{"title":"Basic Model for Process-Aware Control of Wireless Links in a Flexible Factory","authors":"S. Itaya, Fumiko Ohori, T. Osuga, F. Kojima","doi":"10.1109/LCNSymposium50271.2020.9363261","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363261","url":null,"abstract":"Increasing digitalization of tools and demands for flexibility of manufacturing are driving an increase in volume and variety of wireless devices in factories. This presents challenges for managing reliable wireless communications. This paper examines a new challenge of coordinating control of production processes and wireless networks. It proposes and analyzes a basic model of process-aware control of wireless links that includes dynamic allocation of links in a two-worker cell according to the process states of the workers. Theoretical and numerical analysis are used to show that job completion times can be reduced by process-aware control. Specifically, in practically feasible examples of cases of wireless links with intermittent quality drops, job completion time is reduced by 50%. The results prove that a process aware wireless link controller can be effective for more efficient use of available wireless resources, and faster completion of factory operations.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134362938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Impact of Geographic Restrictions on Contact Metrics in Opportunistic Networks","authors":"Alexander Tessmer, T. Hänel, N. Aschenbruck","doi":"10.1109/LCNSymposium50271.2020.9363269","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363269","url":null,"abstract":"Public Land Mobile Networks (PLMNs) are continuously facing a load increase. One way to cope with this situation is Data-Offloading. To realize offloading, e.g., via implementing solutions researched in the opportunistic networking domain, the performance of these solutions has to be evaluated. As scalability is crucial, simulation is the method of choice. In typical performance evaluations, only simple simulation models are used. Thus, relevance and trust of the results are often unclear. This paper combines three dimensions of simulation model types to estimate the impact on the performance evaluation of opportunistic networks. We examine the impact on contact metrics of human mobility as well as geographic restrictions in movement and signal propagation modeling. Our results show that (1) both categories of movement modeling have a significant influence on contact metrics and (2) geographic restrictions need to be considered in both movement and signal propagation only for higher signal propagation ranges.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127391731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Container Overlays for Secure Data Sharing","authors":"Sara Shakeri, L. Veen, P. Grosso","doi":"10.1109/LCNSymposium50271.2020.9363266","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363266","url":null,"abstract":"There are many organizations interested in sharing data with others, and they can do this only if a secure platform is available. Such platforms, often referred to as Digital Data Marketplaces (DDMs), require that all of the transactions follow the agreements which are established by the participating organizations. However, translating high-level sharing policies and setting up such an infrastructure is still a big challenge.Our work shows that containers and overlay networks can be deployed to construct a sharing platform considering security and performance aspects. We introduce an architecture for handling sharing requests in a container-based platform with focusing on improving security. We define three container connectivity: Overlay per DDM, Overlay per request, and Overlay per group. Our security analysis shows that the method \"Overlay per request\" is more secure against cross-container attacks. In terms of the time taken to complete the sharing requests, the difference between methods is small.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection for Mixed Packet Sequences","authors":"Fares Meghdouri, Félix Iglesias, T. Zseby","doi":"10.1109/LCNSymposium50271.2020.9363264","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363264","url":null,"abstract":"One-Dimensional Convolutional Neural Networks (1-DCNNs) have shown an admirable success in Natural Language Processing (NLP). Inspired by the capabilities of such approaches to overcome challenges related to sequence order, we present a 1-DCNN-based Intrusion Detection System (IDS) for attack detection in network traffic. Our proposal is capable of classifying mixed packet sequences without flow aggregation, thus reducing computational efforts. In addition, we prove that learning attack classes in an incremental manner and coping with the emergence of new patterns in a permanent implementation is feasible. We obtain comparable detection performance to other classification techniques, but with the outstanding achievement of being able to isolate malicious communications based on explainability analysis even for traffic with a comprehensive encryption.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retrospective Sensing Based on Federated Learning in the IoT","authors":"Rafiq Mazen Kamel, Amr H. El Mougy","doi":"10.1109/LCNSymposium50271.2020.9363271","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363271","url":null,"abstract":"Knowledge in the IoT is typically distributed and sparse. Combining information from multiple sources remains a challenge to researchers. In addition, due to the strict capabilities of sensing devices, they may go to sleep for extended durations and miss critical data. In this paper, we propose a system that is capable of retrospective sensing based on federated machine learning models. The system is implemented on a distributed edge computing architecture and is capable of fusing learned data from several sensors to produce accurate estimations of missed data. The proposed system is evaluated using computer simulations on real and synthetic datasets and shows high accuracy in predicting missed data.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bertram Schütz, N. Aschenbruck, Stephan Bussmann, Hanna Döring, Martina Juhnke-Kubitzke
{"title":"The Impact of Bit Errors on Intra-session Network Coding with Heterogeneous Packet Lengths","authors":"Bertram Schütz, N. Aschenbruck, Stephan Bussmann, Hanna Döring, Martina Juhnke-Kubitzke","doi":"10.1109/LCNSymposium50271.2020.9363259","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363259","url":null,"abstract":"While intra-session network coding has proven to be a promising packet-level forward error correction scheme, recent studies have shown that it can invoke increased packet sizes and excessive overhead. This problem is especially significant for traffic with heterogeneous packet lengths. Yet, most conducted studies emulate packet loss using length-independent random loss models, ignoring the overhead. In reality, larger packets have a higher probability to get corrupted, e.g., by failing a series of link layer cycling redundancy checks. To analyze the impact of this problem, the here presented study instead applies a bit error model to the encoded traffic, including the coding overhead. We will present formal equations to calculate the impact in terms of frame error rate and packet loss rate before and after decoding. Finally, a trace-based simulation highlights the implications for relevant real-world applications, namely QUIC web browsing, UFTP file transfer, Skype VoIP, and FFmpeg video streaming.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LCN Symposium 2020 Message from the General Chair","authors":"","doi":"10.1109/lcnsymposium50271.2020.9363251","DOIUrl":"https://doi.org/10.1109/lcnsymposium50271.2020.9363251","url":null,"abstract":"","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122705152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Julian Zobel, Benjamin Becker, Ralf Kundel, Patrick Lieser, R. Steinmetz
{"title":"Topology-aware Path Planning for In-Transit Coverage of Aerial Post-Disaster Communication Assistance Systems","authors":"Julian Zobel, Benjamin Becker, Ralf Kundel, Patrick Lieser, R. Steinmetz","doi":"10.1109/LCNSymposium50271.2020.9363268","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363268","url":null,"abstract":"Over the last years, natural disasters have shown to impair and destroy communication infrastructure. This results in an increased importance of infrastructure-independent ad hoc communication systems, such as delay-tolerant networks (DTNs). Research has shown that these networks are able to provide basic communication functionality for civilians. However, they are limited in their performance as the network topology is highly intermittent due to the human nature of clustering around important locations like shelters and moving in groups. Small Unmanned Aerial Vehicles (UAVs) have proven to be efficient data ferries between clusters due to their high mobility. This requires up-to-date knowledge about cluster locations to determine UAV flight paths. However, the shortest paths usually do not cover disconnected network nodes in transit between clusters, that will miss critical messages like evacuation notices or hazard warnings.This paper provides two contributions for UAV-assisted post-disaster DTN communication. First, we present a novel approach to estimate dynamically changing cluster locations in a post-disaster scenario. Second, we introduce a topology-aware path planning approach for UAV data ferry flights, covering in-transit nodes in-between clusters. Our evaluation highlights the requirements on network topology knowledge for an efficient application of UAV data ferries. We furthermore demonstrate that our approach significantly reduces the number of disconnected in-transit nodes, which is especially important in the considered post-disaster scenario.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}