Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad
{"title":"FlowJustifier","authors":"Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad","doi":"10.1145/3341325.3342037","DOIUrl":"https://doi.org/10.1145/3341325.3342037","url":null,"abstract":"Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Amine Khelif, J. Lorandel, O. Romain, Matthieu Regnery, Denis Baheux
{"title":"A Versatile Emulator of MitM for the identification of vulnerabilities of IoT devices, a case of study: smartphones","authors":"Mohamed Amine Khelif, J. Lorandel, O. Romain, Matthieu Regnery, Denis Baheux","doi":"10.1145/3341325.3342019","DOIUrl":"https://doi.org/10.1145/3341325.3342019","url":null,"abstract":"With the emergence of Internet of Things (IoT) and the proliferation of communicating objects, new security issues appear. These devices store a significant amount of personal and sensitive data that must be strongly protected. In most of the case, they are more protected against communication attacks than hardware attacks. Smartphones, as the most popular connected object, represent the perfect example of study for a hardware attack on PCIe data bus. In this paper, we present an emulator of Man-in-the-Middle (MitM) attack for vulnerabilities identification in IoT devices. The proposed architecture performs a real-time data analysis, extraction and fault injection. The invisibility of MitM attack represent the main challenge of the implementation, that could be done by respecting the highly constraining requirements of the PCIe protocol such as response time, frequency and throughput.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hien Tran, Tarek Menouer, Patrice Darmon, A. Doucoure, François Binder
{"title":"Smart Contracts Search Engine in Blockchain","authors":"Hien Tran, Tarek Menouer, Patrice Darmon, A. Doucoure, François Binder","doi":"10.1145/3341325.3342015","DOIUrl":"https://doi.org/10.1145/3341325.3342015","url":null,"abstract":"Recently blockchain technology has attracted increasing attention. It provides a distributed peer-to-peer network. It also allows to enlarge the contracting space using smart contracts. Smart contract is a numeric protocol which define a promises between parties. In a blockchain platform, we can find millions of smart contracts which are created by different users (developers). The smarts contracts created by users and saved in a blockchain can be similar in functionality, even if different users use different wording. This paper presents a new search engine in the blockchain. The novelty of our search engine is to help users to checks their smart contracts by referencing some similar existing smart contracts created and saved in a blockchain platform. Our search engine allows to give each user an adaptive set of similar smart-contracts based on the user's similarity needs. Our search engine is developed in the Ethereum blockchain platform. Experiments demonstrate the potential of our search engine system under different scenarios.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"82 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pub/Sub SDN-Integrated Framework for IoT Traffic Orchestration","authors":"Pedro F. Moraes, Joberto S. B. Martins","doi":"10.1145/3341325.3342001","DOIUrl":"https://doi.org/10.1145/3341325.3342001","url":null,"abstract":"The Internet of Things (IoT) is advancing and the adoption of internet-connected devices in everyday use is constantly growing. This increase not only affects the traffic from other sources in the network, but also the communication quality requirements, like Quality of Service (QoS), for the IoT devices and applications. With the rise of dynamic network management and dynamic network programming technologies like Software-Defined Networking (SDN), traffic management and communication quality requirements can be tailored to fit niche use cases and characteristics. We propose a publish/subscribe QoS-aware framework (PSIoT-SDN) that orchestrates IoT traffic and mediates the allocation of network resources between IoT data aggregators and pub/sub consumers. The PSIoT framework allows edge-level QoS control using the features of publish/ subscribe orchestrator at IoT aggregators and, in addition, allows network-level QoS control by incorporating SDN features coupled with a bandwidth allocation model for network-wide IoT traffic management. The integration of the framework with SDN allows it to dynamically react to bandwidth sharing enabled by the SDN controller, resulting in better bandwidth distribution and higher link utilization for IoT traffic.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116484357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kubernetes cluster optimization using hybrid shared-state scheduling framework","authors":"O. Ungureanu, C. Vladeanu, R. Kooij","doi":"10.1145/3341325.3341992","DOIUrl":"https://doi.org/10.1145/3341325.3341992","url":null,"abstract":"This paper presents a novel approach for scheduling the workloads in a Kubernetes cluster, which are sometimes unequally distributed across the environment or deal with fluctuations in terms of resources utilization. Our proposal looks at a hybrid shared-state scheduling framework model that delegates most of the tasks to the distributed scheduling agents and has a scheduling correction function that mainly processes the unscheduled and unprioritized tasks. The scheduling decisions are made based on the entire cluster state which is synchronized and periodically updated by a master-state agent. By preserving the Kubernetes objects and concepts, we analyzed the proposed scheduler behavior under different scenarios, for instance we tested the failover/recovery behavior in a deployed Kubernetes cluster. Moreover, our findings show that in situations like collocation interference or priority preemption, other centralized scheduling frameworks integrated with the Kubernetes system might not perform accordingly due to high latency derived from the calculation of load spreading. In a wider context of the existing scheduling frameworks for container clusters, the distributed models lack of visibility at an upper-level scheduler might generate conflicting job placements. Therefore, our proposed scheduler encompasses the functionality of both centralized and distributed frameworks. By employing a synchronized cluster state, we ensure an optimal scheduling mechanism for the resources utilization.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121644121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Yousaf, Naeem Abbas, F. Ali, Muhammad Munwar Iqbal, Y. Amin, Adeel Akram
{"title":"Miniaturized High Gain Antenna for Biomedical Application","authors":"M. Yousaf, Naeem Abbas, F. Ali, Muhammad Munwar Iqbal, Y. Amin, Adeel Akram","doi":"10.1145/3341325.3342034","DOIUrl":"https://doi.org/10.1145/3341325.3342034","url":null,"abstract":"In this paper, a low-profile antenna system has been designed for the biomedical application operating in industrial, scientific, and medical (2.40-2.4835 GHz) band. By using a shorting technique, a circular cut shaped radiator and the polygon-shaped open-ended slots in the ground plane is proposed. The total volume of the proposed antenna system is (7x7x0.2) mm3. The Roger Ultralam (ϵr = 2.9, tanδ = 0.0025) is used as a substrate and superstrate with 0.1 mm thickness. In the homogeneous skin phantom, the proposed antenna is placed to measure the results; this novel-shaped single wide band antenna has -12.98 dBi gains at 2.45 GHz. The radiation pattern of the proposed antenna is omnidirectional, and the results show that it is used for the skin implantation. This proposed antenna shows better result as compared to the previous work in terms of size, bandwidth, and gain of the antenna.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. AlShaikh, L. Laouamer, A. Laouid, A. Bounceur, M. Hammoudeh
{"title":"Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm","authors":"M. AlShaikh, L. Laouamer, A. Laouid, A. Bounceur, M. Hammoudeh","doi":"10.1145/3341325.3341991","DOIUrl":"https://doi.org/10.1145/3341325.3341991","url":null,"abstract":"Watermarking is the technique to prove the security aspects of the material. One of the main aspects in any watermarking method is the imperceptibly and the fidelity of the watermarked data. The place chosen for watermark embedding affects directly in the imperceptibility and fidelity characteristics. Choosing optimal area of embedding is still worrying issue. Robust watermarking approach is helpful for proving the intellectual ownership property rights. Moreover, medical image is very sensitive for any slight modification. However, spatial domain provides less complexity, but unfortunately less robustness comparing to frequency domain. We present through this paper, a watermarking approach in the spatial domain. Our approach investigated Dijkstra algorithm in order to find the optimal path of embedding data, where the Mean aspects can play a vital role in the algorithm. Our approach provides less complexity with high robustness regarding to the relevant existing approaches operating in spatial domain. Moreover, the approach provides watermark integrity aspects and ability to detect any tamper happening for the embedded watermark and moreover the ability to recover the attacked watermark.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122000395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Amine Yagoub, A. Laouid, A. Bounceur, M. AlShaikh
{"title":"An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms","authors":"Mohammed Amine Yagoub, A. Laouid, A. Bounceur, M. AlShaikh","doi":"10.1145/3341325.3342012","DOIUrl":"https://doi.org/10.1145/3341325.3342012","url":null,"abstract":"In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WorkFlow Application Scheduling in Cloud Computing: A Systematic Literature Review (SLR)","authors":"Rimsha Asif, Khubaib Amjad Alam, A. Jamil, Pariwish Touseef, Bisma Rehman","doi":"10.1145/3341325.3342029","DOIUrl":"https://doi.org/10.1145/3341325.3342029","url":null,"abstract":"Scheduling workflow applications in cloud computing is one of the most challenging issues. Workflow applications contain many distinct tasks and complex structures. Every single task might include processing, entering, and accessing storage and software functions. For all these reasons, it is considered to be an NP-hard optimization problem. Afterward, efficient scheduling algorithms are needed for the selection of appropriate resources in workflow execution, so task scheduling is the potential research area in this context. It is a part of a full-text study that systematically reviews the literature on workflow application in the context of cloud computing. Initial results are described by answering the two research questions. 41 articles were selected out of 225 research papers. Articles that answer selected research questions are included in this paper. Workflow scheduling purposes at assigning and managing the execution of tasks on to the shared resources that are controlled by the scheduler. We have expanded the scope of our study to include both workflow and optimization scheduling in terms of single and multi-objective optimization. This study explores that there is a need to develop an efficient task scheduling algorithm that maps appropriate tasks on to the VMs, while minimizing the cost overhead and maximize the performance of the cloud-based system.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sumaira Mustafa, Khubaib Amjad Alam, B. Khan, Muhammad Habib Ullah, Pariwish Touseef
{"title":"Fair Coexistence of LTE and WiFi-802.11 in Unlicensed Spectrum: A Systematic Literature Review","authors":"Sumaira Mustafa, Khubaib Amjad Alam, B. Khan, Muhammad Habib Ullah, Pariwish Touseef","doi":"10.1145/3341325.3342031","DOIUrl":"https://doi.org/10.1145/3341325.3342031","url":null,"abstract":"LTE and Wi-Fi have successful designs in the cellular and wireless networks operating in the licensed and unlicensed spectrum bands from a time. The exponentially growing demand for wireless applications and mobile services, it is suspected that the licensed spectrum is not enough. For the shortage of licensed spectrum, the proposals for the extensions of LTE (Long Term Evolution) to the readily available unlicensed spectrum is receiving much attention. However, gaining capacity in a band where Wi-Fi is widely used and guaranteeing fairness between systems is not easy to address the problems. Examining the operational effects of long Term evolution on the performance of Wi-Fi in an unlicensed spectrum band and devising solutions to minimize such an impact has the main consideration of the network research community. This paper aims to conduct a systematic literature review to find all the issue about fair coexistence of the LTE and WiFi in the unlicensed spectrum band. The paper will also highlight the proposed mechanism and analyze the impact of all these techniques to provide the fair coexistence of these wireless technologies with synthesis analysis of previous work.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131247879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}