{"title":"IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform","authors":"Yilian Li, Yiyu Yang, Xiao Yu, Ting Yang, Lihua Dong, Wengjie Wang","doi":"10.1109/ICCCN49398.2020.9209626","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209626","url":null,"abstract":"The Internet of Things enables interaction between IoT devices and users through the cloud. The cloud provides services such as account monitoring, device management, and device control. As the center of the IoT platform, the cloud provides services to IoT devices and IoT applications through APIs. Therefore, the permission verification of the API is essential. However, we found that some APIs are unverified, which allows unauthorized users to access cloud resources or control devices; it could threaten the security of devices and cloud. To check for unauthorized access to the API, we developed IoT-APIScanner, a framework to check the permission verification of the cloud API. Through observation, we found there is a large amount of interactive information between IoT application and cloud, which include the APIs and related parameters, so we can extract them by analyzing the code of the IoT application, and use this for mutating API test cases. Through these test cases, we can effectively check the permissions of the API. In our research, we extracted a total of 5 platform APIs. Among them, the proportion of APIs without permission verification reached 13.3%. Our research shows that attackers could use the API without permission verification to obtain user privacy or control of devices.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Mitigation of Controllable Event Triggering Attack in WSNs","authors":"Haoran Hu, Wei-dong Chang","doi":"10.1109/ICCCN49398.2020.9209613","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209613","url":null,"abstract":"Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a distributed algorithm to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Viewing the 360° Future: Trade-Off Between User Field-of-View Prediction, Network Bandwidth, and Delay","authors":"Shahryar Afzal, Jiasi Chen, K. Ramakrishnan","doi":"10.1109/ICCCN49398.2020.9209659","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209659","url":null,"abstract":"Predicting a user’s field-of-view (FoV) accurately can help to significantly reduce the high bandwidth requirements for 360° video streaming, as it enables sending only the tiles corresponding to the predicted FoV. Since many approaches for user head-orientation (i.e., FoV) prediction have been proposed in the literature, ranging from simple linear regression to more complex neural networks, it is difficult to comprehensively decide which method to use. Towards resolving this gap in knowledge, in this work we benchmark user prediction algorithms over an aggregation of multiple datasets and study the implications of this analysis. Our results demonstrate that it is indeed difficult for any prediction algorithm to accurately predict a user’s FoV beyond a very short future time window of approximately 300 ms. We also observe that users’ viewing behavior is dominated by sideways head movement, rather than up-and-down. These findings have implications on network bandwidth, latency, and playback buffering at the client: (1) Extra \"padding\" tiles are needed around the user’s FoV in order to correct for prediction errors; in particular, a rectangular padding achieves lower stall rate than square padding, for the same bandwidth usage; (2) Video playout buffers, network delay, and jitter need to be small in order to avoid stale predictions of the user’s field-of-view, which are only valid 300 ms into the future; (3) Per-video and per-user personalization of the padding can save bandwidth for slow-moving users or videos. We mathematically quantify these tradeoffs and present simulation results to demonstrate these findings and implications. Our results have implications for FoV prediction methods in future 360° streaming systems.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dawei Li, Chigozie Asikaburu, Boxiang Dong, Huan Zhou, S. Azizi
{"title":"Towards Optimal System Deployment for Edge Computing: A Preliminary Study","authors":"Dawei Li, Chigozie Asikaburu, Boxiang Dong, Huan Zhou, S. Azizi","doi":"10.1109/ICCCN49398.2020.9209754","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209754","url":null,"abstract":"In this preliminary study, we consider the server allocation problem for edge computing system deployment. Our goal is to minimize the average turnaround time of application requests/tasks, generated by all mobile devices/users in a geographical region. We consider two approaches for edge cloud deployment: the flat deployment, where all edge clouds co-locate with the base stations, and the hierarchical deployment, where edge clouds can also co-locate with other system components besides the base stations. In the flat deployment, we demonstrate that the allocation of edge cloud servers should be balanced across all the base stations, if the application request arrival rates at the base stations are equal to each other. We also show that the hierarchical deployment approach has great potentials in minimizing the system's average turnaround time. We conduct various simulation studies using the CloudSim Plus platform to verify our theoretical results. The collective findings trough theoretical analysis and simulation results will provide useful guidance in practical edge computing system deployment.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115559050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICCCN 2020 Cover Page","authors":"","doi":"10.1109/icccn49398.2020.9209603","DOIUrl":"https://doi.org/10.1109/icccn49398.2020.9209603","url":null,"abstract":"","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Mobile 3D Vision","authors":"Huanle Zhang, Bo Han, P. Mohapatra","doi":"10.1109/ICCCN49398.2020.9209700","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209700","url":null,"abstract":"In the past few years, the computer vision community has developed numerous novel technologies of 3D vision (e.g., 3D object detection and classification and 3D scene segmentation). In this work, we explore the opportunities brought by these innovations for enabling real-time 3D vision on mobile devices. Mobile 3D vision finds various use cases for emerging applications such as autonomous driving, drone navigation, and augmented reality (AR). The key differences between 3D vision and 2D vision mainly stem from the input data format (i.e., point clouds or 3D meshes vs. 2D images). Hence, the key challenge of 3D vision is that it is could be more computation intensive and memory hungry than 2D vision, due to the additional dimension of input data. For example, our preliminary measurement study of several state-of-the-art machine learning models for 3D vision shows that none of them can execute faster than one frame per second on smartphones. Motivated by these challenges, we present in this position paper a research agenda on offering systems support for real-time mobile 3D vision, focusing on improving its computation efficiency and memory utilization.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI-Governance and Levels of Automation for AIOps-supported System Administration","authors":"Anton Gulenko, Alexander Acker, O. Kao, Feng Liu","doi":"10.1109/ICCCN49398.2020.9209606","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209606","url":null,"abstract":"Artificial Intelligence for IT Operations (AIOps) describes the process of maintaining and operating large IT infrastructures in data centers using AI-supported methods and tools, e.g. for automated anomaly detection, root cause analysis, for remediation, optimization, and for automated initiation of self-stabilizing activities. Initial results and products show that AIOps platforms can help to reach the required level of availability, reliability, dependability, and serviceability for future settings, where latency and response times are of crucial importance. The human operators see the benefits, but also the risks of losing a control over the system while still being accountable for the AIOps-managed infrastructure. While automation is mandatory due to the system complexity and the criticality of a QoS-bounded response, the measures compiled and deployed by the AI-controlled administration are not easily understood or reproducible. Therefore, explainable actions taken by the automated system is becoming a regulatory requirement for future IT infrastructures. In this paper we address several important sub-aspects of the AI-Governance with focus on IT service and infrastructure management and provide a set of rules and levels of automation that precisely describe the shared responsibility between human operators and the AIOps-controlled administration. We aim at providing guidance, decision-support, and explainable processes for AIOps.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChordMics: Acoustic Signal Purification with Distributed Microphones","authors":"Weiguo Wang, Jinming Li, Meng Jin, Yuan He","doi":"10.1109/ICCCN49398.2020.9209642","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209642","url":null,"abstract":"Acoustic signal acts as an essential input to many systems. However, the pure acoustic signal is very difficult to extract, especially in noisy environments. Existing beamforming systems are able to extract the signal transmitted from certain directions. However, since microphones are centrally deployed, these systems have limited coverage and low spatial resolution. We overcome the above limitations and present ChordMics, a distributed beamforming system. By leveraging the spatial diversity of the distributed microphones, ChordMics is able to extract the acoustic signal from arbitrary points. To realize such a system, we further address the fundamental challenge in distributed beamforming: aligning the signals captured by distributed and unsynchronized microphones. We implement ChordMics and evaluate its performance under both LOS and NLOS scenarios. The evaluation results tell that ChordMics can deliver higher SINR than the centralized microphone array. The average performance gain is up to 15dB.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma
{"title":"A Preliminary Analysis of Password Guessing Algorithm","authors":"Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma","doi":"10.1109/ICCCN49398.2020.9209690","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209690","url":null,"abstract":"Recently, password guessing algorithms have received increased attention in the field of password security. In this paper, we present a brief review of various existing typical password guessing algorithms from the aspects of hypothesis, identified information, and theoretical models. We employ multiple criteria to understand and evaluate the performance of these algorithms. By analyzing the experimental results, we summarize the characteristics of different password guessing algorithms. We have experimentally proved that when the guess number is the same, the two algorithms guess more passwords than one algorithm. Furthermore, we propose a hybrid password guessing algorithm-PaMLGuess. The algorithm has both strong interpretability and generalization ability and uses probability mapping to solve the problem that the magnitudes of the probabilities given by different password guessing algorithms vary widely. Our work aims to gain a deeper understanding of an attacker’s capabilities and provide an improvement direction for password strength meters(PSMs) to help system administrators prevent the use of weak passwords.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Vision-Assisted Instant Alerts in 5G","authors":"Yu-Yun Tseng, Po-Min Hsu, Jen-Jee Chen, Y. Tseng","doi":"10.1109/ICCCN49398.2020.9209751","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209751","url":null,"abstract":"This paper introduces an innovative model which incorporates vehicle On-Board Unit (OBU) data and roadside video information to provide instant alert messages to drivers. We apply computer vision techniques to perform real-time danger event detection and to identify specific surrounding vehicles that should be alerted. Different from traditional broadcast-based alerting, we propose to send these instant alert messages to the target vehicles by unicast and geocast. To do so, an accurate method is required to analyze the spatial relation of vehicles. Also, to confine our alert messages to only those target vehicles, we rely on roadside cameras and apply a sensor fusion technique that can link a video object with its communication MAC address. Through this innovative idea, we integrate computer vision with 5G networks and enable transmitting instant alerts to precise vehicles without interfering irrelevant vehicles. How to incorporate our system with 3GPP V2X by setting proper transmission parameters is also addressed. To validate our idea, we present four common road danger events and show how our model works. To the best of our knowledge, this is the first work bringing computer vision to instant messaging.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}