{"title":"Effect of Construction Materials on Indoor Positioning System using Bluetooth Low Energy","authors":"Fei Gao, Xue Li","doi":"10.1109/ITNAC55475.2022.9998330","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998330","url":null,"abstract":"Indoor positioning system (IPS) has become increasingly important due to its wide applications in indoor navigation, location-based services (LBS), and disaster relief / recovery. Among the technology candidates, Bluetooth Low Energy (BLE) provides low cost and low power consumption. This paper studies the effect of construction materials on the localisation accuracy of an IPS based on trilateration using received signal strength indicators (RSSI) from BLE beacon nodes. Through experiments, we found that plasterboard walls and glass walls provide better localisation accuracy as compared to wooden walls. Furthermore, knowledge about the room-level location of BLE beacon nodes can help improve the localisation accuracy.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute Verifier for Internet of Things","authors":"M. Kamel, Yuping Yan, P. Ligeti, C. Reich","doi":"10.1109/ITNAC55475.2022.9998348","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998348","url":null,"abstract":"Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the nossession of one or all of the given target attributes.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114849342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdullah Al Mamun, Harith Al-Sahaf, I. Welch, S. Çamtepe
{"title":"Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach","authors":"Abdullah Al Mamun, Harith Al-Sahaf, I. Welch, S. Çamtepe","doi":"10.1109/ITNAC55475.2022.9998358","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998358","url":null,"abstract":"Advanced Persistent Threat (APT) is one of the most sophisticated cyber threats aiming to gain access to a system and remain there for a long time utilizing continuous, covert, and sophisticated evasion techniques. As a result, detecting such an attack is still very challenging. A successful APT attack can cause significant financial and valuable information loss for a large company or a government organization. The importance of APT detection has attracted many researchers, and various machine learning methods have been proposed in the literature to improve APT detection performance. This paper utilizes Particle Swarm Optimization (PSO) to automatically evolve a classification model for APT attack detection and classification. The proposed method optimizes a set of weights, each corresponding to a feature in the dataset. These weights are then used to predict the class label, for instance, by calculating the weighted sum of the features based on the weights evolved by PSO. One of the main advantages of the proposed method is that it does not require human intervention. The experimental results on a publicly available dataset, i.e., DAPT-2020, show that the proposed method significantly outperformed the state-of-the-art method and other commonly used machine learning methods for APT detection and multi-class classification. Furthermore, a detailed investigation of the proposed method's inner mechanism is discussed to highlight various aspects, e.g., convergence and some of the detected patterns.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SQBRP: A Switch Quality-Based Routing Protocol for Software-Defined Networks","authors":"Nabila Bouziane, Z. Doukha","doi":"10.1109/ITNAC55475.2022.9998402","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998402","url":null,"abstract":"Nowadays, networks are facing new challenges due to the proliferation of network devices, the excessive use of bandwidth-intensive network applications, as well as the increasing demand for network quality of service. To satisfy these growing user expectations and improve network performance, an efficient network routing is needed. In order to overcome these challenges, Software Defined Networking (SDN) was designed to manage data flow and network maintenance. However, the standard SDN short-path first routing protocol (SPF) degrades network performance because it ignores the dynamic nature of the network in terms of traffic flow. In addition, there is no SDN routing solution that exploits switch states like CPU usage in the routing process. In this context, this paper proposes an SDN Routing protocol based on switch quality and residual bandwidth (SQBRP). To evaluate the performance of our protocol, we carried out several simulations. The results show that SQBRP reduces packet drop ratio as well as delays and improves throughput compared to SPF, particularly in an overloaded network.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinghan Lin, Haoxing Zhang, Gaofeng Pan, Shuai Wang, Jianping An
{"title":"Outage Performance of Satellite-Terrestrial MISO Downlink Transmission","authors":"Xinghan Lin, Haoxing Zhang, Gaofeng Pan, Shuai Wang, Jianping An","doi":"10.1109/ITNAC55475.2022.9998344","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998344","url":null,"abstract":"The satellite-terrestrial communication system is considered to be a necessary way to provide global broad coverage. Particularly, as the low Earth orbit (LEO) constellation system develops rapidly and LEO satellites operate in low orbits with heights lower than 2000 km, short serving time and frequent handovers are necessary for LEO satellite-terrestrial communications. Thus, diversity gain via multiple satellites needs to be considered. In this work, the code-division multiple access scheme is adopted for the downlink delivery while multiple satellites are trying to simultaneously deliver information bits to a terrestrial terminal. Moreover, an aerial platform generates interference signals to interfere with the information delivered from the satellites to the terrestrial terminal. Then, we derive an outage performance analysis model by deriving the closed-form analysis expression for outage probability. Finally, the Monte Carlo simulation is presented to show how the system parameters, e.g., the synchronization of the clock and the frequency drifts among the multiple terrestrial users, influence the downlink transmission performance of target satellite-terrestrial systems.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125658290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G Vertical Use Cases and Trials of Transportation","authors":"Haesik Kim, Jarno Pinola, O. Apilo","doi":"10.1109/ITNAC55475.2022.9998352","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998352","url":null,"abstract":"The 5G networks are still being deployed in many countries creating new business opportunities. 5G networks allow us to include new features and deliver new levels of system capacity and efficiency such as higher speed connectivity, ultra low latency connectivity, improved security, distributed networks, virtualized networks and so on. They enable us to have new use cases and scenarios such as automated vehicles, smart city, eHealth, and so on. In this paper, 5G vertical use cases and large scale trials of transportation undertaken at the EU 5G-HEART project trial sites across Europe are introduced. Four representative transport use cases are validated in the 5G-HEART project. They are as follows: (1) Platooning that drives a group of vehicles together, (2) Autonomous driving that avoids collision and achieves safer driving and better traffic efficiency, (3) Remote driving support that allows an user or cloud software to control vehicles remotely, and (4) Vehicle data services that provides us with a better vehicle services by interconnecting various third-party data to autonomous vehicles using 5G networks. User requirements and KPIs are analyzed for 5G transportation use cases. The selected results of 5G-HEART transportation vertical trials are presented.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Contention-Based vs Timeslotted Channel Hopping Medium Access in Wireless Sensor Networks under Noisy Environment","authors":"Yevhenii Shudrenko, K. Kuladinithi, A. Timm‐Giel","doi":"10.1109/ITNAC55475.2022.9998416","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998416","url":null,"abstract":"Tiny sensors with a radio transceiver offer ubiq-uitous connectivity and ease of maintenance for Internet of Things (IoT) applications compared to wired counterparts. Most Wireless Sensor Networks (WSNs) utilize IEEE 802.15.4 standard for communication, which defines physical and Medium Access Control (MAC) layers architecture. Two most promi-nent MAC modes are unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and Timeslotted Channel Hopping (TSCH), which represent a randomized and scheduled solution, respectively. Considering diverse use-case requirements, the choice of a suitable MAC is error-prone. Existing literature only evaluates contention-based TSCH with a simplified physical layer and no external interference, obscuring TSCH strengths and limitations in comparison to CSMA/CA. This work fills the gap in understanding the potential of both MAC modes by comparing their performance using detailed simulations in OMNeT++ with a realistic radio model. A 100-node network with bidirectional communication is evaluated under variable WLAN interference, using the end-to-end delay and packet delivery ratio as performance indicators. Contrary to expectations, CSMA/CA may outperform TSCH depending on the interference pattern. At the expense of latency, TSCH achieves 100% reliability even in a highly congested medium thanks to the channel hopping. Overall, presented insights contribute greatly to the MAC selection process durinz an IoT network planningstage,","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121814867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Viable Statistical Metrics for Re-Embedding Network Steganalysis","authors":"Jun O. Seo, S. Manoharan, U. Speidel","doi":"10.1109/ITNAC55475.2022.9998399","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998399","url":null,"abstract":"Network steganalyses attempt to uncover hidden messages (steganograms) in network flows. These techniques are binary in that they classify if a flow contains steganograms or not. Moreover, most of these techniques assume the availability flows that do not contain any steganograms as baselines for comparison, an assumption that is hard to hold. A re-embedding steganalysis does not require any baseline, and moreover, it can not only detect the presence of steganograms but also estimate the amount of steganograms. Being able to estimate the amount of steganograms allows a network forensic expert to judge the damage caused by these hidden messages. This paper addresses the question of what statistical metrics might apply for effective re-embedding steganalysis of network traces. It presents an empirical comparison of several statistical metrics in the light of their effectiveness in re-embedding steganalysis.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115726931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficient and QoS Assurance Link Adaptation Scheme for Wireless Body Area Networks","authors":"Da-Ren Chen, Nai-Xin Liang","doi":"10.1109/ITNAC55475.2022.9998362","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998362","url":null,"abstract":"Due to limited power supply and long-life service requirements for wireless sensor nodes, energy and time-efficient methods are critical to in the wireless body area networks (WBAN). Link adaptation (LA) technique, in which modulation and coding are applied to change per channel conditions to maximize link throughput are widely investigated in the field of mobile communications. On the basis of LA and transmit power control (TPC) techniques, we propose a model-based calibration scheme to maintain a transmit power threshold table WBAN which satisfies the target quality of service (QoS) while minimizing transmission power of sensor nodes. Rather than existing methods that compare the SNR threshold with instantaneous channel SNR, we contrast the target bit error rate (BER) with instantaneous received BER, and calibrate the path loss and shadowing model, and receiver sensitivity. The proposed method lower bounds the transmit power given a pair of prescribed data rate and BER for a set of feasible combinations of modulation and coding schemes (MCSs). The performance evaluation show that the proposed method outperforms previous link adaptation methods in execution overheads and energy efficiency.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms","authors":"Mohammed El-hajj, A. Fadlallah","doi":"10.1109/ITNAC55475.2022.9998413","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998413","url":null,"abstract":"Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor networks, tele-medicine, and smart grid are a few examples of these fields. In any of these contexts, security and privacy might be essential aspects. Research on secure communication in Internet of Things (IoT) networks is a highly contested topic. One method for ensuring secure data transmission is cryptography. Since IoT devices have limited resources, such as power, memory, and batteries, IoT networks have boosted the term “lightweight cryptography”. Algorithms for lightweight cryptography are designed to efficiently protect data while using minimal resources. In this research work, we evaluate and benchmark lightweight symmetric ciphers for resource-constrained devices. The evaluation is performed using two widely used platform: Arduino and Raspberry PI. In the first part, we implement 39 block ciphers on an ATMEGA328p micro-controller and analyze them in terms of speed, cost, and energy efficiency during encryption and decryption for different block and key sizes. In the second part, the 2nd round NIST candidates (80 stream and block cipher algorithms) were added to the first part ciphers in a comprehensive analysis for equivalent block and key sizes in terms of latency and energy efficiency.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}