International Conference on Data Communication Networking最新文献

筛选
英文 中文
Feasibility of 5G Services Over Ka-band Athena-Fidus Satellite - A Study on Ka-band Frequency Use for 5G based Applications Over Satellite 基于ka波段的Athena-Fidus卫星上5G业务的可行性——基于卫星上5G应用的ka波段频率使用研究
International Conference on Data Communication Networking Pub Date : 2017-07-26 DOI: 10.5220/0006467900330042
M. Luglio, C. Roseti, F. Zampognaro, E. Russo
{"title":"Feasibility of 5G Services Over Ka-band Athena-Fidus Satellite - A Study on Ka-band Frequency Use for 5G based Applications Over Satellite","authors":"M. Luglio, C. Roseti, F. Zampognaro, E. Russo","doi":"10.5220/0006467900330042","DOIUrl":"https://doi.org/10.5220/0006467900330042","url":null,"abstract":"5G is rapidly approaching. Companies and public institutions are investing significantly to design, develop and deploy the next generation telecommunication system which will be based on flexible network management and new service capability. Even in this forthcoming scenario the satellite can play a meaningful role to allow to actually meet all the claimed requirements, i.e. to support/complement terrestrial networks for a large set of applications. The Athena Fidus system has been realized to support civil and governmental services. The assessment of the overall capacity provided by the Italian payload for a number of channels is necessary to evaluate the possibility to exploit multimedia applications. In particular, the nominal IP-based bandwidth per terminal is an important design parameter for the definition of the services and efficiently plan future integration with terrestrial networks in compliancy with 5G scenarios. In this paper, the real characteristics of Athena Fidus DVB-S2/DVB-RCS links are considered to identify the set of services that will be possible to offer. The objective is to draw the operational context to be considered for the potential involvement of Athena Fidus in the next communication systems.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A WSN-based, RSS-driven, Real-time Location Tracking System for Independent Living Facilities 基于无线网络、rss驱动的独立生活设施实时位置跟踪系统
International Conference on Data Communication Networking Pub Date : 2016-12-12 DOI: 10.5220/0005959000640071
P. Gburzynski, W. Olesinski, J. Vooren
{"title":"A WSN-based, RSS-driven, Real-time Location Tracking System for Independent Living Facilities","authors":"P. Gburzynski, W. Olesinski, J. Vooren","doi":"10.5220/0005959000640071","DOIUrl":"https://doi.org/10.5220/0005959000640071","url":null,"abstract":"We present an indoor, real-time location tracking system (RTLS) based on a wireless sensor network (WSN) where the received signal strength (RSS) readings collected by immobile nodes (Pegs) from mobile (tracked) nodes (Tags) are translated into location estimates for the Tags. The process employs a database of samples previously collected from known locations; thus, the scheme falls into the category of profile-based solutions, with RSS readings being the only kind of input to the estimator. Compared to other schemes hinged on the same general idea, the novelty of our approach consists in systematically taking advantage of multiple transmit power levels at the Tags. This allows us to effectively emulate RFID-type of operation, when a nearby Peg can authoritatively identify the location by perceiving a weak signal from the Tag (indicative of the Tag’s immediate proximity), while otherwise falling back to elaborate fitting of multiple readings (collected by several Pegs) to produce a (possibly approximate) location estimate. The location service of our network is an add on to its other duties which consist in providing connectivity within an independent living (IL) facility for the purpose of inconspicuously monitoring the patients, detecting anomalies, signaling alarms, and so on.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131801315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed Physical Sensors Network for the Protection of Critical Infrastractures Against Physical Attacks 分布式物理传感器网络保护关键基础设施免受物理攻击
International Conference on Data Communication Networking Pub Date : 2016-11-11 DOI: 10.5220/0006017601390150
M. Jarabo-Amores, M. Rosa-Zurera, D. Mata-Moya, A. Capria, A. L. Saverino, C. Callegari, F. Berizzi, P. Samczyński, K. Kulpa, S. M. Ummenhofer, H. Kuschel, A. Meta, S. Placidi, K. Lukin, G. D'Amore
{"title":"Distributed Physical Sensors Network for the Protection of Critical Infrastractures Against Physical Attacks","authors":"M. Jarabo-Amores, M. Rosa-Zurera, D. Mata-Moya, A. Capria, A. L. Saverino, C. Callegari, F. Berizzi, P. Samczyński, K. Kulpa, S. M. Ummenhofer, H. Kuschel, A. Meta, S. Placidi, K. Lukin, G. D'Amore","doi":"10.5220/0006017601390150","DOIUrl":"https://doi.org/10.5220/0006017601390150","url":null,"abstract":"","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases 利用RIR数据库跟踪并验证劫持指纹,改进IP前缀劫持检测
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005934200570063
Hussain Alshamrani, B. Ghita
{"title":"Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases","authors":"Hussain Alshamrani, B. Ghita","doi":"10.5220/0005934200570063","DOIUrl":"https://doi.org/10.5220/0005934200570063","url":null,"abstract":"In spite of significant on-going research, the Border Gateway Protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP prefixes for ASes (Autonomous Systems). In this context, a number of research studies focused on securing BGP through historical-based and statistical-based behavioural models. This paper improves the earlier IP prefix hijack detection method presented in (Alshamrani et al. 2015) by identifying false positives showing up due to the organisations that may use multiple ASNs (Autonomous System Numbers) to advertise their routes. To solve this issue, we link a Verification Database to the previously proposed detection method to improve the accuracy. The method extracts the organisation names (unique code) and associated ASNs from different ASN delegators and RIRs (Regional Internet Registries), more specifically the RIPE (Reseaux IP Europeans) dump database (John Stamatakis 2014) in order to evaluate the method. Since the organisation name is not available in the BGP updates, the data are extracted and processed to produce a structured database (Verification DB). The algorithm excludes false positive IP prefix hijack detection events in the SFL (Suspicious Findings List) introduced in (Alshamrani et al. 2015). Finally, the algorithm is validated using the 2008 YouTube Pakistan hijack event and the Con-Edison hijack (2006); the analysis demonstrates that the improved algorithm qualitatively increases the accuracy of detecting the IP prefix hijacks, specifically reducing the false positives.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New SDN Traffic Control Application for Security Routing in Critical Infrastructures SDN流量控制在关键基础设施安全路由中的新应用
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0006017501290138
D. Adami, S. Giordano, G. D'Amore, M. Brignoli, Enrique de la Hoz, German Lopez-Civera
{"title":"A New SDN Traffic Control Application for Security Routing in Critical Infrastructures","authors":"D. Adami, S. Giordano, G. D'Amore, M. Brignoli, Enrique de la Hoz, German Lopez-Civera","doi":"10.5220/0006017501290138","DOIUrl":"https://doi.org/10.5220/0006017501290138","url":null,"abstract":"In the framework of the EU-FP7 SCOUT project, RECOVER is a subsystem that enables a satellite infrastructure, and more specifically the ground control segment, with traffic control capabilities. Basically, RECOVER applies rules (forward, drop, re-route) to traffic flows. In this paper, we discuss the preliminary architecture of the RECOVER subsystem. The design is based on SDN, a novel approach for computer networking that allows network administrators to manage network services through the abstraction of higher-level functionalities. The core of the subsystem is a new traffic control application that provides policy-based secure routing, i.e., the ability to take on routing decisions driven by physical or network security targets.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Architecture for Securing Communications in Critical Infrastructure 关键基础设施通信安全体系结构
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0006016801110120
C. Callegari, A. Forti, G. D'Amore, Enrique de la Hoz, D. Santamaria, Iván García-Ferreira, German Lopez-Civera
{"title":"An Architecture for Securing Communications in Critical Infrastructure","authors":"C. Callegari, A. Forti, G. D'Amore, Enrique de la Hoz, D. Santamaria, Iván García-Ferreira, German Lopez-Civera","doi":"10.5220/0006016801110120","DOIUrl":"https://doi.org/10.5220/0006016801110120","url":null,"abstract":"The disruption of communications in critical infrastructures could have a serious impact on the health, safety, security or economic well-being of citizens or even prevent the effective functioning of governments or other agencies. For this reason, in this paper we present a distributed architecture, named CYBERSENS, aimed at preventing, early detecting, and mitigating cyber attacks to critical infrastructure networks. CYBERSENS is an advanced IDS/IPS system specially tailored for securing communications in critical infrastructures. It’s federated architecture, the combination of misuse detection techniques and novel anomaly detection approaches, and the inclusion of mechanisms for self-obfuscation and self-protection, makes our proposal specially suit- able for these scenarios.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing Gateways' Impact on Caching for Micro CDNs based on CCN 基于CCN的网关对微cdn缓存的影响分析
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005946400190026
César Bernardini, B. Crispo
{"title":"Analyzing Gateways' Impact on Caching for Micro CDNs based on CCN","authors":"César Bernardini, B. Crispo","doi":"10.5220/0005946400190026","DOIUrl":"https://doi.org/10.5220/0005946400190026","url":null,"abstract":"Content Centric Networking (CCN) is a new architecture for a future Internet. CCN is a clean-state architecture \u0000 \u0000that targets the distribution of content. As such, content is located at the heart of the architecture and CCN \u0000 \u0000includes two main features: communication led by names and caches everywhere. Nevertheless, CCN has \u0000 \u0000been criticized due to the economical cost of replacing every IP router with a CCN router. As such, we assume \u0000 \u0000that CCN will be used for small content delivery networks –Micro CDNs– located in the ISP facilities: it \u0000 \u0000has already been shown that with only 100MB of caches in the ISP facilities, the ISP traffic to the Internet \u0000 \u0000can be reduced by 25%. As a matter of fact, if CCN is deployed as a Micro CDN, gateways must exist to \u0000 \u0000interconnect the CDN network with the Internet. In this paper, we study the advantages of using multiple \u0000 \u0000gateways against a single gateway and its impact on the caching features. Our results show that multiple \u0000 \u0000gateways are beneficial not only because they improve the performance of caches but also because the load of \u0000 \u0000the network get distributed across several nodes.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dataset Analysis for Anomaly Detection on Critical Infrastructures 关键基础设施异常检测的数据集分析
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0006017701510158
German Lopez-Civera, Enrique de la Hoz
{"title":"Dataset Analysis for Anomaly Detection on Critical Infrastructures","authors":"German Lopez-Civera, Enrique de la Hoz","doi":"10.5220/0006017701510158","DOIUrl":"https://doi.org/10.5220/0006017701510158","url":null,"abstract":"Anomaly Detection techniques allow to create robust security measures that provides early detection and are able to identify novel attacks that could not be prevented otherwise. Datasets represent a critical component in the process of designing and evaluating any kind of anomaly detection method. For this reason, in this paper we present the evaluation of two datasets showing the dependencies that arise between the techniques employed and the dataset itself. We also describe the characteristics that have to be taken into account while selecting a dataset to evaluate a detection algorithm in a critical infrastructure context.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do-it-yourself LocalWireless Networks: A Multidimensional Network Analysis of Mobile Node Social Aspects diy本地无线网络:移动节点社交方面的多维网络分析
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005963400270035
Annalisa Socievole, S. Marano
{"title":"Do-it-yourself LocalWireless Networks: A Multidimensional Network Analysis of Mobile Node Social Aspects","authors":"Annalisa Socievole, S. Marano","doi":"10.5220/0005963400270035","DOIUrl":"https://doi.org/10.5220/0005963400270035","url":null,"abstract":"The emerging paradigm of Do-it-yourself (DIY) networking is increasingly taking the attention of research \u0000 \u0000community on DTNs, opportunistic networks and social networks since it allows the creation of local humandriven \u0000 \u0000wireless networks outside the public Internet. Even when Internet is available, DIY networks may form \u0000 \u0000an interesting alternative option for communication encouraging face-to-face interactions and more ambitious \u0000 \u0000objectives such as e-participation and e-democracy. The aim of this paper is to analyze a set of mobility \u0000 \u0000traces describing both local wireless interactions and online friendships in different networking environments \u0000 \u0000in order to explore a fundamental aspect of these social-driven networks: node centrality. Since node centrality \u0000 \u0000plays an important role in message forwarding, we propose a multi-layer network approach to the analysis of \u0000 \u0000online and offline node centrality in DIY networks. Analyzing egocentric and sociocentric node centrality on \u0000 \u0000the social network detected through wireless encounters and on the corresponding Facebook social network \u0000 \u0000for 6 different real-world traces, we show that online and offline degree centralities are significantly correlated \u0000 \u0000on most datasets. On the contrary, betweenness, closeness and eigenvector centralities show medium-low \u0000 \u0000correlation values.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme Shamir (K, N)秘密共享方案中不改变多项式度的保密计算
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005998800890094
Takeshi Shingu, Keiichi Iwamura, Kitahiro Kaneda
{"title":"Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme","authors":"Takeshi Shingu, Keiichi Iwamura, Kitahiro Kaneda","doi":"10.5220/0005998800890094","DOIUrl":"https://doi.org/10.5220/0005998800890094","url":null,"abstract":"In This Paper, We Propose a New Secrecy Multiplication Scheme without Changing the Degree in Shamir’s (K, N) Secret Sharing Scheme. This Scheme Generates a Scalar Value Called Concealed Secret, Which Multiplies a Secret by a Random Number, and Distributes the Concealed Secret by using a Secret Sharing Scheme. When Secrecy Multiplying, We Temporarily Reconstruct the Concealed Secret, and Multiply It with a Share. Therefore, We Can Perform Secrecy Multiplication without Changing the Degree of Polynomials by Multiplying a Polynomial and Scalar Value. Our Scheme Can Extend to Secrecy Division by Dividing a Share with the Concealed Secret. in Addition, We Propose Secrecy Addition and Subtraction Schemes. We Evaluate the Security of Our Schemes, and Show a Possible Application That Cannot Realized using the Conventional Scheme.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信