Yurong Luo, Jin Cao, M. Ma, Hui Li, Ben Niu, Fenghua Li
{"title":"DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System","authors":"Yurong Luo, Jin Cao, M. Ma, Hui Li, Ben Niu, Fenghua Li","doi":"10.1109/ICCNC.2019.8685543","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685543","url":null,"abstract":"The future fifth-generation (5G) mobile communications system has already become a focus around the world. A large number of late-model services and applications including high definition visual communication, internet of vehicles, multimedia interaction, mobile industry automation, and etc, will be added to 5G network platform in the future. Different application services have different security requirements. However, the current user authentication for services and applications: Extensible Authentication Protocol (EAP) suggested by the 3GPP committee, is only a unitary authentication model, which is unable to meet the diversified security requirements of differentiated services. In this paper, we present a new diversified identity management as well as a flexible and composable three-factor authentication mechanism for different applications in 5G multi-service systems. The proposed scheme can provide four identity authentication methods for different security levels by easily splitting or assembling the proposed three-factor authentication mechanism. Without a design of several different authentication protocols, our proposed scheme can improve the efficiency, service of quality and reduce the complexity of the entire 5G multi-service system. Performance analysis results show that our proposed scheme can ensure the security with ideal efficiency.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks","authors":"Chuanji Zhang, Hemin Yang, G. Riley, D. Blough","doi":"10.1109/ICCNC.2019.8685564","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685564","url":null,"abstract":"Software-Defined Networking (SDN) is a powerful technology to enable future network innovations, especially for data center networks. However, the limited capacity of the switch-to-controller link is a scalability issue for data center deployments. Auxiliary connections are introduced in the OpenFlow 1.3 Specification to help alleviate switch-to-controller link overflow and improve the scalability of SDN. In this paper, an analytical model is proposed to study the performance of auxiliary connections with OpenFlow switches. This model characterizes different interactions between the controller and the auxiliary-connection-enabled switches with limited buffer space. The model produces evaluation results in seconds for switches with realistic data center traffic loads, which would require days of compute time with network simulation. The analytical model is validated for lower traffic loads using ns3 and an example in-depth analysis of switch performance is carried out with typical data center traffic loads to illustrate the utility of the approach. To the best of our knowledge, this is the first paper to study auxiliary connections for SDN analytically.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116248177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, C. Li
{"title":"Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels","authors":"Ruonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, C. Li","doi":"10.1109/ICCNC.2019.8685622","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685622","url":null,"abstract":"Full-dimensional (FD) beamforming extends spatial multiplexing to the elevation domain and increases network capacity significantly. However, the beamforming employing a large number of active antenna elements consumes great power and also causes interference among sectors. The multipath spatial propagation characteristics determines the beamforming performance and should be investigated carefully. This paper presents a field measurement campaign for the indoor-to-outdoor (I2O) uplink channels in a typical urban macro-cellular (UMa) scenario. The elevation power spectra (EPS) were obtained when the user equipment (UE) was on several floors. We have found that the EPS can be well modeled by the modified Laplacian distribution. Furthermore, we evaluate the interference between two UEs on different floors in the elevation multiplexing. Finally, we provide the advice to improve the energy efficiency of FDbeamforming. The obtained channel model can help with the design of the spatial multiplexing and also green communications.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Niemiec, P. Jaglarz, Marcin Jekot, P. Chołda, Piotr Boryło
{"title":"Risk Assessment Approach to Secure Northbound Interface of SDN Networks","authors":"M. Niemiec, P. Jaglarz, Marcin Jekot, P. Chołda, Piotr Boryło","doi":"10.1109/ICCNC.2019.8685486","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685486","url":null,"abstract":"The most significant threats to networks usually originate from external entities. As such, the Northbound interface of SDN networks which ensures communication with external applications requires particularly close attention. In this paper we propose the Risk Assessment and Management approach to SEcure SDN (RAMSES). This novel solution is able to estimate the risk associated with traffic demand requests received via the Northbound-API in SDN networks. RAMSES quantifies the impact on network cost incurred by expected traffic demands and specifies the likelihood of adverse requests estimated using the reputation system. Accurate risk estimation allows SDN network administrators to make the right decisions and mitigate potential threat scenarios. This can be observed using extensive numerical verification based on an network optimization tool and several scenarios related to the reputation of the sender of the request. The verification of RAMSES confirmed the usefulness of its risk assessment approach to protecting SDN networks against threats associated with the Northbound-API.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Addesso, Michele Cirillo, M. Mauro, M. Longo, V. Matta
{"title":"Adversarial Detection of Concealed VoIP Traffic","authors":"P. Addesso, Michele Cirillo, M. Mauro, M. Longo, V. Matta","doi":"10.1109/ICCNC.2019.8685492","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685492","url":null,"abstract":"network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection system by manipulating the VoIP streams through padding and shifting operations, so as to conceal them amidst the Internet traffic. A defender (the detection system) wants to detect the manipulated VoIP streams. Tackling this problem from an adversarial perspective, we provide two contributions: i) we obtain a highly stylized representation of VoIP streams in terms of transmission frequency $mathcal{F}$ and payload $mathcal{L}$, and characterize the $(mathcal{F}, mathcal{L})$ region achievable by the attacker’s transformation; ii) we formulate the VoIP detection game, and find both theoretical conditions as well as a practical algorithm to find the Nash equilibrium of the game. Simulations over real network traces, and comparison with standard, adversary-unaware tools, show the advantages of the adopted adversarial perspective.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Strayer, R. Ramanathan, D. Coffin, S. Nelson, M. Atighetchi, A. Adler, Stephane Blais, B. Thapa, William N. Tetteh, V. Shurbanov, K. Haigh, R. Hain, Colleen T. Rock, Emily H. Do, A. Caro, Daniel Ellard, M. Beckerle, S. Lawrence, S. Loos
{"title":"Mission-Centric Content Sharing Across Heterogeneous Networks","authors":"W. Strayer, R. Ramanathan, D. Coffin, S. Nelson, M. Atighetchi, A. Adler, Stephane Blais, B. Thapa, William N. Tetteh, V. Shurbanov, K. Haigh, R. Hain, Colleen T. Rock, Emily H. Do, A. Caro, Daniel Ellard, M. Beckerle, S. Lawrence, S. Loos","doi":"10.1109/ICCNC.2019.8685557","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685557","url":null,"abstract":"New airborne communication technologies solve pressing capability requirements but often at the cost of cross-platform compatibility. We present an architecture and prototype constructed under the DARPA DyNAMO program specifically designed to address information flow across different underlying tactical data links by managing the dissemination of mission-critical information across an overlay network optimized for this purpose. Our architecture has two parts, an Information Gateway providing a content-based publish-subscribe service to applications, and a Network Optimizer providing path management and service quality control. We have implemented DyNAMO within an EMANE real-time emulation environment, and evaluated it over multi-data link networks. The results show that DyNAMO optimizes the available capacity across heterogeneous networks, targets and shapes information to work within the network resources, and maximizes information sharing.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, B. Sheng
{"title":"FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices","authors":"Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, B. Sheng","doi":"10.1109/ICCNC.2019.8685637","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685637","url":null,"abstract":"Mobile devices represented by smartphones have been continuously evolving to support various applications. In this paper, we study a new mobile application, named exact scene recognition, where a user can identify a particular place by comparing two images taken there. This application framework enables users to annotate a scene supporting more descriptive image-based interactions such as mobile augmented-reality applications. We enhance the regular approaches with the assistance of the angle-of-view (AOV) information obtained from the smartphone. Our experimental results show a significant improvement on accuracy compared to the existing solutions.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"57 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128005781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks","authors":"Yan Li, V. Li","doi":"10.1109/ICCNC.2019.8685629","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685629","url":null,"abstract":"In online social networks, customers can share their experience and hence spread advertisement through social links, enabling viral marketing. By using online social networks, sellers can design advertisement strategies to reach more potential customers. An effective marketing strategy is able to provide a method to monetize the social network and has attracted much attention in the research community. However, most existing research based on the influence maximization problem focus on how to select the seed node set in the beginning and neglect how the price and rewards in the marketing strategy can influence the diffusion process. In this paper, we study how to design an incentive strategy in the online social network and explain how the incentive strategy influences the diffusion. We also propose a framework which incorporates a multi-state diffusion model. People’s purchasing behavior, which may be influenced by the rewards received in the incentive marketing strategy is divided into different states in the diffusion model. People in different states have different influence power. Simulations are performed to illustrate our framework and show that the incentive marketing strategy performs well in activating more people and achieving more revenue.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks","authors":"Katherine Russell, R. Simon","doi":"10.1109/ICCNC.2019.8685612","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685612","url":null,"abstract":"Information Centric Disruption Tolerant Networks (ICDTNs) have recently been proposed as a powerful approach to provide effective data and information sharing when existing communication infrastructures are degraded or destroyed. This paper explores using a hybrid approach for ICDTN construction using Named Data Networking (NDN) and DTN architectures that avoids the need to heavily modify existing implementations. We analyze different design choices and argue that a geographically aware architecture is particularly effective for many ICDTN applications. To support this claim we evaluate “geo” versus “node” aware NDN implementations using a number of mobility models, network sizes, DTN forwarding methods, and caching in disaster scenarios. Our results demonstrate the scalability and effectiveness of our approach with the appropriate selection of geo information, name advertisement and caching.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hadian, Thamer Altuwaiyan, Xiaohui Liang, B. Sheng, Kuan Zhang
{"title":"SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis","authors":"M. Hadian, Thamer Altuwaiyan, Xiaohui Liang, B. Sheng, Kuan Zhang","doi":"10.1109/ICCNC.2019.8685576","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685576","url":null,"abstract":"Mobile devices are pervasively used by everyone in all aspects of their daily lives. Sensing capability of the mobile devices, using their built-in sensors, is usually limited to their immediate proximity. In this paper, we exploit a technique which enables the mobile device to sense its physical proximity by taking advantage of the WiFi Channel State Information. We define a model to detect the movements of human and non-human objects in the proximity of the device. We have exploited the Fresnel zone model to detect the movement towards and outwards the device in the sensing area. The scheme can be used to alarm the user when device is left unattended. We further consider two models for early-detection of a user leaving her mobile device based on the user requirements and environment conditions. We evaluate our scheme using information from simulated theft attack scenarios in real environment and show that our scheme can achieve an average 84.44% and 77.77% accuracy on detecting the theft attacks for outdoor and indoor environments respectively.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}