Yang Yang, He Li, Xue-song Qiu, Shaoyong Guo, XiaoXiao Zeng, Kangting Zhao, Haoran Xin
{"title":"Research on lifetime prediction-based recharging scheme in rechargeable WSNs","authors":"Yang Yang, He Li, Xue-song Qiu, Shaoyong Guo, XiaoXiao Zeng, Kangting Zhao, Haoran Xin","doi":"10.1109/NOMS.2018.8406304","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406304","url":null,"abstract":"In order to reduce the cost and energy consumption in wireless sensor network's charging process, this paper proposes a Recharging Scheme based on Lifetime Prediction (RSLP) for wireless rechargeable sensor networks. First of all, based on the historical quantity of electricity variation sequence of the sensor nodes, the lifetime prediction scheme of the sensor nodes is established; and then, considering the sensor nodes need to be recharged and the Sink nodes chosen by the mobile charger (MC) according to the charging value to establish an undirected complete diagram. A Hamilton charging circuit is established by using the Gene-Expressive cuckoo algorithm to solve the charging problem of the rechargeable sensor networks. The simulation experiments show that the proposed algorithm can improve charging efficiency and reduce the mobile energy consumption.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83323924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying security and privacy in Internet of Things solutions","authors":"Faisal S. Alsubaei, Abdullah Abuhussein, S. Shiva","doi":"10.1109/NOMS.2018.8406318","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406318","url":null,"abstract":"As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet of things solutions in many domains. However, the security and privacy of these solutions are often underrated. The lack of security and privacy in the solutions can lead to catastrophic results, especially in sensitive domains like healthcare. Therefore, it is imperative to ensure their security and privacy. Stakeholders often find themselves unguided when assessing the security and privacy of the solutions. This paper proposes a framework to quantitatively assess and compare the security and privacy in Internet of things solutions using Analytic Hierarchy Process. It also provides in-depth security and privacy assessment criteria to enhance security and privacy in the Internet of things solutions. This work aims to fill the gap between consumers and providers by promoting transparency and increasing the security awareness.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"45 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88092594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi
{"title":"Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka","authors":"Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi","doi":"10.1109/NOMS.2018.8406306","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406306","url":null,"abstract":"Real-time data stream processing technologies such as Apache Storm and Apache Spark are being actively studied to deal with large-capacity data streams that generated rapidly in real time. Because it is difficult to use most real-time processing techniques alone, it is common to use it with a messaging system that supports input and output of data streams. Apache Kafka is a representative distributed messaging system, specialized in delivering large amounts of real-time log data. However, if the production rate of data in Kafka is faster than the consumption rate, data starvation problem may arise. In order to solve the starvation problem, a load shedding technique is needed to limit the incoming data and maintain system performance when the system is under load. Thus, in this paper confirmed the starvation problem that can occur in Kafka, and we designed and implemented a load shedding engine to solve this problem and proposed a solution to the starvation problem in Kafka based on the performance experiment.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"14 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76477537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Zhang, F. Zhou, Jiayi Ning, Peng Yu, Wenjing Li
{"title":"Hotspot localization and prediction in wireless cellular networks via spatial traffic fitting","authors":"Xiang Zhang, F. Zhou, Jiayi Ning, Peng Yu, Wenjing Li","doi":"10.1109/NOMS.2018.8406292","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406292","url":null,"abstract":"With the proliferation of bandwidth-demanding mobile applications in the era of 5G, the aggregation of a few users may lead to extremely high load in cellular base stations, producing traffic hotspot in wireless networks. Therefore the higher requirement is imposed on the flexibility of a 5G network, namely the capability of performing rapid capacity enhancement in hotspot area, which makes hotspot localization and critical prediction functions. In this paper, we proposed to localize hotspots with Gaussian Random Field (GRF)-based spatial traffic density model deduced from load data of base stations, together with the prediction with Holt-Winters. We measured the spatial traffic in a specific area within a short time span and forecasted the spatial traffic density distribution. Numeric results show the proposed approach can localize hotspot efficiently, and during traffic peak hours, hotspot prediction is of high success rate.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87619185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim
{"title":"Framework for precise protocol reverse engineering based on network traces","authors":"Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim","doi":"10.1109/NOMS.2018.8406307","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406307","url":null,"abstract":"Emergence of high-speed Internet and ubiquitous environment is generating massive traffic, and it has led to a rapid increase of applications and malicious behaviors with various functions. Many of the complex and diverse protocols that occur under these situations, are unknown or proprietary protocols that are at least documented. For efficient network management and network security, protocol reverse engineering that extract the specification of the protocols is very important. While various protocol reverse engineering methods have been studied, there is no single standardized method to extract protocol specification completely yet, and each of methods has some limitations. In this paper, we propose the framework for precise protocol reverse engineering based on network traces. The proposed framework can extract highly elaborative and intuitive message formats, flow formats, and protocol state machine of the unknown protocol. We demonstrate the validity of our framework through an example of HTTP protocol.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87079735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Song Wang, S. Chandrasekharan, K. Gomez, K. Sithamparanathan, A. Al-Hourani, M. R. Asghar, G. Russello, Paul Zanna
{"title":"SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks","authors":"Song Wang, S. Chandrasekharan, K. Gomez, K. Sithamparanathan, A. Al-Hourani, M. R. Asghar, G. Russello, Paul Zanna","doi":"10.1109/NOMS.2018.8406196","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406196","url":null,"abstract":"Although the popularity of Software-Defined Networking (SDN) is increasing, it is also vulnerable to security attacks such as Denial of Service (DoS) attacks. Since in SDN, the control plane is isolated from the data plane, DoS attackers can easily target the control plane to impair the network infrastructure in addition to the data plane to degrade the user's Quality of Service (QoS). In our previous work, we introduced SECO, an SDN Secure Controller algorithm to detect and defend SDN against DoS attacks. Simulation results showed that SECO successfully defends SDN networks from DoS attacks. In this paper, we present SDN sEcure COntrol and Data Plane (SECOD), which is an improved version of SECO. Basically, SECOD introduces new triggers to detect and prevent DoS attacks in both control and data planes. Moreover, SECOD is implemented and tested using SDN-based hardware testbed, OpenFlow-based switch, and RYU controller to capture the dynamics of realistic hardware and software. The results show that SECOD successfully detects and effectively mitigates DoS attacks on SDN networks keeping data plane performance at 99.72% compared to a network not under attack.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90081568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Vaishnavi, János Czentye, M. Gharbaoui, Giovanni Giuliani, Dávid Haja, J. Harmatos, Dávid Jocha, Yoonhee Kim, B. Martini, Javier Melian, P. Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, A. Sgambelluri, Balázs Sonkoly, László Toka, F. Tusa, C. Bernardos, R. Szabó
{"title":"Realizing services and slices across multiple operator domains","authors":"I. Vaishnavi, János Czentye, M. Gharbaoui, Giovanni Giuliani, Dávid Haja, J. Harmatos, Dávid Jocha, Yoonhee Kim, B. Martini, Javier Melian, P. Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, A. Sgambelluri, Balázs Sonkoly, László Toka, F. Tusa, C. Bernardos, R. Szabó","doi":"10.1109/NOMS.2018.8406168","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406168","url":null,"abstract":"Supporting end-to-end network slices and services across operators has become an important use case of study for 5G networks as can be seen by 5G use cases published in 3GPP, ETSI as well as NGMN. This paper presents the in- depth architecture, implementation and experiment on a multidomain orchestration framework that is ab le to deploy such multi-operator service as well as monitor the service for SLA compliance. Our implemented architecture allows operators to abstract their sensitive details while exposing the relevant amount of information to support inter-operator slice creation. Our experiment shows that the implemented framework is capable of creating services across operators while fulfilling the respective service requirements.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90921126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streaming scalable video sequences with media-aware network elements implemented in P4 programming language","authors":"Guan-Ru Wang, Chien-Chang Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu","doi":"10.1109/NOMS.2018.8406129","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406129","url":null,"abstract":"We present the first Media-Aware Network Element (MANE) for intelligently streaming scalable video sequences in P4 programming language. Our MANE selectively drops queued scalable video packets when the queue occupancy exceeds a threshold. Three packet discarding logics are implemented: (i) tail, (ii) enhancement-layer, and (iii) rate-distortion optimized. Our P4-based MANE implementation is demonstrated in: (i) larger emulated networks in mininet with P4 software switches and (ii) a small real network with a physical P4 switch and multiple Raspberry Pis running P4 software switches.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91097078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Lin, Byungchul Park, H. Bannazadeh, A. Leon-Garcia
{"title":"Deploying a multi-tier heterogeneous cloud: Experiences and lessons from the SAVI testbed","authors":"Thomas Lin, Byungchul Park, H. Bannazadeh, A. Leon-Garcia","doi":"10.1109/NOMS.2018.8406140","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406140","url":null,"abstract":"The SAVI testbed is a multi-tier SDN-enabled het-erogeneous cloud created as an application enablement platform for academic research. It was developed to investigate the hypothesis that the entire infrastructure can be virtualized and abstracted as a service. Key to this investigation was the creation of a resource management system based on the concept of Software-Defined Infrastructure (SDI), which enables integrated control and management over heterogeneous resources and exposes a programmable interface for users. In this paper, we present our experiences in designing and deploying the Canadian national SAVI testbed, and discuss the various lessons learned along the way. In addition, we describe our ongoing work to enhance the testbed management system to meet the demands and challenges of the IoT era.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"29 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73232180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving network flow definition: Formalization and applicability","authors":"P. Velan","doi":"10.1109/NOMS.2018.8406203","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406203","url":null,"abstract":"Network flow monitoring has been used for more than 20 years and has become an important part of network accounting and security. A significant effort was invested into the standardization of flow monitoring by the Internet Engineering Task Force (IETF). The flow monitoring has steadily evolved to satisfy new requirements created by the demand for increased visibility and accuracy. Therefore, it is not surprising that even the most recent flow definition created by the IETF does not consider several specifics of the flow monitoring process as it is used nowadays. This paper presents a revised flow definition that is more generic and is designed to accommodate more specific flow monitoring requirements. Moreover, we formalize our definition to avoid ambiguity and imprecision introduced by the use of natural language. One additional benefit of formalizing the flow definition is that it implicitly describes the flow creation process as well.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"94 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74935426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}