{"title":"Energy-saved and load-balanced wireless sensor network clustering in a multi-layered wireless networks structures","authors":"Othmane Dergaoui, Youssef Baddi, A. Hasbi","doi":"10.1109/ciot53061.2022.9766675","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766675","url":null,"abstract":"Wireless Sensor Networks (WSN) are widely used in several areas of our daily life. The science of WSN has seen several advancements over the past 20 years through the implementation of several protocols and paradigms that help reduce power consumption and balance loads in resource-constrained sensors. In this context, clustering acts as the most widespread and scalable solution, it has considerably improved the WSN in terms of technical performance and quality of the services offered. In this article, we propose a reinforcement of the k-medoids algorithm which consists in eliminating the stochastic aspect in the choice of the number and the initial centers of the clusters, forming the clusters according to the multi-layer structure, and establishing the routing paths for all sensors so that they can reach the receiving node. The simulations carried out have made it possible to confirm that the proposed work achieves the targeted objective which is the minimization of energy consumption and load-balancing.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123375515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, A. Dmitrenko, Christian Krupitzer, Samuel Kounev
{"title":"Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes","authors":"Thomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, A. Dmitrenko, Christian Krupitzer, Samuel Kounev","doi":"10.1109/ciot53061.2022.9766494","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766494","url":null,"abstract":"In many Internet-of-Things (IoT) scenarios - such as smart home, or intelligent traffic systems - groups of devices interact with each other. Such scenarios no longer require encryption for individual recipients but for groups of recipients, i.e., this is a shift towards 1-to-n and n-to-n encryption schemes. Developers must select the scheme that (1) offers the required functional encryption features, (2) has the non-functional requirements best fitting the specific use case, and (3) is the most performant in the specific group setting. In other research domains, benchmarks help to support researchers, but also practitioners, in the choice of the best technology for a specific use case. However, there is no benchmark for encryption schemes available that covers all different types of encryption schemes, like 1-to-n and n-to-n encryption. In this paper, we provide such a benchmark for the category of attribute-based encryption schemes (ABE), especially focusing on the workloads, measurement setup, metrics, requirements, and features for an attribute based 1-to-n encryption scheme benchmark. Additionally, we describe how to include n-to-n encryption schemes. Lastly, we apply the benchmark to compare attribute-based encryption schemes among and with n-to-n group encryption schemes. Our result indicate that (1) our benchmark is suitable for evaluating ABE schemes as 1-to-n and n-to-n ciphers, (2) there is no single scheme that performs best in all scenarios and (3) with ABE schemes extended to n-to-n encryption schemes, a combination of constant computation times and an efficient use of broadcast is possible, which is not the case with traditional n-to-n encryption schemes.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferring Autoscale Information from NFV MANO for Launching Attacks - An Experimental Study with Cloudified 5G","authors":"P. Amogh, D. Divakaran, G. Mohan","doi":"10.1109/ciot53061.2022.9766640","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766640","url":null,"abstract":"Network function virtualization, software-defined networking, and cloud computing are the key technologies that enable dynamic, resource-efficient service provisioning in 5G networks. Auto-scaling mechanisms are an essential factor for efficient resource utilization and improved quality of experience in such networks. Autoscaling is also a defence against attacks such as Distributed Denial of Service (DDoS) but with a price. Service providers can use different European Telecommunications Standards Institute (ETSI) stack-based Network functions virtualization (NFV) management and orchestration platforms for autoscaling and dynamic resource provisioning. However, such platforms pose a risk of side channel information leak between the orchestrator and cloud. Tapping this side channel information, an adversary can infer the auto-scaling policy, scale-up/down, and cloud platform in order to launch an attack. We emulate a scalable 5G network OpenAirInterface5G bundle using Juju as a service. Using this open-source realistic 5G emulator testbed, we carry out experiments with various cloud platforms such as Openstack, Amazon Web Services (AWS), and Microsoft Azure clouds. We use MIT tale of many cities spatio-temporal load patterns that traces mobile traffic as dataset for our experiments. We show how an adversary could infer the resource scalability and type of cloud platform by analyzing as simple information as packet flow between the orchestration platform and the cloud. We use the opensource tool Zeek for intrusion detection and showed its effectiveness in detecting volume based DDoS attack in 5G. In order to evade the intrusion detection mechanism, we propose an algorithm and demonstrate a way to intelligently craft the DDoS attack with User Equipment (UE) bots.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricardo M. Firmino, D. M. F. Mattos, Dianne S. V. Medeiros, P. B. Velloso
{"title":"MT-AODV: Resilient Communication in Military Mobile Ad-Hoc Networks through On-demand Multiple Routing Tables","authors":"Ricardo M. Firmino, D. M. F. Mattos, Dianne S. V. Medeiros, P. B. Velloso","doi":"10.1109/ciot53061.2022.9766388","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766388","url":null,"abstract":"The Mobile Ad-Hoc Networks (MANETs) benefit applications in military scenarios, as they enable the monitoring of soldiers' vital signals in field operations. Intermittent communication and route volatility make data transmission in MANETs challenging. Frequent disconnections and consequent failures generate significant delays and message delivery errors. We propose the Multi-Table Ad-Hoc On-Demand Distance Vector (MT-AODV) protocol, an optimization of the AODV routing protocol, to improve communication performance in military operations scenarios with troop mobility. MT-AODV calculates multiple routing tables to find multiple possible paths aiming to provide greater resilience and less latency communication. The MT-AODV performance evaluation was compared to other traditional MANET routing protocols, in a variety of simulated scenarios, with node failure and mobility. The results show that MT-AODV performs better than the original protocol due to the increased availability of paths in its routing tables.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Roadmap to Smart Homes Security Aided SDN and ML","authors":"Tanzeela Altaf, R. Braun","doi":"10.1109/ciot53061.2022.9766525","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766525","url":null,"abstract":"The smart home is one of those significant technology trends which enhances comfort and allows the integration of environment-friendly smart applications in daily life. It contains a large pool of internet-enabled devices some of which have a limited capability and operate in a specific manner. Due to heterogeneity and operational complexity, home networks pose extremely challenging vulnerabilities concerning privacy and security. This paper is a review of recent attempts to provide privacy and security in IoT smart homes. We summarize the research efforts in the past few years, discuss and classify them based on technologies deployed i.e. SDN, ML. We then propose an approach for the integration of SDN with ML in the home network for an automatic and reconfigurable network security mechanism. We emphasize that the proposed approach addresses the heterogeneity and scalability issues (by implementing SDN) as well as pave ways to prevent harmful attacks efficiently and in a timely manner.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An access control and authentication scheme for secure data sharing in the decentralized cloud storage system","authors":"Pankaj Khatiwada, Bian Yang","doi":"10.1109/ciot53061.2022.9766634","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766634","url":null,"abstract":"Data privacy and data availability remain the major concern in centralized cloud storage, which could be handled effectively through the concept of decentralized data storage. However, the secrecy of data sharing is a rising concern in the decentralized data storage for which the effective access control and data sharing scheme, hash and session key-dependent attribute-based encryption (HS-ABE) is proposed in this research. Accordingly, the multi-level access control and sharing strategy authenticates the genuine requestors and assures access to the requestors upon the authentication of their attribute sets. In this perspective of access control and secure data sharing, Ethereum blockchain, decentralized Interplanetary File System (IPFS), HS-ABE are organized. The data owners (DOs) provide the secret attribute set for the requestors ensuring fine-grained access over the data. The performance of the developed HS-ABE scheme is investigated and compared with the conventional strategies, where the memory usage of the proposed scheme is 5812 Kbps, which proclaims a well-defined secure access control and authentication in the Blockchain-based cloud storage.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasmeen Dabbagh, Reem Khoja, Leena AlZahrani, Ghada AlShowaier, Nidal Nasser
{"title":"A Blockchain-Based Fake Product Identification System","authors":"Yasmeen Dabbagh, Reem Khoja, Leena AlZahrani, Ghada AlShowaier, Nidal Nasser","doi":"10.1109/ciot53061.2022.9766493","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766493","url":null,"abstract":"Counterfeit goods have become a global problem as consumers are being deceived into buying unauthentic goods with no way to validate the authenticity. Recently, blockchain has become more popular as it fosters trust between untrusting participants. This paper uses blockchain technology to combat the sale of counterfeit products. We use blockchain to allow manufacturers to add authentic product serial numbers onto the ledger; consumers can then use the serial number to verify the authenticity of a product before purchasing it. Blockchain plays a pivotal role in ensuring that data was not tampered with - creating a trusted environment.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128698079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Menatalla Abdel-Gawad, Manar Usama, H. Hesham, Omar Ibrahim, M. Abdellatif
{"title":"Remote Healthcare Monitoring using Wearable IoT Devices and Cloud Services","authors":"Menatalla Abdel-Gawad, Manar Usama, H. Hesham, Omar Ibrahim, M. Abdellatif","doi":"10.1109/ciot53061.2022.9766591","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766591","url":null,"abstract":"With the strain on healthcare infrastructure and healthcare workers due to the ongoing COVID'19 pandemic, the need for novel ways to simplify the interaction between patients and physicians has increased. The aim is mainly to reduce face-to-face interactions and free more time and resources for those who urgently need it. This paper presents a Telemedicine system which can be used as an alternative method to a doctor's visit. The proposed system is considered as an interface that remotely connects the patient and the doctor. The system regularly measures and uploads readings from the patient to a database which the doctor can remotely review to decide on the state of the patient. The whole system is based on the internet of medical things (IoMT). In the proposed system, sensors collect and send data over the internet using the WIFI module connected to a node MCU controller. The developed prototype uses two sensors, one is used to measure both the percentage of oxygen in the blood and heart rate while the other sensor measures the temperature of the human body. The aim of this work is to help patients, by offering them this solution which can help them get the care they require from the comfort of their home and at the same time help doctors remotely give them the suitable treatment while reducing the need for unnecessary face-to-face interactions.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. D. Correia, R. Pérez, J. Matos-Carvalho, V. Leithardt
{"title":"µJSON, a Lightweight Compression Scheme for Embedded GNSS Data Transmission on IoT Nodes","authors":"S. D. Correia, R. Pérez, J. Matos-Carvalho, V. Leithardt","doi":"10.1109/ciot53061.2022.9766635","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766635","url":null,"abstract":"Embedded computing is a sector in strong growth, driven by the increasing offer in the internet of things. Since position information is typically one of the intrinsic features of a sensory platform, the present work considers and analyzes the embedded lossless compression of localization data. A structural data scheme is proposed based on the number of occurrences of the independent coordinate components, named as µJSON. It is shown that, when considering a low-level language implementation on an embedded processor acquiring GNSS data, the proposed schema implies lower compression rates than its counterparts. An embedded test-bench platform is assembled, and several real case scenarios are considered for effectiveness and validation purposes.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131624956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting the Energy Consumption of Cloud Data Centers Based on Container Placement with Ant Colony Optimization and Bin Packing","authors":"Amine Bouaouda, K. Afdel, R. Abounacer","doi":"10.1109/ciot53061.2022.9766522","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766522","url":null,"abstract":"Currently, the energy consumption in the data centers is a major problem due to the increase in the number of servers and services. Physical machines represent huge energy consumers who work continuously to ensure quality in services through virtual instances. The placement of these instances as containers in hosts has an impact on the minimization of energy consumption. Precisely, the guarantee of an efficient placement without wasting material resources of the hosts, makes it possible to minimize the number of active hosts and thus reduce energy consumption. In this article, we will calculate the energy consumed by a data center using CloudSim before and after applying the placement of containers in the hosts by the First Fit Decreasing algorithm (FFD) of Bin Packing and Ant Colony Optimization (ACO). The results show the FFD's superiority over the ACO in minimizing the energy consumed by any type of Cloud system.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}