the behavior of phase errors between radio frequency (RF) chains in software-defined radios (SDRs) is crucial to the success of implementing many phase-sensitive applications, such as beamforming. Even if SDRs are provided the same clocking signal, initial local oscillator (LO) phase offsets across devices will inevitably be different. Despite its known effect on many wireless applications, there are only few works that experimentally discuss random phase errors in SDRs. To address this issue, we perform experiments and analyze the results of tens of experiments in an attempt to understand the nature of this phase offset. In particular, we target the USRP (Universal Standard Radio Peripheral) N310 platform as it provides up to 4 simultaneous transmit/receive chains that could be attractive for beamforming applications. We first model the system used in this study and demonstrate how phase errors can affect distributed beamforming gains. Then, we introduce our experimental setup, procedures and analysis of the results of the measured phase error. We do so first between two chains of the same/different transceiver boards within the same USRP, and then between chains of distributed USRPs that are geographically separated. We calculate the mean and standard deviation of this phase error, investigate its behavior over time, and demonstrate how the distribution of this error can vary based on whether it is measured in a centralized or a distributed fashion.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133884582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Approach for Temporal Traffic Selection Across Various Applications","authors":"N. Sharmin, Jaime C. Acosta, Chris Kiekintveld","doi":"10.1109/ICCCN58024.2023.10230120","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230120","url":null,"abstract":"The paper presents a framework that analyzes temporal traffic in applications, with a focus on statistical analysis and traffic classification. The framework utilizes time-based sampling and traffic flow selection to identify the characteristics of idle time, continuous traffic and burst threshold. It also includes time-based feature selection to improve the accuracy and efficiency of predictive models by removing irrelevant or redundant features. Our study involves exploratory data analysis and machine learning-based classification, and we found that our method improves application analysis in both statistical analysis and the precision of encrypted application traffic. We compared our approach to various state-of-the-art methods and consistently outperformed them in terms of performance. By focusing on traffic classification, our framework can benefit various domains such as Quality of Service (QoS) and security. For example, it can help network administrators identify and analyze various application characteristics, which can lead to better security measures. Overall, our approach offers a promising solution for improving temporal traffic analysis.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"708 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Camera-based Vehicle-to-Vehicle Visible Light Communication - A Software-Only Solution for Vehicle Manufacturers","authors":"Michael Plattner, G. Ostermayer","doi":"10.1109/ICCCN58024.2023.10230125","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230125","url":null,"abstract":"In platooning, multiple vehicles driving in succession on the road virtually connect to each other and reduce the distances between them. The platoon leader transmits data to the other platoon members, so they are all able to accelerate and decelerate simultaneously. Here, it is crucial to verify the identity of the communication partner. This paper proposes a camera-based vehicle-to-vehicle (V2V) visible light communication (VLC) system as a software-only solution for vehicle manufacturers that does not require additional hardware components. To transmit the data, the taillights of a vehicle are modulated in a frequency spectrum not perceivable by the human eye, but common cameras can be used to receive the signal. The received data and the transmitting vehicle can be associated with each other because both are visible in the camera's footage. This is proven by test drives in real-world scenarios on public roads in various weather conditions. By using this camera-based V2V-VLC system as an out-of-band channel, it is possible to transmit a 16-byte verification key and establish a fast and secure communication link on a radio frequency (RF) channel in less than 10 seconds, even under difficult conditions.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workshop Technical Program Committee","authors":"","doi":"10.1109/icccn58024.2023.10230204","DOIUrl":"https://doi.org/10.1109/icccn58024.2023.10230204","url":null,"abstract":"","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124668856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy","authors":"F. Tusa, D. Griffin, M. Rio","doi":"10.1109/ICCCN58024.2023.10230137","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230137","url":null,"abstract":"This paper presents DNS++, a re-design of the Internet's name resolution system that addresses dynamic information and privacy. DNS++ uses a pub/sub overlay to send updates about a given service to interested clients, allowing them to (re)select between replicas according to their requirements, as updates about services and their features dynamically change. Since third-party brokers in the overlay are not always trusted for the confidentiality of the content flowing through them, clients' privacy is preserved in DNS++ through homomorphic encryption. Brokers are prevented from accessing encrypted service information but can perform homomorphic match and forward service updates to relevant clients through the overlay accordingly. Assuming that forwarding tables in each broker are implemented via ordered data structures, the time required for adding a new client's subscription, and to perform homomorphic match between existing subscriptions and service updates, would grow logarithmically with the number of entries within a table. This is shown by our performance evaluation, which confirms that DNS++ is feasible to be deployed with an acceptable performance overhead.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Angel C. Herrero, Julio A. Sanguesa, F. Martinez, Piedad Garrido, C. Calafate
{"title":"aDBF: an autonomous electromagnetic noise filtering mechanism for industrial environments","authors":"Angel C. Herrero, Julio A. Sanguesa, F. Martinez, Piedad Garrido, C. Calafate","doi":"10.1109/ICCCN58024.2023.10230132","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230132","url":null,"abstract":"The use of proprietary systems in Industry 4.0 often involves high economic costs. To address this issue, using low-cost devices with similar capabilities is becoming an increasingly popular alternative. However, these devices are prone to suffer the negative effects of electromagnetic interference (EMI) due to their placement in electrical panels alongside other electromechanical devices. To solve this problem, this article presents the autonomous Data Base Filter (aDBF). aDBF is an enhanced electromagnetic interference filtering mechanism capable of eliminating erroneous signals generated by EMI. aDBF has been specifically designed to autonomously (i.e., without the need for operator supervision or intervention) determine both the number of different product types elaborated in a production line, and the time instants when their manufacturing process starts and ends. In particular, aDBF goes through three stages: (i) pre-filtering, (ii) product change detection, and (iii) identification of valid signals. The results obtained after validating our proposal in three different manufacturing shifts demonstrate that the aDBF filtering mechanism works very accurately, as the maximum error introduced is of 0.93%.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge Devices","authors":"Tanmoy Sen, Haiying Shen","doi":"10.1109/ICCCN58024.2023.10230190","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230190","url":null,"abstract":"With the emergence of edge computing along with its local computation advantage over the cloud, methods for distributed deep learning (DL) training on edge nodes have been proposed. The increasing scale of DL models and large training dataset poses a challenge to run such jobs in one edge node due to resource constraints. However, the proposed methods either run the entire model in one edge node, collect all training data into one edge node, or still involve the remote cloud. To handle the challenge, we propose a fully distributed training system that realizes both Data and Model Parallelism over a network of edge devices (called DMP). It clusters the edge nodes to build a training structure by taking advantage of the feature that distributed edge nodes sense data for training. For each cluster, we propose a heuristic and a Reinforcement Learning (RL) based algorithm to handle the problem of how to partition a DL model and assign the partitions to edge nodes for model parallelism to minimize the overall training time. Taking advantage of the feature that geographically close edge nodes sense similar data, we further propose two schemes to avoid transferring duplicated data to the first-layer edge node as training data without compromising accuracy. Our container-based emulation and real edge node experiments show that our systems reduce up to 44% training time while maintaining the accuracy comparing with the state-of-the-art approaches. We also open sourced our source code.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications","authors":"T. Miller, Bobby Alvarez, Thang Hoang","doi":"10.1109/ICCCN58024.2023.10230098","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230098","url":null,"abstract":"Existing privacy-preserving blockchain solutions have shown how to maintain the anonymity and confidentiality of the contents of blockchain transactions. However, due to blockchains needing to be stored and updated in a decentralized manner, metadata like the volume of transactions and the timestamp of each transaction can always be publicly observed, even with state-of-the-art solutions. Blockchain applications, especially ones with time-sensitive or volume-sensitive outcomes, may require this volume and timing information to be privatized. One example is not leaking the lateness of students' exam submissions because this could violate student privacy laws. In this paper, we propose VTBC, a blockchain system to privatize such volume and timing information for multi-party privacy-preserving blockchain applications through decoy blockchain transactions which a) do not contribute at all to the execution of the application and b) are indistinguishable from real (non-decoy) transactions. Even though the volume and timing metadata of all transactions must be public, volume and timing information for an application can be indirectly privatized (even after the application has been finalized) by carefully deciding when and how many decoy transactions are added to the blockchain. We demonstrate how these decoy transactions can be created without sacrificing the application's integrity, functionality, or verifiability, without making changes to the underlying blockchain's architecture, and always using the blockchain as the trusted timekeeper. We implemented our approach via a Dutch auction that supports decoy bid transactions and evaluated its performance on a private Ethereum blockchain network.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explainable AI-Based Intrusion Detection Systems for Cloud and IoT","authors":"M. Gaitan-Cardenas, Mahmoud Abdelsalam, K. Roy","doi":"10.1109/ICCCN58024.2023.10230177","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230177","url":null,"abstract":"Recently, machine learning (ML) has been used extensively for intrusion detection systems (IDS), which proved to be very effective in various environments such as the Cloud and IoT. To achieve higher detection rates, ML models that are used for intrusion detection became very sophisticated. This complexity can be seen for both traditional ML models as well as deep learning models. However, due to their complexity, the decisions that are made by such ML-based IDS are very hard to analyze, understand and interpret. In turn, even though, ML-based IDS are very effective, they are becoming less transparent. As such, many of the proposed intrusion detection methods have not been deployed in real world applications because of the lack of explanation and trustworthiness. In this paper, we provide explanation and analysis for ML-based IDS using the SHapley additive exPlanations (SHAP) explainability technique. We applied SHAP to various ML models such as Decision Trees (DT), Random Forest (RF), Logistic Regression (LR), and Feed Forward Neural Networks (FFNN). Further, we conducted our analysis based on NetFlow data collected from the Cloud, utilizing CIDDS-001 and CIDDS-002 datasets, and IoT, utilizing NF-ToN-IoT-v2 dataset.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131545031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}