2023 32nd International Conference on Computer Communications and Networks (ICCCN)最新文献

筛选
英文 中文
Study on Remote Identification and Integrated Information Management Technology for Unmanned Aerial Vehicles 无人机远程识别与综合信息管理技术研究
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230213
Suna Choi, Kyu-min Kang
{"title":"Study on Remote Identification and Integrated Information Management Technology for Unmanned Aerial Vehicles","authors":"Suna Choi, Kyu-min Kang","doi":"10.1109/ICCCN58024.2023.10230213","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230213","url":null,"abstract":"As many unmanned aerial vehicles(UAVs) are applied in various industries and services, concerns about the illegal use of UAVs are highly increasing. Accordingly, the importance of remote identification and information management technology for UAVs is emphasized. The equipment mounted on the UAV periodically transmits identification information, which is remotely received by the ground receiving equipment. The identification information of the UAV is collected and managed in the information integrated management system. Furthermore, the UAV identification technology can be applied to build an enhanced 3-step counter-UAV system consisting of detection, remote identification, and neutralization. For this purpose, a linked process between the detection, remote identification, and neutralization systems is presented.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Analysis of Phase Error in Centralized and Distributed SDR Systems 集中式和分布式SDR系统相位误差的实验分析
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230196
Mahmoud Badi, D. Rajan, J. Camp
{"title":"Experimental Analysis of Phase Error in Centralized and Distributed SDR Systems","authors":"Mahmoud Badi, D. Rajan, J. Camp","doi":"10.1109/ICCCN58024.2023.10230196","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230196","url":null,"abstract":"Understanding the behavior of phase errors between radio frequency (RF) chains in software-defined radios (SDRs) is crucial to the success of implementing many phase-sensitive applications, such as beamforming. Even if SDRs are provided the same clocking signal, initial local oscillator (LO) phase offsets across devices will inevitably be different. Despite its known effect on many wireless applications, there are only few works that experimentally discuss random phase errors in SDRs. To address this issue, we perform experiments and analyze the results of tens of experiments in an attempt to understand the nature of this phase offset. In particular, we target the USRP (Universal Standard Radio Peripheral) N310 platform as it provides up to 4 simultaneous transmit/receive chains that could be attractive for beamforming applications. We first model the system used in this study and demonstrate how phase errors can affect distributed beamforming gains. Then, we introduce our experimental setup, procedures and analysis of the results of the measured phase error. We do so first between two chains of the same/different transceiver boards within the same USRP, and then between chains of distributed USRPs that are geographically separated. We calculate the mean and standard deviation of this phase error, investigate its behavior over time, and demonstrate how the distribution of this error can vary based on whether it is measured in a centralized or a distributed fashion.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133884582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Approach for Temporal Traffic Selection Across Various Applications 跨各种应用的时间流量选择的系统方法
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230120
N. Sharmin, Jaime C. Acosta, Chris Kiekintveld
{"title":"A Systematic Approach for Temporal Traffic Selection Across Various Applications","authors":"N. Sharmin, Jaime C. Acosta, Chris Kiekintveld","doi":"10.1109/ICCCN58024.2023.10230120","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230120","url":null,"abstract":"The paper presents a framework that analyzes temporal traffic in applications, with a focus on statistical analysis and traffic classification. The framework utilizes time-based sampling and traffic flow selection to identify the characteristics of idle time, continuous traffic and burst threshold. It also includes time-based feature selection to improve the accuracy and efficiency of predictive models by removing irrelevant or redundant features. Our study involves exploratory data analysis and machine learning-based classification, and we found that our method improves application analysis in both statistical analysis and the precision of encrypted application traffic. We compared our approach to various state-of-the-art methods and consistently outperformed them in terms of performance. By focusing on traffic classification, our framework can benefit various domains such as Quality of Service (QoS) and security. For example, it can help network administrators identify and analyze various application characteristics, which can lead to better security measures. Overall, our approach offers a promising solution for improving temporal traffic analysis.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"708 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Camera-based Vehicle-to-Vehicle Visible Light Communication - A Software-Only Solution for Vehicle Manufacturers 基于摄像头的车对车可见光通信——面向汽车制造商的纯软件解决方案
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230125
Michael Plattner, G. Ostermayer
{"title":"Camera-based Vehicle-to-Vehicle Visible Light Communication - A Software-Only Solution for Vehicle Manufacturers","authors":"Michael Plattner, G. Ostermayer","doi":"10.1109/ICCCN58024.2023.10230125","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230125","url":null,"abstract":"In platooning, multiple vehicles driving in succession on the road virtually connect to each other and reduce the distances between them. The platoon leader transmits data to the other platoon members, so they are all able to accelerate and decelerate simultaneously. Here, it is crucial to verify the identity of the communication partner. This paper proposes a camera-based vehicle-to-vehicle (V2V) visible light communication (VLC) system as a software-only solution for vehicle manufacturers that does not require additional hardware components. To transmit the data, the taillights of a vehicle are modulated in a frequency spectrum not perceivable by the human eye, but common cameras can be used to receive the signal. The received data and the transmitting vehicle can be associated with each other because both are visible in the camera's footage. This is proven by test drives in real-world scenarios on public roads in various weather conditions. By using this camera-based V2V-VLC system as an out-of-band channel, it is possible to transmit a 16-byte verification key and establish a fast and secure communication link on a radio frequency (RF) channel in less than 10 seconds, even under difficult conditions.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workshop Technical Program Committee 车间技术方案委员会
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/icccn58024.2023.10230204
{"title":"Workshop Technical Program Committee","authors":"","doi":"10.1109/icccn58024.2023.10230204","DOIUrl":"https://doi.org/10.1109/icccn58024.2023.10230204","url":null,"abstract":"","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124668856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy 基于同态加密的动态名称解析
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230137
F. Tusa, D. Griffin, M. Rio
{"title":"DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy","authors":"F. Tusa, D. Griffin, M. Rio","doi":"10.1109/ICCCN58024.2023.10230137","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230137","url":null,"abstract":"This paper presents DNS++, a re-design of the Internet's name resolution system that addresses dynamic information and privacy. DNS++ uses a pub/sub overlay to send updates about a given service to interested clients, allowing them to (re)select between replicas according to their requirements, as updates about services and their features dynamically change. Since third-party brokers in the overlay are not always trusted for the confidentiality of the content flowing through them, clients' privacy is preserved in DNS++ through homomorphic encryption. Brokers are prevented from accessing encrypted service information but can perform homomorphic match and forward service updates to relevant clients through the overlay accordingly. Assuming that forwarding tables in each broker are implemented via ordered data structures, the time required for adding a new client's subscription, and to perform homomorphic match between existing subscriptions and service updates, would grow logarithmically with the number of entries within a table. This is shown by our performance evaluation, which confirms that DNS++ is feasible to be deployed with an acceptable performance overhead.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
aDBF: an autonomous electromagnetic noise filtering mechanism for industrial environments aDBF:一种适用于工业环境的自主电磁噪声滤波机制
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230132
Angel C. Herrero, Julio A. Sanguesa, F. Martinez, Piedad Garrido, C. Calafate
{"title":"aDBF: an autonomous electromagnetic noise filtering mechanism for industrial environments","authors":"Angel C. Herrero, Julio A. Sanguesa, F. Martinez, Piedad Garrido, C. Calafate","doi":"10.1109/ICCCN58024.2023.10230132","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230132","url":null,"abstract":"The use of proprietary systems in Industry 4.0 often involves high economic costs. To address this issue, using low-cost devices with similar capabilities is becoming an increasingly popular alternative. However, these devices are prone to suffer the negative effects of electromagnetic interference (EMI) due to their placement in electrical panels alongside other electromechanical devices. To solve this problem, this article presents the autonomous Data Base Filter (aDBF). aDBF is an enhanced electromagnetic interference filtering mechanism capable of eliminating erroneous signals generated by EMI. aDBF has been specifically designed to autonomously (i.e., without the need for operator supervision or intervention) determine both the number of different product types elaborated in a production line, and the time instants when their manufacturing process starts and ends. In particular, aDBF goes through three stages: (i) pre-filtering, (ii) product change detection, and (iii) identification of valid signals. The results obtained after validating our proposal in three different manufacturing shifts demonstrate that the aDBF filtering mechanism works very accurately, as the maximum error introduced is of 0.93%.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge Devices 边缘设备网络中基于数据和模型并行的分布式深度学习系统
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230190
Tanmoy Sen, Haiying Shen
{"title":"A Data and Model Parallelism based Distributed Deep Learning System in a Network of Edge Devices","authors":"Tanmoy Sen, Haiying Shen","doi":"10.1109/ICCCN58024.2023.10230190","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230190","url":null,"abstract":"With the emergence of edge computing along with its local computation advantage over the cloud, methods for distributed deep learning (DL) training on edge nodes have been proposed. The increasing scale of DL models and large training dataset poses a challenge to run such jobs in one edge node due to resource constraints. However, the proposed methods either run the entire model in one edge node, collect all training data into one edge node, or still involve the remote cloud. To handle the challenge, we propose a fully distributed training system that realizes both Data and Model Parallelism over a network of edge devices (called DMP). It clusters the edge nodes to build a training structure by taking advantage of the feature that distributed edge nodes sense data for training. For each cluster, we propose a heuristic and a Reinforcement Learning (RL) based algorithm to handle the problem of how to partition a DL model and assign the partitions to edge nodes for model parallelism to minimize the overall training time. Taking advantage of the feature that geographically close edge nodes sense similar data, we further propose two schemes to avoid transferring duplicated data to the first-layer edge node as training data without compromising accuracy. Our container-based emulation and real edge node experiments show that our systems reduce up to 44% training time while maintaining the accuracy comparing with the state-of-the-art approaches. We also open sourced our source code.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications VTBC:区块链应用程序的交易量和交易时间私有化
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230098
T. Miller, Bobby Alvarez, Thang Hoang
{"title":"VTBC: Privatizing the Volume and Timing of Transactions for Blockchain Applications","authors":"T. Miller, Bobby Alvarez, Thang Hoang","doi":"10.1109/ICCCN58024.2023.10230098","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230098","url":null,"abstract":"Existing privacy-preserving blockchain solutions have shown how to maintain the anonymity and confidentiality of the contents of blockchain transactions. However, due to blockchains needing to be stored and updated in a decentralized manner, metadata like the volume of transactions and the timestamp of each transaction can always be publicly observed, even with state-of-the-art solutions. Blockchain applications, especially ones with time-sensitive or volume-sensitive outcomes, may require this volume and timing information to be privatized. One example is not leaking the lateness of students' exam submissions because this could violate student privacy laws. In this paper, we propose VTBC, a blockchain system to privatize such volume and timing information for multi-party privacy-preserving blockchain applications through decoy blockchain transactions which a) do not contribute at all to the execution of the application and b) are indistinguishable from real (non-decoy) transactions. Even though the volume and timing metadata of all transactions must be public, volume and timing information for an application can be indirectly privatized (even after the application has been finalized) by carefully deciding when and how many decoy transactions are added to the blockchain. We demonstrate how these decoy transactions can be created without sacrificing the application's integrity, functionality, or verifiability, without making changes to the underlying blockchain's architecture, and always using the blockchain as the trusted timekeeper. We implemented our approach via a Dutch auction that supports decoy bid transactions and evaluated its performance on a private Ethereum blockchain network.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable AI-Based Intrusion Detection Systems for Cloud and IoT
2023 32nd International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2023-07-01 DOI: 10.1109/ICCCN58024.2023.10230177
M. Gaitan-Cardenas, Mahmoud Abdelsalam, K. Roy
{"title":"Explainable AI-Based Intrusion Detection Systems for Cloud and IoT","authors":"M. Gaitan-Cardenas, Mahmoud Abdelsalam, K. Roy","doi":"10.1109/ICCCN58024.2023.10230177","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230177","url":null,"abstract":"Recently, machine learning (ML) has been used extensively for intrusion detection systems (IDS), which proved to be very effective in various environments such as the Cloud and IoT. To achieve higher detection rates, ML models that are used for intrusion detection became very sophisticated. This complexity can be seen for both traditional ML models as well as deep learning models. However, due to their complexity, the decisions that are made by such ML-based IDS are very hard to analyze, understand and interpret. In turn, even though, ML-based IDS are very effective, they are becoming less transparent. As such, many of the proposed intrusion detection methods have not been deployed in real world applications because of the lack of explanation and trustworthiness. In this paper, we provide explanation and analysis for ML-based IDS using the SHapley additive exPlanations (SHAP) explainability technique. We applied SHAP to various ML models such as Decision Trees (DT), Random Forest (RF), Logistic Regression (LR), and Feed Forward Neural Networks (FFNN). Further, we conducted our analysis based on NetFlow data collected from the Cloud, utilizing CIDDS-001 and CIDDS-002 datasets, and IoT, utilizing NF-ToN-IoT-v2 dataset.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131545031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信