{"title":"Estimation of Cellular Wireless User Coordinates via Channel Charting and MUSIC","authors":"Amr Aly, E. Ayanoglu","doi":"10.1109/ICNC57223.2023.10074200","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074200","url":null,"abstract":"We present a new way of producing a channel chart for cellular wireless communications in polar coordinates. We estimate the angle of arrival $theta$ and the distance between the base station and the user equipment $rho$ using the MUSIC algorithm and inverse of the root sum squares of channel coefficients (ISQ) or linear regression (LR). We compare this method with the channel charting algorithms principal component analysis (PCA), Samson’s method (SM), and autoencoder (AE). We show that ISQ and LR outperform all three in both performance and complexity. The performance of LR and ISQ are close, with ISQ having less complexity.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Ariful Haque, Sachin Shetty, C. Kamhoua, Kimberly Gold
{"title":"Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix","authors":"Md. Ariful Haque, Sachin Shetty, C. Kamhoua, Kimberly Gold","doi":"10.1109/ICNC57223.2023.10074241","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074241","url":null,"abstract":"Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities. Attack graph has always been a crucial tool for network vulnerability analysis. However, the current state-of-the-art attack graph can not predict adversarial techniques. To overcome the gap, we utilize the MITRE ATT&CK matrix in this work and map the techniques with the attack graph node descriptions. We first formulate a comprehensive dataset from ATT&CK consisting of all the adversarial strategies, subtechniques, associated tactics, and mitigation for the enterprise network. We then capture the attack graph node descriptions and apply the term frequency-inverse document frequency (TF-IDF) algorithm to map the attack techniques with the available node descriptions. Next, we generate the cosine similarity to determine an adversary’s top methods to attack a network. We then map those techniques with the associated tactics and mitigation strategies as enumerated in the ATT&CK matrix. Finally, we illustrate the analysis using a networked system’s attack graph. This proposed method would help identify and validate adversarial techniques and guide in selecting mitigation mechanisms for security enhancement.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On an Integrated Security Framework for Defense Against Various DDoS Attacks in SDN","authors":"Hao Wu, Aiqin Hou, Weike Nie, C. Wu","doi":"10.1109/ICNC57223.2023.10074226","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074226","url":null,"abstract":"As a new network paradigm, software-defined networking (SDN) technology has been increasingly adopted. Unfortunately, SDN-enabled networks are more prone to threats from DDoS attacks than traditional networks due to the nature of centralized management. We propose an integrated defense framework to detect and mitigate various types of DDoS attacks in SDN-enabled networks. The proposed framework deploys two technical modules in the control plane of SDN for defending against high-rate and low-rate DDoS attacks, respectively. The former module consists of three components, which watch out for suspicious traffic, detect attacks using ensemble learning, and intercept malicious packets, respectively. The latter module is designed specifically to defend against the Slow Ternary Content Addressable Memory (TCAM) exhaustion attack (Slow-TCAM) using a new Alleviative Threat for TCAM (ATFT) algorithm. The proposed framework is implemented and tested in simulated networks using Mininet and further evaluated on the CICDDoS2019 dataset. Experimental results illustrate the superior performance of the proposed framework in defending against different types of DDoS attacks in comparison with other state-of-the-art algorithms.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Pettorru, M. Fadda, Roberto Girau, M. Sole, M. Anedda, D. Giusto
{"title":"Using Artificial Intelligence and IoT Solution for Forest Fire Prevention","authors":"G. Pettorru, M. Fadda, Roberto Girau, M. Sole, M. Anedda, D. Giusto","doi":"10.1109/ICNC57223.2023.10074289","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074289","url":null,"abstract":"Natural ecosystem conservation is a topical issue that is receiving increasing attention from different branches of the scientific community. Forests and woodlands are major contributors to climate change mitigation, able to absorb significant amounts of carbon dioxide. The conservation of tree areas has been addressed through the adoption of different solutions. This paper proposes a new monitoring system and the use of artificial intelligence (AI) for real-time fire detection. The system is based on intelligent Digital Mobile Radio (DMR) nodes and a Social Internet of Things (SIoT) platform on which AI algorithms have been implemented. The results obtained show the ability to detect the slightest change in observed environmental parameters, determining the direction and speed of fire propagation.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129144276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramya Vasist, V. Sark, M. Goodarzi, J. Gutiérrez, E. Grass
{"title":"Localization System Architecture for Enhanced Positioning in Industry 4.0 Applications","authors":"Ramya Vasist, V. Sark, M. Goodarzi, J. Gutiérrez, E. Grass","doi":"10.1109/ICNC57223.2023.10074001","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074001","url":null,"abstract":"Indoor localization gained popularity with increased demand for location-based services. There has been a wide range of indoor positioning algorithms across different wireless technologies, albeit with limited accuracy. This work proposes a localization system that enables positioning in a multi-technology environment, including emerging technologies like visible light communication and high-bandwidth technologies like millimeter wave (mmWave). This system provides a common framework for enhanced user positioning, regardless of the underlying technology. The localization system combines the data of different wireless technologies to estimate accurate position information. The localization system architecture is tested in a simulation environment to assess the performance of the individual technologies and a combination of positioning data from multiple technologies. The merging of the position estimates from different wireless access technologies showed a mean positioning error of 10 cm.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121497192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Virtual Network Functions in Named Data Networking and Web 3.0","authors":"Puming Fang, T. Wolf","doi":"10.1109/ICNC57223.2023.10074018","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074018","url":null,"abstract":"Modern networks use Virtual Network Functions (VNFs) to implement processing functions on network traffic, such as content inspection, load balancing, etc. These network functions can be invoked directly by end systems or transparently by network providers to implement local policies. VNFs have been explored extensively for connection-oriented networks, but the use of VNFs for content-centric/information-centric networks is new. Our prior work has shown that network functions can be applied in the context of Named Data Networking (NDN) in principle and that such functionality can provide benefits to implementing network policies. This paper presents results from an actual prototype implementation of Named Data Network Functions (NDNF). Our work discusses implementation considerations and a variety of test scenarios that have been evaluated on the widely used ndnSIM simulator. We show that Named Data Network Functions can be implemented effectively and invoked by end systems or intermediate nodes to enforce network policies transparently. This technique can be applied to the emerging Web 3.0, which can be based on named data information transfers.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-off","authors":"Surajit Bhattacherjee, D. Pal","doi":"10.1109/ICNC57223.2023.10074542","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074542","url":null,"abstract":"With increasing complexity and focused efforts to achieve feature and functionality loaded digital design, there has been developing a keen interest to invest time on scope and quality of verification since a decade or more. From functional to static evaluation checks, from driving architecturally defined inputs to fuzzy logic through ports, from black-boxed DUT to white-boxed assertion analysis – what not! The dynamics of functional validation have increased to a great extent. The more complex is the design, the more is its functional verification collateral connectivity. It is evident that there are iterative processes during the IP-SoC development cycle as these involve intense human efforts to code and verify the changes. The standard UVM components and objects – sequencer, driver, monitor, scoreboard, transaction item, instantiation and connection for BFMs, additionally, several cross-module references, sequences, checkers, assertions, testcases and regression management, functional coverage and exclusions etc. are required to be replicated for any change in the design configuration of a IP in SoC. The proposed methodology attempts to strategically reduce IP’s verification environment bring up time in the execution cycle and aims at reduced effort towards verification sign-off. It also proposes an ML (Machine Learning) plug-in to extract a standard template out of already available verification collaterals.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan
{"title":"Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality","authors":"Aakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan","doi":"10.1109/ICNC57223.2023.10074372","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074372","url":null,"abstract":"The recent advancement of Augmented Reality (AR) technologies increase the risk of inadvertent privacy leakage from the physical world we live in. This work aims to design a new privacy control framework to help users to throttle the privacy leakage caused by the continuous-sensing camera on AR devices. We design our framework to include two parts: (1) a policy enacting part that allows users to conFigure their privacy needs, and (2) a policy enforcement part that executes those policies in real-time camera input streams outsourced to untrusted applications. We implement our system under Google’s ARCore platform with a Samsung S9 device to demonstrate our design. We conduct experiments to evaluate its function effectiveness and performance. Our experiment results reveal several challenges and opportunities for the future study of privacy control of AR systems.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iran Ribeiro, Vitor F. Calmon, Thiago H. Silva, Celso A. S. Santos, Vinícius F. S. Mota
{"title":"Evaluating Weather Influence on User Participation in a Crowd-sensing Application","authors":"Iran Ribeiro, Vitor F. Calmon, Thiago H. Silva, Celso A. S. Santos, Vinícius F. S. Mota","doi":"10.1109/ICNC57223.2023.10074590","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074590","url":null,"abstract":"The quality of life for people living in urban centers has become more difficult due to the rapid increase in the urban population. Crowdsensing services can be a helpful tool for improving people’s quality of life by giving public agents valuable data. This work proposes an analysis of traffic issues (events) reported by users of a crowd-sensing app in Vitória-ES, Brazil. The dataset was analyzed concerning the duration of the reported events, monthly variation of events, and the correlation between weather changes and events reported by users. Our findings indicate that the events exhibit an unclear seasonality pattern and may be influenced by climatic factors. We also found positive correlations between weather and events, especially when analyzing months individually. These results can provide new ways of investigation, e.g., new services for forecasting traffic problems.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"150 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Quantum Machine learning using Quantum Integrated Cloud Architecture (QICA)","authors":"Samih Fadli, Bharat S. Rawal, Andrew Mentges","doi":"10.1109/ICNC57223.2023.10074394","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074394","url":null,"abstract":"Gate-based and Annealing Quantum Computing backend systems purposely built and deployed based on Quantum Integrated Cloud Architecture (QICA) design patterns, provide enhanced quantum computational capabilities that consist of a suite of hybrid quantum-classical cloud-based software and specialized hybrid quantum-classical machine learning algorithms, tools, solvers, and simulators using physics-inspired models and High-Performance Computing circuits simulators. By harnessing the unique properties of quantum mechanics and building on decades of computer science and quantum physics research, our motivation in this paper consists of two folds: (1) to provide an overview of our PATENT-PENDING Quantum Integrated Cloud Architecture (QICA) implemented in support of aerospace programs, fielded and deployed to accelerate the pace of research and commercial enterprise adoption of low-bandwidth satellite networks using nanosatellites in a low orbit. (2) Demonstrate QICA-based computational advantages of Hybrid Quantum-Classical machine learning architecture using IBM Quantum, exploring the base generic quantum neural network (QNN) interfaces provided in Qiskit Machine Learning based on which many agnostic variations of both hybrid classical-quantum and quantum neural networks (QNN) are based on hybrid quantum machine learning.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}