2019 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System DIAM: 5G多业务系统的多元化身份认证机制
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685543
Yurong Luo, Jin Cao, M. Ma, Hui Li, Ben Niu, Fenghua Li
{"title":"DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System","authors":"Yurong Luo, Jin Cao, M. Ma, Hui Li, Ben Niu, Fenghua Li","doi":"10.1109/ICCNC.2019.8685543","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685543","url":null,"abstract":"The future fifth-generation (5G) mobile communications system has already become a focus around the world. A large number of late-model services and applications including high definition visual communication, internet of vehicles, multimedia interaction, mobile industry automation, and etc, will be added to 5G network platform in the future. Different application services have different security requirements. However, the current user authentication for services and applications: Extensible Authentication Protocol (EAP) suggested by the 3GPP committee, is only a unitary authentication model, which is unable to meet the diversified security requirements of differentiated services. In this paper, we present a new diversified identity management as well as a flexible and composable three-factor authentication mechanism for different applications in 5G multi-service systems. The proposed scheme can provide four identity authentication methods for different security levels by easily splitting or assembling the proposed three-factor authentication mechanism. Without a design of several different authentication protocols, our proposed scheme can improve the efficiency, service of quality and reduce the complexity of the entire 5G multi-service system. Performance analysis results show that our proposed scheme can ensure the security with ideal efficiency.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks 软件定义网络辅助连接交换机的排队分析
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685564
Chuanji Zhang, Hemin Yang, G. Riley, D. Blough
{"title":"Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks","authors":"Chuanji Zhang, Hemin Yang, G. Riley, D. Blough","doi":"10.1109/ICCNC.2019.8685564","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685564","url":null,"abstract":"Software-Defined Networking (SDN) is a powerful technology to enable future network innovations, especially for data center networks. However, the limited capacity of the switch-to-controller link is a scalability issue for data center deployments. Auxiliary connections are introduced in the OpenFlow 1.3 Specification to help alleviate switch-to-controller link overflow and improve the scalability of SDN. In this paper, an analytical model is proposed to study the performance of auxiliary connections with OpenFlow switches. This model characterizes different interactions between the controller and the auxiliary-connection-enabled switches with limited buffer space. The model produces evaluation results in seconds for switches with realistic data center traffic loads, which would require days of compute time with network simulation. The analytical model is validated for lower traffic loads using ns3 and an example in-depth analysis of switch performance is carried out with typical data center traffic loads to illustrate the utility of the approach. To the best of our knowledge, this is the first paper to study auxiliary connections for SDN analytically.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116248177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels UMa I2O上行信道高程功率谱测量及干扰分析
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685622
Ruonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, C. Li
{"title":"Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels","authors":"Ruonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, C. Li","doi":"10.1109/ICCNC.2019.8685622","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685622","url":null,"abstract":"Full-dimensional (FD) beamforming extends spatial multiplexing to the elevation domain and increases network capacity significantly. However, the beamforming employing a large number of active antenna elements consumes great power and also causes interference among sectors. The multipath spatial propagation characteristics determines the beamforming performance and should be investigated carefully. This paper presents a field measurement campaign for the indoor-to-outdoor (I2O) uplink channels in a typical urban macro-cellular (UMa) scenario. The elevation power spectra (EPS) were obtained when the user equipment (UE) was on several floors. We have found that the EPS can be well modeled by the modified Laplacian distribution. Furthermore, we evaluate the interference between two UEs on different floors in the elevation multiplexing. Finally, we provide the advice to improve the energy efficiency of FDbeamforming. The obtained channel model can help with the design of the spatial multiplexing and also green communications.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risk Assessment Approach to Secure Northbound Interface of SDN Networks SDN网络北向接口安全的风险评估方法
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685486
M. Niemiec, P. Jaglarz, Marcin Jekot, P. Chołda, Piotr Boryło
{"title":"Risk Assessment Approach to Secure Northbound Interface of SDN Networks","authors":"M. Niemiec, P. Jaglarz, Marcin Jekot, P. Chołda, Piotr Boryło","doi":"10.1109/ICCNC.2019.8685486","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685486","url":null,"abstract":"The most significant threats to networks usually originate from external entities. As such, the Northbound interface of SDN networks which ensures communication with external applications requires particularly close attention. In this paper we propose the Risk Assessment and Management approach to SEcure SDN (RAMSES). This novel solution is able to estimate the risk associated with traffic demand requests received via the Northbound-API in SDN networks. RAMSES quantifies the impact on network cost incurred by expected traffic demands and specifies the likelihood of adverse requests estimated using the reputation system. Accurate risk estimation allows SDN network administrators to make the right decisions and mitigate potential threat scenarios. This can be observed using extensive numerical verification based on an network optimization tool and several scenarios related to the reputation of the sender of the request. The verification of RAMSES confirmed the usefulness of its risk assessment approach to protecting SDN networks against threats associated with the Northbound-API.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adversarial Detection of Concealed VoIP Traffic 隐蔽VoIP流量的对抗检测
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685492
P. Addesso, Michele Cirillo, M. Mauro, M. Longo, V. Matta
{"title":"Adversarial Detection of Concealed VoIP Traffic","authors":"P. Addesso, Michele Cirillo, M. Mauro, M. Longo, V. Matta","doi":"10.1109/ICCNC.2019.8685492","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685492","url":null,"abstract":"network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection system by manipulating the VoIP streams through padding and shifting operations, so as to conceal them amidst the Internet traffic. A defender (the detection system) wants to detect the manipulated VoIP streams. Tackling this problem from an adversarial perspective, we provide two contributions: i) we obtain a highly stylized representation of VoIP streams in terms of transmission frequency $mathcal{F}$ and payload $mathcal{L}$, and characterize the $(mathcal{F}, mathcal{L})$ region achievable by the attacker’s transformation; ii) we formulate the VoIP detection game, and find both theoretical conditions as well as a practical algorithm to find the Nash equilibrium of the game. Simulations over real network traces, and comparison with standard, adversary-unaware tools, show the advantages of the adopted adversarial perspective.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mission-Centric Content Sharing Across Heterogeneous Networks 跨异构网络的以任务为中心的内容共享
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685557
W. Strayer, R. Ramanathan, D. Coffin, S. Nelson, M. Atighetchi, A. Adler, Stephane Blais, B. Thapa, William N. Tetteh, V. Shurbanov, K. Haigh, R. Hain, Colleen T. Rock, Emily H. Do, A. Caro, Daniel Ellard, M. Beckerle, S. Lawrence, S. Loos
{"title":"Mission-Centric Content Sharing Across Heterogeneous Networks","authors":"W. Strayer, R. Ramanathan, D. Coffin, S. Nelson, M. Atighetchi, A. Adler, Stephane Blais, B. Thapa, William N. Tetteh, V. Shurbanov, K. Haigh, R. Hain, Colleen T. Rock, Emily H. Do, A. Caro, Daniel Ellard, M. Beckerle, S. Lawrence, S. Loos","doi":"10.1109/ICCNC.2019.8685557","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685557","url":null,"abstract":"New airborne communication technologies solve pressing capability requirements but often at the cost of cross-platform compatibility. We present an architecture and prototype constructed under the DARPA DyNAMO program specifically designed to address information flow across different underlying tactical data links by managing the dissemination of mission-critical information across an overlay network optimized for this purpose. Our architecture has two parts, an Information Gateway providing a content-based publish-subscribe service to applications, and a Network Optimizer providing path management and service quality control. We have implemented DyNAMO within an EMANE real-time emulation environment, and evaluated it over multi-data link networks. The results show that DyNAMO optimizes the available capacity across heterogeneous networks, targets and shapes information to work within the network resources, and maximizes information sharing.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices FARES:在移动设备上快速准确地识别准确的场景
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685637
Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, B. Sheng
{"title":"FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices","authors":"Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, B. Sheng","doi":"10.1109/ICCNC.2019.8685637","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685637","url":null,"abstract":"Mobile devices represented by smartphones have been continuously evolving to support various applications. In this paper, we study a new mobile application, named exact scene recognition, where a user can identify a particular place by comparing two images taken there. This application framework enables users to annotate a scene supporting more descriptive image-based interactions such as mobile augmented-reality applications. We enhance the regular approaches with the assistance of the angle-of-view (AOV) information obtained from the smartphone. Our experimental results show a significant improvement on accuracy compared to the existing solutions.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"57 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128005781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks 在线社交网络中多状态扩散模型下的激励营销策略
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685629
Yan Li, V. Li
{"title":"Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks","authors":"Yan Li, V. Li","doi":"10.1109/ICCNC.2019.8685629","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685629","url":null,"abstract":"In online social networks, customers can share their experience and hence spread advertisement through social links, enabling viral marketing. By using online social networks, sellers can design advertisement strategies to reach more potential customers. An effective marketing strategy is able to provide a method to monetize the social network and has attracted much attention in the research community. However, most existing research based on the influence maximization problem focus on how to select the seed node set in the beginning and neglect how the price and rewards in the marketing strategy can influence the diffusion process. In this paper, we study how to design an incentive strategy in the online social network and explain how the incentive strategy influences the diffusion. We also propose a framework which incorporates a multi-state diffusion model. People’s purchasing behavior, which may be influenced by the rewards received in the incentive marketing strategy is divided into different states in the diffusion model. People in different states have different influence power. Simulations are performed to illustrate our framework and show that the incentive marketing strategy performs well in activating more people and achieving more revenue.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks 基于地理区域的信息中心容错网络体系结构评估
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685612
Katherine Russell, R. Simon
{"title":"Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks","authors":"Katherine Russell, R. Simon","doi":"10.1109/ICCNC.2019.8685612","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685612","url":null,"abstract":"Information Centric Disruption Tolerant Networks (ICDTNs) have recently been proposed as a powerful approach to provide effective data and information sharing when existing communication infrastructures are degraded or destroyed. This paper explores using a hybrid approach for ICDTN construction using Named Data Networking (NDN) and DTN architectures that avoids the need to heavily modify existing implementations. We analyze different design choices and argue that a geographically aware architecture is particularly effective for many ICDTN applications. To support this claim we evaluate “geo” versus “node” aware NDN implementations using a number of mobility models, network sizes, DTN forwarding methods, and caching in disaster scenarios. Our results demonstrate the scalability and effectiveness of our approach with the appropriate selection of geo information, name advertisement and caching.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis SmartEye:通过无线信号分析的移动设备接近监测
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685576
M. Hadian, Thamer Altuwaiyan, Xiaohui Liang, B. Sheng, Kuan Zhang
{"title":"SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis","authors":"M. Hadian, Thamer Altuwaiyan, Xiaohui Liang, B. Sheng, Kuan Zhang","doi":"10.1109/ICCNC.2019.8685576","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685576","url":null,"abstract":"Mobile devices are pervasively used by everyone in all aspects of their daily lives. Sensing capability of the mobile devices, using their built-in sensors, is usually limited to their immediate proximity. In this paper, we exploit a technique which enables the mobile device to sense its physical proximity by taking advantage of the WiFi Channel State Information. We define a model to detect the movements of human and non-human objects in the proximity of the device. We have exploited the Fresnel zone model to detect the movement towards and outwards the device in the sensing area. The scheme can be used to alarm the user when device is left unattended. We further consider two models for early-detection of a user leaving her mobile device based on the user requirements and environment conditions. We evaluate our scheme using information from simulated theft attack scenarios in real environment and show that our scheme can achieve an average 84.44% and 77.77% accuracy on detecting the theft attacks for outdoor and indoor environments respectively.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信