{"title":"Using semantic technologies to mine vehicular context for security","authors":"S. Narayanan, Sudip Mittal, A. Joshi","doi":"10.1109/SARNOF.2016.7846740","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846740","url":null,"abstract":"The number of sensors, actuators and electronic control units present in cars have increased in the last few years. The Internet-of-Things (IoT) model has transformed modern vehicles into a co-engineered interacting network of physical and computational components. Vehicles have become a complex cyber-physical system where context detection has become a challenge. In this paper, we present a rule based approach for context detection in vehicles. We also discuss various attack surfaces and vulnerabilities in vehicular IoT. We propose a system which collects data from the CAN bus and uses it to generate SWRL rules. We then reason over these rules to mine vehicular context. We also showcase a few use-cases as examples where our system can detect if a vehicle is in an unsafe/anomalous state.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic spectrum leasing methodology (DSLM): A game theoretic approach","authors":"Sachin Sharma, S. Mohan","doi":"10.1109/SARNOF.2016.7846762","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846762","url":null,"abstract":"In recent years, the demand for spectrum has increased exponentially. Cognitive radio (CR) technology provides the capability to dynamically sense the spectrum for available channels, estimate them and select a good channel. The technology facilitates a set of users called secondary users to utilize the available channels when the channels are not utilized by another set of users called the primary users, who subscribe to the services offered by a service provider. Thus the technology allows for spectrum sharing in an opportunistic way, and establishes a network of CR devices for transmitting information efficiently and improve spectrum and network utilization. This paper introduces the concept of dynamic spectrum leasing methodology (DSLM), a paradigm based on game theoretic concepts. DSLM takes into account the demand for spectrum by secondary users and the willingness of primary users to relinquish spectrum in a restricted manner, making possible spectrum leasing as a long-term commercially viable concept. This paper also introduces the notion of a Cognitive Radio Network Service Provider (CRNSP) and the leasing of spectrum by CRNSP from a Wireless Service Provider (WSP). By defining suitable utility functions, a game theoretic formulation is presented using which the CRNSP leases the licensed spectrum bands from WSP.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128724124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chen Xu, Xiaoban Wu, Yan Luo, B. Tierney, Jeronimo Bezerra
{"title":"Pepple: Programmable network measurement for troubleshooting soft failures","authors":"Chen Xu, Xiaoban Wu, Yan Luo, B. Tierney, Jeronimo Bezerra","doi":"10.1109/SARNOF.2016.7846743","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846743","url":null,"abstract":"Networks have been expanding in scale and speeds, however, it is difficult to troubleshoot network problems because of specific measurement policies and services in different administrative domains. Moreover, many network issues are very subtle, e.g. a link becomes increasing slow but still connected, where active measurement is instrumental. While many measurement infrastructures have been developed and used, the measurement and troubleshooting process typically requires human intervention and leads to inefficiency. In this work, we propose a programmable network measurement approach to address the challenges in automatic measurement and troubleshooting. We design a control plane to learn from historical measurement results to build a graph of available measurement hosts and their routes. On the top of such a control plane, We also present a set of APIs to allow network operators define measurement tasks programmatically and initiate the measurement to locate problematic links automatically. The measurement control plane is implemented in 300 lines of Python code. We show the use cases of the proposed APIs where we can locate problematic network link(s) in 15 minutes with less than 10 lines of Python code running on perfSONAR infrastructure, compared to hours with a conventional troubleshooting approach.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of beam divergence and input bit rate for free space optical communication link","authors":"M. B. Awan, S. Mohan","doi":"10.1109/SARNOF.2016.7846770","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846770","url":null,"abstract":"Free Space Optical (FSO) communication has emerged as a highly relevant technology to meet the growing demand for high bandwidth, low latency and cost effective installations applications for its advantages over RF communication. In this paper, we investigate the impact of beam divergence over input data rate using BPSK (Binary Phase Shift Keying) and OOK (On Off Keying) modulation schemes. This study is motivated by the need to enhance the performance of adaptive data rate methods. The adaptive data rate method can further reduce the bit error rate (BER) and outage probability of FSO link. The impact of laser beam divergence and link distance is also investigated for BPSK and OOK modulation techniques to evaluate the FSO link performance in terms of BER. This study shows that the performance of free-space optical channel can be improved by controlling the internal parameters of FSO communication system, which are laser beam divergence, optical transmission power and receiver aperture area. Also, in case of non-stationary free-space optical network, if a flight control mechanism is available, the FSO link can be adjusted to achieve increased performance.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parisa Hassanzadeh, A. Tulino, J. Llorca, E. Erkip
{"title":"Memory-rate trade-off for caching and delivery of correlated sources","authors":"Parisa Hassanzadeh, A. Tulino, J. Llorca, E. Erkip","doi":"10.1109/SARNOF.2016.7846729","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846729","url":null,"abstract":"In cache-aided networks, due to the multicast nature of wireless signals, coded multicast delivery results in significant load reductions that are proportional to the aggregate cache size. State of the art caching schemes exploit exact content reuse across the network, which, due to the personalized nature of the content consumed by users, can lead to limited efficiency of the scheme. In this work, the cache-aided coded multicast setting is extended to specifically exploit the correlation among the content files. The load over the shared link is notably reduced by jointly compressing the content during the caching and delivery phases. Two classes of correlation-aware achievable schemes are proposed, both of which are shown to significantly outperform existing correlation-unaware solutions, while approaching the limiting rate-memory trade-off.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114693888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Che Zhang, Hong Xu, Libin Liu, Zhixiong Niu, Peng Wang, Yongqiang Tian, Chengchen Hu
{"title":"Kuijia: Traffic rescaling in data center WANs","authors":"Che Zhang, Hong Xu, Libin Liu, Zhixiong Niu, Peng Wang, Yongqiang Tian, Chengchen Hu","doi":"10.1109/SARNOF.2016.7846744","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846744","url":null,"abstract":"Network faults like link or switch failures can cause heavy congestion and packet loss. Traffic engineering systems need a lot of time to detect and react to such faults, which results in significant recovery times. Recent work either pre-installs a lot of backup paths in the switches to ensure fast reroute, or proactively pre-reserve bandwidth to achieve fault-resiliency. Our idea agilely reacts to failures in data plane while eliminating pre-installation of backup paths. We propose Kuijia, a robust traffic engineering system for data center WANs which relies on a novel failover mechanism in data plane called rate rescaling. The affected flows on failed tunnels are rescaled to the remaining tunnels, and enter low priority queues to avoid performance impairment of abnormal flows on remaining tunnels. Real system experiments show that Kuijia is effective in handling network faults and significantly outperforms conventional rescaling method.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. M. Leonard, Hang Cai, K. Venkatasubramanian, M. Ali, T. Eisenbarth
{"title":"A honeypot system for wearable networks","authors":"A. M. Leonard, Hang Cai, K. Venkatasubramanian, M. Ali, T. Eisenbarth","doi":"10.1109/SARNOF.2016.7846755","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846755","url":null,"abstract":"Securing any information exchanged within a Body Area Network (BAN) from unauthorized tampering is essential to ensure that such systems are safe, and thus do no harm, to the people using them. Solutions for enabling information security in BANs require extensive use of cryptographic primitives that involve considerable performance overhead. Consequently, information security is typically not available in wearable technologies. We need adaptive security solutions that increase the level of security in the event of threats but otherwise impose minimal security overhead in order for them to viable for BANs. The first step in building adaptive security for BANs is to detect the threats. In this paper we propose a solution for detecting adversaries attacking the communication channel of a BAN called a wearable honeypot system. It works by communicating fake user health information between the base station and a set of designated decoy nodes in the BAN. Any alteration of this traffic, in content or arrival time, is considered adversarial tampering. A preliminary implementation of this wearable honeypot system demonstrates that it is effective in detecting a variety of communication attacks on a BAN.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuo-Han Chen, Tseng-Yi Chen, Chi-Heng Lee, H. Wei, T. Hsu, W. Shih
{"title":"Exploiting the locality of virtual-machine images to boost the performance of a cloud platform","authors":"Shuo-Han Chen, Tseng-Yi Chen, Chi-Heng Lee, H. Wei, T. Hsu, W. Shih","doi":"10.1109/SARNOF.2016.7846723","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846723","url":null,"abstract":"Virtualization technology enables multiple virtual machines(VMs) to run on a physical mechanism. Due to the excessive data-intensive workloads of VMs, the system I/O performance of cloud platforms deteriorates. To improve the system I/O performance, one key technique is to exploit the spatial locality of data stored on the back-end disks. However, identifying data spatial locality on a cloud platform becomes challenging due to the transparency feature of virtualization. Therefore, to resolve the problem of poor disk I/O, this paper proposes an inter-VMs locality packing design to increase the number of sequential I/O accesses on back-end disks so as to improve disk I/O efficiency through exploiting the spatial locality of virtual machine images. Moreover, the proposed deign does not compromise the transparency of virtualization technique. A simulator architecture is also proposed to assess the performance of the proposed inter-VMs locality packing design.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"27 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enumerating single destination, policy-preferred paths in AS-level Internet topology maps","authors":"M. E. Tozal","doi":"10.1109/SARNOF.2016.7846759","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846759","url":null,"abstract":"Using AS-level Internet topology maps to determine accurate AS-level paths is essential for network diagnosis, performance optimization, reliability improvement, resiliency enforcement and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance as a means to find the shortest paths between ASes. A less significant drawback is restricting the shortest paths to only valley-free paths. Both approaches usually inflate the number of paths between ASes; introduce erroneous paths that do not conform to economic policies; and generate symmetric paths, which in reality is not a rule. As a result, the derived conclusions might be greatly misleading. In this study we introduce a single-destination, policy-preferred path enumeration algorithm which discovers policy consistent paths from all ASes to a destination AS in an AS-level Internet topology graph. Considering that our algorithm's run time complexity is the same as Dijkstra's shortest paths algorithm, we believe that the proposed algorithm will notably enhance the future works that leverage AS-level Internet topology paths.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic erasure-coded data retrieval in elastic optical data center networks","authors":"Juzi Zhao, V. Vokkarane","doi":"10.1109/SARNOF.2016.7846769","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846769","url":null,"abstract":"A flexible data retrieval service is needed in data center networks, where erasure coding has been widely adopted. Elastic Optical Networks, based on Nyquist wavelength division multiplexing or optical orthogonal frequency division multiplexing is an ideal backbone for data centers, since they can efficiently utilize the optical fiber's bandwidth in an elastic manner by partitioning the bandwidth into hundreds or even thousands of subcarriers. In this paper, we study the erasure-coded data retrieval problem for dynamic traffic in elastic optical networks, the objective is to minimize the blocking ratio. A heuristic based on List Scheduling was proposed. Simulation results show that the blocking ratio is reduced in comparison to a benchmark method.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132299331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}