{"title":"Fair Delegation of Digital Services Without Third Parties","authors":"Andreas Guillot, Fabrice Théoleyre, C. Pelsser","doi":"10.1109/ISCC53001.2021.9631431","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631431","url":null,"abstract":"The software architecture of most applications is more and more fragmented, and relying on micro-services. Moreover, some parts may be specialized, and a customer may choose to delegate a task to a service provider. In this situation, the customer must be sure to get results that comply with the task when they pay the service provider, and inversely. We propose a framework based on atomic swaps to enable such simultaneous exchanges. Our scheme is based on exchanging a transactional key during an atomic swap. Our framework protects both actors, and enables non-repudiation, from both sides, even in an asynchronous environment.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121385751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Mogavero, Ivan Visconti, A. Vitaletti, Marco Zecchini
{"title":"The Blockchain Quadrilemma: When Also Computational Effectiveness Matters","authors":"F. Mogavero, Ivan Visconti, A. Vitaletti, Marco Zecchini","doi":"10.1109/ISCC53001.2021.9631511","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631511","url":null,"abstract":"Ethereum's founder Buterin raised the challenge of solving the blockchain Trilemma towards a decentralized computer that could together achieve high degrees of security, scalability, and decentralization. Later on, Algorand claimed to have resolved Buterin's blockchain Trilemma and is nowadays increasingly adopted by designers of decentralized computations. Motivated by the need of selecting a blockchain to run some decentralized computations, we observe the limitations of using the Trilemma as benchmark, and we propose as alternative a Quadrilemma that takes into account also computational effectiveness, namely the capability of running non-trivial decentralized computations at affordable costs. For concreteness, motivated by the current trends of using blockchains for the management of non-fungible tokens (NFTs) related to highly desired items (i.e., NFTs for art), we consider the use case of decentralized auctions in various scenarios that mainly differ on the desired degree of confidentiality. Our contribution gives the following insights. Except very limited cases where also Bitcoin can be taken into account (i.e., when latency is not a big deal and only notarization is required), Algorand can often be the right choice as long as decentralized computations consist of basic operations only. Instead, Ethereum is advisable when more sophisticated computations are required, in particular when ad-hoc cryptographic tasks are essential, and one can afford the involved costs and latency. Focusing on those three blockchains, the state of affairs about resolving the blockchain Quadrilemma is somewhat unsatisfying. Even in natural cases where computations and storage requirements for a smart contract are low (e.g., public-key encryption), none of those decentralized computers achieves simultaneously low cost and fast transaction confirmations.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121565465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Callegati, A. Campi, C. Contoli, Silvio Di Santi, Nicola Ghiselli, Carlo Giannelli, Alessandro Pernafini, Riccardo Zamagna
{"title":"SDN-based Differentiated Traffic Flow Management for Industrial Internet of Things Environments","authors":"F. Callegati, A. Campi, C. Contoli, Silvio Di Santi, Nicola Ghiselli, Carlo Giannelli, Alessandro Pernafini, Riccardo Zamagna","doi":"10.1109/ISCC53001.2021.9631388","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631388","url":null,"abstract":"Today Industrial IoT environments are still based on traditional IP technologies, which makes difficult, if not impossible, to bridge the missing link between the application and the network layer. Indeed, IIoT applications should be able to ask for network services (with specific QoS guarantees) independently of the addressing at the network and transport layer. In this paper, we start from a novel patented method for routing packets to demonstrate with a prototype implementation the feasibility and efficiency of a software defined solution based on flow tagging with the purpose of supporting IIoT dynamic network programmability. We show how the combination of IP datagram options and SDN allows IIoT environments to reach per-device and per-application flow management granularity. The presented proof of concept prototype outlines the capability to dynamically program the network based on tagged flows and to differentiate network behaviors based on IIoT requirements together with the whole network state.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134434398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The cost of immortality: A Time To Live for smart contracts","authors":"Dimitri Saingre, T. Ledoux, Jean-Marc Menaud","doi":"10.1109/ISCC53001.2021.9631513","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631513","url":null,"abstract":"Smart contracts, scripts at the heart of blockchain-based applications, are meant to be available forever once deployed. However, this property has a price. The amount of space required to store new contracts keeps increasing. This increase impacts each participating node's performance and makes it inconvenient for low-end devices to participate in the network. Among all contracts deployed in the blockchain, a vast majority will lead to little if any usage. We demonstrate that, in the course of one year, 70 % of deployed contracts lead to no use. Unfortunately, unused contracts keep occupying space on the blockchain. To tackle this issue, we propose a new protocol to identify and delete unused contracts. Through simulation, based on Ethereum historical data, we show that deletion of smart contracts after an inactivity period of 90 days could lead to a 66 % reduction in the number of contracts stored over a year.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Language Plagiarism Detection Model Based On Multiple Features","authors":"Gang Liu, Yichao Dong, Guang Li","doi":"10.1109/ISCC53001.2021.9631406","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631406","url":null,"abstract":"As information sharing becomes more and more convenient, a lot of phenomena of plagiarism shows up. The study of cross-language plagiarism is an important problem that the whole academic circle tries to solve it collectively. In this paper, a multiple-features based cross-language plagiarism detection model is proposed, which includes cross-language plagiarism candidate retrieval based on multiple features and cross-language plagiarism detection based on dynamic text alignment. For cross-language plagiarism candidate retrieval, it is mainly based on the translation features. What's more, for cross-language plagiarism detection, a text-alignment based similarity analysis was used to filter the final results between the identified paragraphs. In this step, our approach doesn't use a machine translation system to convert longer text, but uses a dictionary to obtain the translation of a single word. Moreover, experimental results show that our method outperforms the previous methods and achieved the best results in four datasets.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130950784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of IoT Devices Based on Feature Vector Split","authors":"Ruizhong Du, Shuang Li","doi":"10.1109/ISCC53001.2021.9631257","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631257","url":null,"abstract":"Device identification and management effectively prevent security issues caused by the massive access of Internet of Things (IoT) devices. However, when there is access of new devices and firmware upgrade of known devices in IoT, frequent model re-training based on multi-classing becomes difficult, which problem could be solved by developing a separate identification model for each device, but the identification accuracy is usually low due to model overlapping. In this article, we propose a method of feature vector splitting to reduce the overlap between models and develop a Sub-Vector Joint Model Group based on K-means algorithm, which can detect normal network behavior of each device and classify them in real-time. We evaluate the efficacy of our scheme with public dataset, and the result shows that the method we proposed could reach an overall accuracy of over 98%, and effectively reduce the training time and storage cost of the model simultaneously.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pellenz, Rosana Lachowski, Edgard Jamhour, G. Brante, G. Moritz, R. Souza
{"title":"In-Network Data Aggregation for Information-Centric WSNs using Unsupervised Machine Learning Techniques","authors":"M. Pellenz, Rosana Lachowski, Edgard Jamhour, G. Brante, G. Moritz, R. Souza","doi":"10.1109/ISCC53001.2021.9631416","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631416","url":null,"abstract":"IoT applications are changing our daily lives. These innovative applications are supported by new communication technologies and protocols. Particularly, the information-centric network (ICN) paradigm is well suited for many IoT application scenarios that involve large-scale wireless sensor networks (WSNs). Even though the ICN approach can significantly reduce the network traffic by optimizing the process of information recovery from network nodes, it is also possible to apply data aggregation strategies. This paper proposes an unsupervised machine learning-based data aggregation strategy for multi-hop information-centric WSNs. The results show that the proposed algorithm can significantly reduce the ICN data traffic while having reduced information degradation.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Middleware of Things","authors":"D. Cavalcanti, R. Carvalho, N. Rosa","doi":"10.1109/ISCC53001.2021.9631408","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631408","url":null,"abstract":"Middleware for IoT (Internet of Things) helps application developers face challenges, such as device heterogeneity, service interoperability, security and scalability. While extensively adopted nowadays, IoT middleware systems are static because, after deployment, updates are only possible by stopping the thing. Therefore, adaptive capabilities can improve existing solutions by allowing their dynamic adaptation to changes in the environmental conditions, evolve provided functionalities, or fix bugs. This paper presents AMoT, an adaptive publish/subscribe middleware for IoT whose design and implementation adopt software architecture principles and evolutive adaptation mechanisms. The experimental evaluation of AMoT helps to measure the impact of the proposed adaptation mechanisms while also comparing the performance of AMoT with a widely adopted MQTT (Message Queuing Telemetry Transport) based middleware. In the end, adaptation has an acceptable performance cost and the advantage of tunning the middleware functionality at runtime.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Potts, Raymond R. Bond, M. Mulvenna, E. Ennis, A. Bickerdike, Edward K. Coughlan, T. Broderick, Con Burns, M. McTear, L. Kuosmanen, H. Nieminen, K. Boyd, B. Cahill, A. Vakaloudis, I. Dhanapala, A. Vartiainen, C. Kostenius, M. Malcolm
{"title":"Insights and lessons learned from trialling a mental health chatbot in the wild","authors":"C. Potts, Raymond R. Bond, M. Mulvenna, E. Ennis, A. Bickerdike, Edward K. Coughlan, T. Broderick, Con Burns, M. McTear, L. Kuosmanen, H. Nieminen, K. Boyd, B. Cahill, A. Vakaloudis, I. Dhanapala, A. Vartiainen, C. Kostenius, M. Malcolm","doi":"10.1109/ISCC53001.2021.9631395","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631395","url":null,"abstract":"This study reports on the development and ‘in the wild’ trialling of a chatbot (ChatPal) which promotes good mental wellbeing. A stakeholder-centered approach for design was adopted where end users, mental health professionals and service users were involved in the design which was centered around positive psychology. In the wild usage of the chatbot was investigated from Jul-20-Mar-21. Exploratory analyses of usage metrics were carried out using the event log data. User tenure, unique usage days, total chatbot interactions and average daily interactions were used in K-means clustering to identify user archetypes. The chatbot was used by a variety of age groups (18-65+) and genders, mainly those living in Ireland. K-means clustering identified three clusters: sporadic users (n=4), frequent transient users (n=38) and abandoning users (n=169) each with distinct usage characteristics. This study highlights the importance of event log data analysis for making improvements to the mental health chatbot.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125770585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessio Catalfamo, M. Fazio, Francesco Martella, A. Celesti, M. Villari
{"title":"MuoviMe: Secure Access to Sustainable Mobility Services in Smart City","authors":"Alessio Catalfamo, M. Fazio, Francesco Martella, A. Celesti, M. Villari","doi":"10.1109/ISCC53001.2021.9631521","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631521","url":null,"abstract":"Sustainable mobility is a key objective for many Smart Cities. In this paper, we present an application for sustainable mobility that aims at encouraging citizens to use low-impact vehicles instead of private cars. Through a partnership between the University Messina and the Municipality of the Messina city (Italy), we developed MuoviME, a digital application to assign citizens electric bikes, free of charge for a limited period of time. The key issue we addressed in the development of such an application is security, both in terms of secure authentication of citizens that access the service and tracking of the whole assignment process, from the user's bicycle request to its restitution. To achieve this goal, we implemented a solution for the physical recognition of the user based on two-factor authentication (2FA) and Blockchain technology. This paper summarizes the secure by design approach, implementation details, and some experimental results on the service efficiency.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126169926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}