2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)最新文献

筛选
英文 中文
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress) 实施基于延迟感知雾云的物联网防火墙(正在进行中)
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013561
Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz
{"title":"Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress)","authors":"Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz","doi":"10.1109/NCA57778.2022.10013561","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013561","url":null,"abstract":"Firewalls for IoT devices can be enforced at the gateway or at the cloud. Utilizing a fog based architecture, firewalls can also be enforced at fog layer. Depending on where the firewall is running, varying delays and overhead will be experienced by IoT devices. Some IoT devices are sensitive to the incurred delays. So choosing the most suitable platform to enforce firewall for each individual device under the different load conditions is important. In this work, we present a delay-aware IoT firewall enforcing mechanism using fog-cloud based architecture.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117347093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming 以基础设施为中心,与网络服务器无关的LoRaWAN漫游
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013531
Giovanni Merlino, R. Asorey-Cacheda, L. D'Agati, F. Longo, A. García-Sánchez, J. García-Haro, A. Puliafito
{"title":"Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming","authors":"Giovanni Merlino, R. Asorey-Cacheda, L. D'Agati, F. Longo, A. García-Sánchez, J. García-Haro, A. Puliafito","doi":"10.1109/NCA57778.2022.10013531","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013531","url":null,"abstract":"The development of Low-Power Wide-Area Networks (LPWAN) has significantly boosted the uptake of Internet of Things technologies, fostering their adoption in such domains as Smart Cities and Industry 4.0. In the context of LPWANs, LoRa is one of the most promising developments, experiencing massive growth in recent years. This situation has led to the steadily growing trend of redundant deployments across locations, or scenarios, where it would be more natural to be able to leverage (e.g., rent) LoRa infrastructure belonging to a third party. Key to reversing this unsustainable trend is roaming approaches. Although the LoRa specifications define mechanisms for roaming, gaps and challenges make roaming difficult to deploy and operate in real-world scenarios. This paper analyzes these concerns and proposes a novel architecture compliant with the LoRa specification to design and accommodate roaming services in a consistent, efficient, and scalable way.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version) 乘法部分同态CRT秘密共享:(初步版本)
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013513
S. Dolev, Yaniv Kleinman
{"title":"Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version)","authors":"S. Dolev, Yaniv Kleinman","doi":"10.1109/NCA57778.2022.10013513","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013513","url":null,"abstract":"A new CRT-based positive (non-zero) secret-sharing scheme with perfect information-theoretic (PIT) security and multiplicative homomorphism is presented. The scheme is designed to support the evaluation of multiplications of non-zero secrets of multiplicative groups.Our CRT-based scheme is partially homomorphic, supporting homomorphic multiplications. Nevertheless, it has the potential to be regarded as fully homomorphic for practical scenarios, such as bounded-sized multi-cloud databases.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inter-slice B5G Bandwidth Resource Allocation B5G片间带宽资源分配
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013545
Fadoua Debbabi, Raouia Taktak, Rihab Jmal, L. Chaari, R. Aguiar
{"title":"Inter-slice B5G Bandwidth Resource Allocation","authors":"Fadoua Debbabi, Raouia Taktak, Rihab Jmal, L. Chaari, R. Aguiar","doi":"10.1109/NCA57778.2022.10013545","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013545","url":null,"abstract":"The Beyond 5G (B5G) networks vision afford wireless access to a vertical market with varying Quality of Service (QoS) requirements. Network Slicing (NS) is one of the key features that offers the opportunity to have a logical network that affects the market model of these verticals. Accordingly, Network Slicing opens the door to new market players including the Infrastructure Provider (InP) and the Virtual Network Operator (VNO). The InP is the owner of the infrastructure that supports several types of slices. The VNO will buy network resources (i.e., bandwidth) from the InP in order to provide a particular service to its users. Consequently, deciding on the optimal resources allocation among VNO users while maximizing the revenue of the InP has become a fundamental issue that needs to be solved. Previous works have presented optimal solutions for resources allocation and focused mainly on a single scenario based on pricing mechanisms. In this paper, we propose an inter-slice resources allocation based on multiple sets, namely customer residential profile, industry coverage, and business area. We propose an Integer Linear Programming (ILP) formulation to the problem, describe an admission control scheme and devise a greedy-based heuristic to solve the problem.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122168808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning 基于顺序机器学习的网络入侵检测系统鲁棒性评估
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013643
A. Venturi, Claudio Zanasi, Mirco Marchetti, M. Colajanni
{"title":"Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning","authors":"A. Venturi, Claudio Zanasi, Mirco Marchetti, M. Colajanni","doi":"10.1109/NCA57778.2022.10013643","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013643","url":null,"abstract":"The rise of sequential Machine Learning (ML) methods has paved the way for a new generation of Network Intrusion Detection Systems (NIDS) which base their classification on the temporal patterns exhibited by malicious traffic. Previous work presents successful algorithms in this field, but just a few attempts try to assess their robustness in real-world contexts. In this paper, we aim to fill this gap by presenting a novel evaluation methodology. In particular, we propose a new time-based adversarial attack in which we simulate a delay in the malicious communications that changes the arrangement of the samples in the test set. Moreover, we design an innovative evaluation technique simulating a worst-case training scenario in which the last portion of the training set does not include any malicious flow. Through them, we can evaluate how much sequential ML-based NIDS are sensible to modifications that an adaptive attacker might apply at temporal level, and we can verify their robustness to the unpredictable traffic produced by modern networks. Our experimental campaign validates our proposal against a recent NIDS trained on a public dataset for botnet detection. The results demonstrate its high resistance to temporal adversarial attacks, but also a drastic performance drop when even just 1% of benign flows are injected at the end of the training set. Our findings raise questions about the reliable deployment of sequential ML-NIDS in practice, and at the same time can guide researchers to develop more robust defensive tools in the future.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV) 基于强化学习的车联网虚拟传感器配置
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013541
Slim Abbes, S. Rekhis
{"title":"Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV)","authors":"Slim Abbes, S. Rekhis","doi":"10.1109/NCA57778.2022.10013541","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013541","url":null,"abstract":"The Internet of Vehicles (IoV) has been recognized as a powerful application of the Internet of Things (IoT) in the Intelligent Transportation System (ITS), providing intelligence for interconnection between devices, interaction with the environment, and thus, greater efficiency in sensor data exploitation. Therefore, leveraging the huge capability of sensors embedded in vehicles to offer a Sensing As A Service (Se-aaS) represents a great solution to exploit under-used sensor resources and continue providing sensors despite their positions and mobility patterns. Nevertheless, the high network mobility and the fast topology changes in IoV impact the vehicle availability and complicate the service provision. To this aim, we propose a vehicle sensor virtualization in a Cloud IoV architecture that encompasses functional blocks of mobile sensor suppliers, Sensor Cloud Service Provider (SCSP), and service consumers. Moreover, we propose a reinforcement learning-based solution for vehicle sensor selection to predict and dynamically select the physical sensors composing the vehicle virtual sensor. The conducted simulations show the effectiveness of the proposed solution.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modularized and Contract-Based Prediction Models in Programmable Networks 可编程网络中的模块化和基于契约的预测模型
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013517
Michel Neves, Andre Riker, J. Nobre, A. Abelém, B. Dalmazo
{"title":"Modularized and Contract-Based Prediction Models in Programmable Networks","authors":"Michel Neves, Andre Riker, J. Nobre, A. Abelém, B. Dalmazo","doi":"10.1109/NCA57778.2022.10013517","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013517","url":null,"abstract":"Network traffic engineering aims at the network quality, optimizing routes and detecting network attacks. In this context, traffic prediction is an essential tool to capture the underlying behavior of a network. Therefore, this work proposes a modularization architecture for volumetric prediction models, allowing switching between models and setups at runtime in controllers of Software Defined Networks (SDN), dealing with short time series and delivering the data already processed for the prediction. The proposed architecture compares the results from four traditional predictors based on short-range time dependency.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application 蓝牙点对点位置认证与游戏化移动应用程序
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013607
Ricardo Grade, Samih Eisa, M. Pardal
{"title":"Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application","authors":"Ricardo Grade, Samih Eisa, M. Pardal","doi":"10.1109/NCA57778.2022.10013607","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013607","url":null,"abstract":"Nowadays, tourists turn to digital platforms to discover new places to explore. CROSS City is a smart tourism mobile application that enhances the user experience of tourists visiting points of interest in a route by rewarding them in the end, if they actually visited all locations. From a technical standpoint, the user location is certified resorting to strategies that take advantage of both the diversity of the existing Wi-Fi network infrastructure throughout the city, as well as the presence of other users at the same site using Bluetooth. This work developed a new, peer-to-peer location certification strategy and added gamification elements to encourage users to keep the wireless radios turned on and use the app more. This work was evaluated both in laboratory experiments and with users in a real-world scenario which demonstrated that the new Bluetooth peer-based strategy is both feasible and resistant to collusion attacks.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Machine Learning-based anomaly detectors for Controller Area Network 基于机器学习的控制器局域网异常检测器比较
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013527
A. Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti
{"title":"Comparison of Machine Learning-based anomaly detectors for Controller Area Network","authors":"A. Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti","doi":"10.1109/NCA57778.2022.10013527","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013527","url":null,"abstract":"This paper presents a comparative analysis of different Machine Learning-based detection algorithms designed for Controller Area Network (CAN) communication on three different datasets. This work focuses on addressing the current limitations of related scientific literature, related to the quality of the publicly available datasets and to the lack of public implementations of the detection solutions presented in literature. Since these issues are preventing the reproducibility of published results and their comparison with novel detection solutions, we remark that it is necessary that all security researchers working in this field start to address them properly to advance the current state-of-the-art in CAN intrusion detection systems. This paper strives to solve these issues by presenting a comparison of existing works on publicly available datasets.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WebDHT: browser-compatible distributed hash table for decentralized Web applications WebDHT:用于分散Web应用程序的浏览器兼容分布式哈希表
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013537
L. Rossi, Luca Ferretti
{"title":"WebDHT: browser-compatible distributed hash table for decentralized Web applications","authors":"L. Rossi, Luca Ferretti","doi":"10.1109/NCA57778.2022.10013537","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013537","url":null,"abstract":"Modern browser technologies allow running highly portable and usable complex applications. However, the inability to access all the operating system features may limit their features or performance when compared to native software in certain scenarios. We investigate the design of peer-to-peer (P2P) networks of interconnected browsers to improve applications interconnecting users, such as videotelephony, messaging and gaming. Although peer-to-peer protocols are well-established in the literature, known designs and implementations cannot be executed on browsers due to constraints of browser environments. We propose WebDHT, a webassembly library for creating P2P networks among browsers which offers topic-based peer-discovery features and integrates usable identity authentication mechanisms. WebDHT implements a variant of the Kademlia protocol based on distributed hash tables (DHT) adapted to support WebRTC protocol. WebDHT requires a native server to be available only for network bootstrap, but leverages existing browsers connected to the DHT to decentralize WebRTC signaling backends. We propose an open-source implementation and two demonstrative applications for users messaging and multimedia streaming, and analyze limitations and future work for designing better browser-compatible P2P networks.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125633426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信