Tianyu Bai, Danyang Shao, Ying He, Song Fu, Qing Yang
{"title":"$mathrm{P}^{3}$: A Privacy-Preserving Perception Framework for Building Vehicle-Edge Perception Networks Protecting Data Privacy","authors":"Tianyu Bai, Danyang Shao, Ying He, Song Fu, Qing Yang","doi":"10.1109/ICCCN58024.2023.10230191","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230191","url":null,"abstract":"With the wider adoption of edge computing services, intelligent edge devices, and high-speed V2X communication, compute-intensive tasks for autonomous vehicles, such as perception using camera, LiDAR, and/or radar data, can be partially offloaded to road-side edge units. However, data privacy becomes a major concern for vehicular edge computing, as sensor data with sensitive information from vehicles can be observed and used by edge servers. We aim to address the privacy problem by protecting both vehicles' sensor data and the detection results. In this paper, we present a privacy preserving perception $(mathbf{P}^{3})$ framework which provides a secure version of every commonly used layers in various perception CNN networks. They server as the building blocks to facilitate the construction of a privacy preserving CNN for any existing or future network. $mathbf{P}^{3}$ leverages the additive secret sharing theory to develop secure functions for perception networks. A vehicle's sensor data is split and encrypted into multiple secret shares, each of which is processed on an edge server by going through the secure layers of a detection network. The detection results can only be obtained by combining the partial results from the participating edge servers. We present two use cases where the secure layers in $mathbf{P}^{3}$ are used to build privacy preserving both single-stage and two-stage object detection CNNs. Experimental results indicate data privacy for vehicles is protected without comprising the detection accuracy and with a reasonable amount of performance degradation. To the best of our knowledge, this is the first work that provides a generic framework to ease the development of vehicle-edge perception networks protecting data privacy.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Controller and Simulator for $log_{2}N$ Switching Fabrics","authors":"M. Michalski","doi":"10.1109/icccn58024.2023.10230150","DOIUrl":"https://doi.org/10.1109/icccn58024.2023.10230150","url":null,"abstract":"This paper presents the idea of a hardware controller for a switching fabric of $log_{2}N$, where a complicated algorithm is implemented in the Xilinx FPGA Virtex5 chip. This implementation is time-efficient and allows for real control of network traffic for DCN/EON electrical and optical networks. Simulations and human-based analysis can also be performed using this design. It can serve as a calculating engine for SDN/OF networks. Three different boards with two types of Virtex5 FPGA chips from Xilinx were used as the hardware platform.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Trajectory Prediction-Based UAV Deployment in Smart Transportation Systems","authors":"Fan Liang, Xing Liu, Nuri Alperen Kose, Kubra Gundogan, Wei Yu","doi":"10.1109/ICCCN58024.2023.10230178","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230178","url":null,"abstract":"$A$ smart transportation system (i.e., intelligent transportation system) refers to a transportation critical infrastructure system that integrates advanced technologies (e.g., networking, distributed computing, big data analytics, etc.) to improve the efficiency, safety, and sustainability of the transportation system. However, the rapid increase in the number of vehicles on roads and significant fluctuations in the flow of traffic can cause the coverage holes of Road Side Units (RSUs) and local traffic overload in smart transportation systems, which can negatively affect the performance of systems and causes accidents. To address these issues, deploying Unmanned Aerial Vehicles (UAVs) as mobile RSUs is a viable approach. Nonetheless, how to deploy UAVs to the optimal position in the smart transportation system remains an unsolved issue. This paper proposes a Vehicle Trajectory-based Dynamic UAV Deployment Algorithm (VTUDA). The VTUDA utilizes vehicle trajectory prediction information to improve the efficiency of UAV deployment. First, we deploy a distributed Seq2Seq-GRU model to the UAVs and train the model. We leverage the well-trained model to predict vehicle trajectory. VTUDA then uses the predicted information to make informed decisions on the optimal location to position the UAVs. Further-more, VTUDA considers both the condition of communication channels and energy consumption during the deployment process to ensure that UAVs are deployed to optimal positions. Our experimental results confirm that the proposed VTUDA can effectively improve the deployment of UAVs. The experimental results also demonstrate that VTUDA can significantly enhance vehicle access and communication quality between vehicles and UAVs.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CPS: A Multipath Scheduling Algorithm for Low-Latency Applications in 5G Edge Networks","authors":"Baosen Zhao, Wanghong Yang, Wenji Du, Yongmao Ren, Jianan Sun, Xu Zhou","doi":"10.1109/ICCCN58024.2023.10230144","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230144","url":null,"abstract":"VR applications that require extremely low latency and high image quality are widely used in online games and other 5G scenarios, becoming a key research field in recent years. However, the limited bandwidth in 5G edge networks fails to meet the peak rate requirements for multiple VR flows. MPTCP is suitable for 5G edge networks, supporting the simultaneous use of multiple networks on mobile devices. Nevertheless, accurately scheduling VR data blocks to different sub flows to satisfy their low latency requirements is challenging due to their micro-burst characteristic. In this paper, we propose a novel MPTCP scheduler for cloud VR applications in 5G edge networks, called the Cross-Layer Information-based One-Way Delay Predictive Scheduler (CPS). CPS accurately predicts one-way delay by incorporating cross-layer information from both the application and edge wireless sides, and adaptively schedules VR data blocks to the optimal subflow. Experimental results show that CPS outperforms existing strategies, supporting 125% more users for VR applications in the typical scenario. Additionally, CPS maintains completion times for 99% of cloud VR packets below 7 ms. CPS successfully meets the quality of experience needs of more users, providing a promising solution for large-scale deployment of cloud VR services in 5G edge networks.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127574346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruozhou Yu, Huayue Gu, Xiaojian Wang, Fangtong Zhou, G. Xue, Dejun Yang
{"title":"EA-Market: Empowering Real-Time Big Data Applications with Short-Term Edge SLA Leases","authors":"Ruozhou Yu, Huayue Gu, Xiaojian Wang, Fangtong Zhou, G. Xue, Dejun Yang","doi":"10.1109/ICCCN58024.2023.10230160","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230160","url":null,"abstract":"Edge computing promises to bring low-latency and high-throughput computing, but the limited edge resources may cause frequent congestion and lead to unstable and unpredictable performance. To ensure performance guarantee, application owners can establish Service-Level Agreements (SLAs) with the edge provider for resource reservation or priority usage. But it is cost-inefficient for application owners to lease long-term SLAs based on peak demands, as demands can fluctuate, and the leased resources may be idle or underutilized at most times. This paper studies market mechanism design for short-term edge SLA leases, focusing on real-time big data applications with throughput and latency goals. Applications submit short-term SLA requests to serve users with guaranteed performance during peak hours. As SLA requests arrive over time, the edge provider dynamically provisions edge resources to fulfill the requests, while charging application owners based on the current demands. We design EA-Market, an online combinatorial auction mechanism that achieves a competitive social welfare, while guaranteeing truthfulness, budget balance, individual rationality, and computational efficiency. Notably, our mechanism enables each application owner to bid without knowledge of the edge infrastructure, and gives edge provider full control over resource provisioning to fulfill the requests. We perform theoretical analysis and simulations to evaluate the efficacy of our mechanism.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee, Il-Gu Lee
{"title":"Two-Step Feature Selection Technique for Secure and Lightweight Internet of Things","authors":"S. Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee, Il-Gu Lee","doi":"10.1109/ICCCN58024.2023.10230126","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230126","url":null,"abstract":"With the arrival of the information age, the amount of usable high-dimensional data is rapidly increasing; however, the vast amount of unrefined data may deteriorate the performance of machine learning algorithms. Furthermore, lightweight devices, such as the secure Internet of Things (IoT), have small memory capacity and limited computing power for large data processing; thus, it is difficult to introduce machine learning algorithms to IoT applications. Therefore, it is necessary to develop an efficient learning method that can be used on lightweight devices. This paper proposes a feature selection model consisting of two steps to efficiently reduce the computational complexity of conventional models in the learning process. The proposed two-step feature selection model (TFSM), which performs an exhaustive search for all features by selecting features based on variable importance and then deriving the optimal feature set, significantly reduced complexity, memory usage, and latency with similar accuracy to the greedy model. Particularly, TFSM decreased the complexity by 99.73%, memory usage by 99.97%, and latency by 72.4% compared to the greedy model that uses all features, and improved accuracy by 15.89% compared to random models that randomly perform feature selection.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132830344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Chi Lin, Bruno Chianca, Leonard David Bereholschi, Jian-Jia Chen, Guthemberg Silvestre
{"title":"Cost-Effective Offloading Strategies for UAV Contingency Planning in Smart Cities","authors":"Ching-Chi Lin, Bruno Chianca, Leonard David Bereholschi, Jian-Jia Chen, Guthemberg Silvestre","doi":"10.1109/ICCCN58024.2023.10230212","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230212","url":null,"abstract":"In the near future, smart cities are expected to become more prevalent, with Uncrewed Aerial Vehicles (UAVs) playing a key role in making cities more efficient and sustainable. Effective path planning is essential for the safe and efficient integration of drones into urban airspace. However, one potential limitation of UAVs is that they may not have sufficient computing power to perform real-time contingency planning when encountering obstacles. To address this challenge, this work proposes edge-assisted offloading scenarios where contingency planning is considered as a resource-intensive task that can be offloaded to nearby edge nodes. We implemented and compared various strategies for generating offloading plans in a robot swarm simulator based on latency and cost metrics. Our evaluation revealed that the offloading plans generated using the genetic algorithm tended to perform better in terms of average latency or cost per offloading, albeit with higher runtime overhead compared to the other strategies.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Accurate Graph Generative Model with Tunable Features","authors":"Takahiro Yokoyama, Yoshiki Sato, Sho Tsugawa, Kohei Watabe","doi":"10.1109/ICCCN58024.2023.10230174","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230174","url":null,"abstract":"A graph is a very common and powerful data structure used for modeling communication and social networks. Models that generate graphs with arbitrary features are important basic technologies in repeated simulations of networks and prediction of topology changes. Although existing generative models for graphs are useful for providing graphs similar to real-world graphs, graph generation models with tunable features have been less explored in the field. Previously, we have proposed GraphTune, a generative model for graphs that continuously tune specific graph features of generated graphs while maintaining most of the features of a given graph dataset. However, the tuning accuracy of graph features in GraphTune has not been sufficient for practical applications. In this paper, we propose a method to improve the accuracy of GraphTune by adding a new mechanism to feed back errors of graph features of generated graphs and by training them alternately and independently. Experiments on a real-world graph dataset showed that the features in the generated graphs are accurately tuned compared with conventional models.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen, Yanchao Zhang
{"title":"mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging","authors":"Jiawei Xu, Ziqian Bi, Amit Singha, Tao Li, Yimin Chen, Yanchao Zhang","doi":"10.1109/ICCCN58024.2023.10230151","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230151","url":null,"abstract":"The use of smart devices such as smartphones, tablets, and laptops skyrocketed in the last decade. These devices enable ubiquitous applications for entertainment, communication, productivity, and healthcare but also introduce big concern about user privacy and data security. In addition to various authentication techniques, automatic and immediate device locking based on user leaving detection is an indispensable way to secure the devices. Current user leaving detection techniques mainly rely on acoustic ranging and do not work well in environments with multiple moving objects. In this paper, we present mmLock, a system that enables faster and more accurate user leaving detection in dynamic environments. mmLock uses a mmWave FMCW radar to capture the user's 3D mesh and detects the leaving gesture from the 3D human mesh data with a hybrid PointNet-LSTM model. Based on explainable user point clouds, mmLock is more robust than existing gesture recognition systems which can only identify the raw signal patterns. We implement and evaluate mmLock with a commercial off-the-shelf (COTS) TI mmWave radar in multiple environments and scenarios. We train the PointNet-LSTM model out of over 1 TB mmWave signal data and achieve 100% true-positive rate in most scenarios.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jacob Neil Taylor, Ngoc Thuy Le, J. Baek, W. Susilo
{"title":"Hyron: A New Approach for Automating the Network ACL Delivery Pipeline","authors":"Jacob Neil Taylor, Ngoc Thuy Le, J. Baek, W. Susilo","doi":"10.1109/ICCCN58024.2023.10230146","DOIUrl":"https://doi.org/10.1109/ICCCN58024.2023.10230146","url":null,"abstract":"Automated Access Control List (ACL) configuration has remained an area of research interest for a significant period. However, previous research has not addressed the challenges associated with ACL automation in the context of a complex and evolving industry landscape. We examine the existing research literature on this topic and identify a series of key requirements (“success criteria”) that any new system must achieve to be considered an improvement over the status quo. We then design, develop, and demonstrate an approach to ACL automation that embodies these characteristics by combining model-driven ACL synthesis with a modern DevOps-style deployment system. We explain the rationale that drove the design decisions behind the Hyron ACL generation toolkit and how it can enable a fully automated ACL delivery pipeline when integrated with standard developer tools. In contrast to previous research, our design approach reflects automation trends in the industry to ensure mainstream engineers readily adopt our solution. We provide an analysis comparing our approach's benefits to those of previous research.","PeriodicalId":132030,"journal":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}