{"title":"Distributed Energy-Aware Reliable Routing and TDMA Link Scheduling in Wireless Sensor Networks","authors":"Huang Huang, Jingjing Li","doi":"10.1109/ICCCN49398.2020.9209621","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209621","url":null,"abstract":"Prolonging the network lifetime is a critical challenge in the wireless sensor networks (WSNs). Routing and link scheduling can achieve the objective but few works combine them together to get better performance. In this paper, we study the distributed joint routing and link scheduling for WSNs to extend their lifetime. Using a mathematical formulation, we present a routing algorithm to guarantee three quality of service (QoS) requirements: delay, link reliability and energy-efficiency, simultaneously. Unlike the previous literatures in which all the nodes use the same time frame length, we develop a TDMA link scheduling that determines the frame length of each node by negotiating with neighbors. The interference-free timeslot is allocated to a link under the signal to interference plus noise ratio (SINR) model. We prove the correctness of the routing and the scheduling and analyze the complexity of the algorithms. Our simulation results show that the proposed algorithm outperforms other algorithms and can effectively maximize the network lifetime.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115046536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICCCN 2020 Committees","authors":"","doi":"10.1109/icccn49398.2020.9209623","DOIUrl":"https://doi.org/10.1109/icccn49398.2020.9209623","url":null,"abstract":"","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Frame-Aggregation-Based Approach for Link Congestion Prediction in WiFi Video Streaming","authors":"Shangyue Zhu, Alamin Mohammed, A. Striegel","doi":"10.1109/ICCCN49398.2020.9209675","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209675","url":null,"abstract":"Video streaming using WiFi networks poses the challenge of variable network performance when multiple clients are present. Hence, it is important to continuously monitor and predict the network changes in order to ensure a higher user quality of experience (QoE) for video streaming. Existing approaches that aim to detect such network changes have several disadvantages. For example, active probing approaches are expensive so that generate more additional traffic flow during the testing. To overcome its shortcomings, we propose a passive, lightweight approach, CP-DASH, whereby queuing effects present in frame aggregation are leveraged to predict link congestion in the WiFi network. This approach allows the early detection which can be used to adapt our video appropriately. We conduct experiments simulating a WiFi network with multiple clients and compare CP-DASH with five contemporary rate selection mechanisms. We found that our proposed method significantly reduces the switch rates and stall rates from 22% to 5% and from 38% to 25% compared with an existing throughput-based algorithm, respectively.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122652481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Visualization of Physical and MAC Layer Data for Wireless Network Monitoring","authors":"M. Tamai, Akio Hasegawa, H. Yokoyama","doi":"10.1109/ICCCN49398.2020.9209677","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209677","url":null,"abstract":"Wireless network monitoring is a crucial tool for network administrators to manage wireless link quality in the indoor environments such as warehouses and factories. In this paper, we propose a comprehensive visualization system for correlative analysis between physical and MAC layer activities. In order to support various types of assessment tasks by the network administrators, the system provides a mode that performs quasi-realtime visualization of the ongoing traffic, and a mode that enables detailed assessment of the link quality for the past traffic by visualizing the data over an arbitrary time scale. We implemented the visualization system using ordinary PCs combined with the sensor node that calculates signal strengths from the observed radio signals and extracts the header information conforming to the IEEE 802.11 standards. We confirmed that the system has enough performance to visualize a large amount of data within a small latency and to achieve smooth operation while the time scale is changing.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128775533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nina Slamnik-Kriještorac, M. Peeters, S. Latré, J. Márquez-Barja
{"title":"Analyzing the impact of VIM systems over the MEC management and orchestration in vehicular communications","authors":"Nina Slamnik-Kriještorac, M. Peeters, S. Latré, J. Márquez-Barja","doi":"10.1109/ICCCN49398.2020.9209636","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209636","url":null,"abstract":"The combination of 5G and Multi-access Edge Computing (MEC) technologies can bring significant benefits to vehicular networks, providing means for achieving enhanced Quality of Service (QoS), and Quality of Experience (QoE) of wide variety of vehicular applications. Although beneficial in terms of latency reduction, the edge of the architecture for communication networks produces enormous heterogeneity of network services and resources. This challenge becomes even more severe when different administration domains are taken into consideration. Thus, efficient network Management and Orchestration (MANO) of network resources and services are inevitable. As ETSI provided guidelines and standardization for NFV MANO components, the MEC platform can be used to host network services, while MANO systems are in charge of network service management and orchestration. In this paper, we focus on the specific impact that the Virtualized Infrastructure Manager (VIM) has on the performance of the whole MANO system, used for management and orchestration of MEC services and resources in vehicular networks by enabling the on-demand service instantiation, and service teardown. In our testbed-based evaluation, we measured the network service instantiation and termination delays when evaluating: a) OpenStack and Amazon Web Services (AWS) as VIMs for Open Source MANO (OSM), and b) OpenStack and Docker in case of Open Baton. Such performance analysis with a strong experimental component can serve as a baseline for researchers and industry towards exploiting the opportunities that existing MANO solutions provide.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dilara Acarali, M. Rajarajan, D. Chema, M. Ginzburg
{"title":"Modelling DoS Attacks & Interoperability in the Smart Grid","authors":"Dilara Acarali, M. Rajarajan, D. Chema, M. Ginzburg","doi":"10.1109/ICCCN49398.2020.9209671","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209671","url":null,"abstract":"Smart grids perform the crucial role of delivering electricity to millions of people and driving today’s industries. However, the integration of physical operational technology (OT) with IT systems introduces many security challenges. Denial-of-Service (DoS) is a well-known IT attack with a large potential for damage within the smart grid. Whilst DoS is relatively well-understood in IT networks, the unique characteristics and requirements of smart grids bring up new challenges. In this paper, we examine this relationship and propose the OT impact chain to capture possible sequences of events resulting from an IT-side DoS attack. We then apply epidemic principles to explore the same dynamics using the proposed S-A-C model.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IFVD: Design of Intelligent Fusion Framework for Vulnerability Data Based on Text Measures","authors":"Rui-Yi Li, Shichong Tan, Chensi Wu, Xudong Cao, Haitao He, Wenjie Wang","doi":"10.1109/ICCCN49398.2020.9209726","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209726","url":null,"abstract":"Security vulnerability database research is an essential part of information security research. With the sharp increase in the number of vulnerabilities in recent years, it has become increasingly important to collect and organize information about existing vulnerability databases. However, there is heterogeneity and redundancy of data between the databases, which makes it challenging to share vulnerability information. In response to the above problems, a comprehensive security vulnerability collection model is proposed. A total of 1.005 million pieces of vulnerability data are collected and analyzed in 11 mainstream vulnerability databases. By introducing the idea of the collection of automation, problems such as the untimely update of vulnerability database information and the low efficiency of vulnerability collection, are solved effectively. The structural framework and functional modules of the automatic vulnerability collection system are introduced, and the specific implementation of the system is given. Based on the text processing technology, the rules of deduplication (95.6% accuracy) and the intelligent framework for vulnerability database (IFVD) are proposed and implemented. Finally, Experiments show the feasibility of the scheme.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Ning, Lei Xie, Chuyu Wang, Yanling Bu, Baoliu Ye, Sanglu Lu
{"title":"RF-Detector: 3D Structure Detection of Tiny Objects via RFID Systems","authors":"Jin Ning, Lei Xie, Chuyu Wang, Yanling Bu, Baoliu Ye, Sanglu Lu","doi":"10.1109/ICCCN49398.2020.9209644","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209644","url":null,"abstract":"Nowadays, detecting and evaluating the internal structure of packages becomes a crucial task for logistics systems to guarantee the reliability and security. However, prior solutions such as X-ray diffraction and WiFi-based detection are not suitable for this purpose. X-ray-based methods usually require manual analysis or image processing algorithms with high complexity, while WiFi-based solutions may fail to detect complex structures due to the significant error of the RF-signal features. In this paper, we propose RF-Detector, a low-cost RFID solution for performing 3D structure detection of items contained in the packages, including the item orientations and relative locations. We thoroughly investigate a brand-new sensing model for RFID-based 3D structure detection, i.e., revolving scanning. We propose not only the fundamental revolving model but also a novel calibration method towards the undesired deployment. We have implemented a prototype system to evaluate the performance of RF-Detector. Extensive evaluations in real settings show the effectiveness of RF-Detector, achieving very high accuracy of the internal 3D structure detection.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"140 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geographic and Energy aware Epidemic Strategy for Mobile Opportunistic DTN","authors":"F. Rango, Salvatore Amelio","doi":"10.1109/ICCCN49398.2020.9209709","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209709","url":null,"abstract":"This paper presents a novel data dissemination strategy called Geographic Energy-aware Epidemic Routing (GEER) in DTN network. This routing scheme tries to consider the residual node energy and degree centrality to dynamically select the number of nodes where forwarding data and it tries to preserve buffer space reducing the TTL of data sent on nodes with higher degree centrality. A novel estimation of node density differentiated for geographic area is proposed to improve the data forwarding and a buffer data discarding policy has been applied when network becomes congested. GEER has been compared with Energy Aware Epidemic Routing (EAER) and EpSoc routing scheme in terms of Data Packet delivery ratio, overhead and energy consumption.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131184961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Y. Karasek, Jeehyeong Kim, Victor Youdom Kemmoe, Md Zakirul Alam Bhuiyan, Sunghyun Cho, Junggab Son
{"title":"SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users’ Traffic Patterns","authors":"Daniel Y. Karasek, Jeehyeong Kim, Victor Youdom Kemmoe, Md Zakirul Alam Bhuiyan, Sunghyun Cho, Junggab Son","doi":"10.1109/ICCCN49398.2020.9209657","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209657","url":null,"abstract":"Network anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined as malicious. Current work in network anomaly detection includes network-based and host-based intrusion detection systems. However, most of them suffer from high false detection rates due to the base rate fallacy. To overcome such a drawback, this paper proposes a superior behavior-based anomaly detection system (SuperB) that defines legitimate network behaviors of authorized users in order to identify unauthorized accesses. We define the network behaviors of the authorized users by training the proposed deep learning model with time-series data extracted from network packets of each of the users. Then, the trained model is used to classify all other behaviors (we define these as anomalies) from the defined legitimate behaviors. As a result, SuperB effectively detects all anomalies of network behaviors. Our simulation results show that the proposed algorithm needs at least five end-to-end conversations to achieve over 95% accuracy and over 93% recall rate. Some simulations show 100% accuracy and recall rate. Our simulations use live network data combined with the CICIDS2017 data set. The performance has an average of less than 1.1% false-positive rate with some simulations showing 0%. The execution time to process each conversation is 85.20±0.60 milliseconds (ms), and thus it takes about only 426 ms to process five conversations to identify anomaly.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}