2021 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
Data Aggregation for Privacy Protection of Data Streams Between Autonomous IoT Networks 自主物联网网络间数据流隐私保护的数据聚合
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631401
Renato Caminha Juacaba Neto, P. Mérindol, Fabrice Théoleyre
{"title":"Data Aggregation for Privacy Protection of Data Streams Between Autonomous IoT Networks","authors":"Renato Caminha Juacaba Neto, P. Mérindol, Fabrice Théoleyre","doi":"10.1109/ISCC53001.2021.9631401","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631401","url":null,"abstract":"Many IoT applications rely on data streams, flowing from producers to consumers. Typically, Named Data Networking has been designed to manipulate directly data chunks, and is particularly relevant in IoT networks. However, in multi-tenant networks, privacy is a major concern, and producers may refuse to share the personal data they generate with non trusted stakeholders. To guarantee k-anonymity, producers can require their data to be aggregated with the one of other producers. We propose here a routing scheme based on aggregation, relying on a pub-sub approach. By appropriately constructing and querying the set of offers, i.e. the list of data streams that are collected, aggregated and transformed together, our routing aggregation scheme provides a privacy aware large-scale interconnection, where the consumer does not access directly to individual measurements. Our performance evaluation highlights the flexibility of our solution to accommodate a large set of queries, while still respecting privacy.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127316282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reducing Communication Overhead of Federated Learning through Clustering Analysis 通过聚类分析降低联邦学习的通信开销
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631391
Ahmed A. Al-Saedi, V. Boeva, E. Casalicchio
{"title":"Reducing Communication Overhead of Federated Learning through Clustering Analysis","authors":"Ahmed A. Al-Saedi, V. Boeva, E. Casalicchio","doi":"10.1109/ISCC53001.2021.9631391","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631391","url":null,"abstract":"Training of machine learning models in a Datacen-ter, with data originated from edge nodes, incurs high communication overheads and violates a user's privacy. These challenges may be tackled by employing Federated Learning (FL) machine learning technique to train a model across multiple decentralized edge devices (workers) using local data. In this paper, we explore an approach that identifies the most representative updates made by workers and those are only uploaded to the central server for reducing network communication costs. Based on this idea, we propose a FL model that can mitigate communication overheads via clustering analysis of the worker local updates. The Cluster Analysis-based Federated Learning (CA-FL) model is studied and evaluated in human activity recognition (HAR) datasets. Our evaluation results show the robustness of CA - FL in comparison with traditional FL in terms of accuracy and communication costs on both IID and non-IID cases.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration 通过SAML集成将自主身份与联邦和以用户为中心的身份连接起来
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631453
Hakan Yildiz, Christoph Ritter, Lan Thao Nguyen, Berit Frech, Maria Mora Martinez, Axel Küpper
{"title":"Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration","authors":"Hakan Yildiz, Christoph Ritter, Lan Thao Nguyen, Berit Frech, Maria Mora Martinez, Axel Küpper","doi":"10.1109/ISCC53001.2021.9631453","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631453","url":null,"abstract":"Self-sovereign identity provides a feasible alternative to login via username and password through an identity provider to access digital services. It allows identity subjects to control and own their data. Although this is an appealing approach, it requires a whole new infrastructure with almost no dependencies on the existing ones. We designed and implemented a solution that combines an existing federated identity access management solution with the new approach by enabling authentication via self-sovereign-identity-based credentials while the identity provider retains verification and communication with the service provider via Security Assertion Mark Up Language. Thanks to the standardized federated systems in the German higher education domain, the solution not only enables a smooth transition to self-sovereign identities but can also be easily transferred to other universities using the same federated identity framework.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication 基于微服务和区块链的一次性密码(MBB-OTP)安全增强认证协议
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631479
Alessio Catalfamo, Armando Ruggeri, A. Celesti, M. Fazio, M. Villari
{"title":"A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication","authors":"Alessio Catalfamo, Armando Ruggeri, A. Celesti, M. Fazio, M. Villari","doi":"10.1109/ISCC53001.2021.9631479","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631479","url":null,"abstract":"Nowadays, the increasing complexity of digital applications for social and business activities has required more and more advanced mechanisms to prove the identity of subjects like those based on the Two-Factor Authentication (2FA). Such an approach improves the typical authentication paradigm but it has still some weaknesses. Specifically, it has to deal with the disadvantages of a centralized architecture causing several security threats like denial of service (DoS) and man-in-the-middle (MITM). In fact, an attacker who succeeds in violating the central authentication server could be able to impersonate an authorized user or block the whole service. This work advances the state of art of 2FA solutions by proposing a decentralized Microservices and Blockchain Based One Time Password (MBB-OTP) protocol for security-enhanced authentication able to mitigate the aforementioned threats and to fit different application scenarios. Experiments prove the goodness of our MBB-OTP protocol considering both private and public Blockchain configurations.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125694702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Technical Program Committee (TPC) members 技术计划委员会(TPC)成员
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/infcom.2004.1354636
{"title":"Technical Program Committee (TPC) members","authors":"","doi":"10.1109/infcom.2004.1354636","DOIUrl":"https://doi.org/10.1109/infcom.2004.1354636","url":null,"abstract":"Technical Program Committee (TPC) members","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling UAV Services in the IoT with HAMSTER 利用HAMSTER实现物联网中的无人机服务
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631461
Mariana Rodrigues, K. Branco
{"title":"Enabling UAV Services in the IoT with HAMSTER","authors":"Mariana Rodrigues, K. Branco","doi":"10.1109/ISCC53001.2021.9631461","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631461","url":null,"abstract":"The Internet of Things (IoT) is believed to bring new unprecedented development to our society and will impact and enable new, more powerful applications in many areas. When considering Unmanned Aerial Vehicles (UAVs), there is potential to enhance applications in emergency response situations, smart cities, industry and others. UAVs are expected to provide and consume services as one of the things in the IoT environment. However, the intrinsic IoT heterogeneity regarding devices, platforms, and communication protocols makes the task of service provision and management much harder to be done in the application layer. In previous work, we have presented how HAMSTER can enable secure service provision using the Message Queue Telemetry Transport (MQTT) protocol with enhanced security. In this paper, we show how HAMSTER deals with service management and exchange with minimum effort from the application. We introduce the Service Exchange Operator (SEO) in HAMSTER and present preliminary results. Keywords - Drone, UAV, IoT, Services, HAMSTER.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126325935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iHELP: Personalised Health Monitoring and Decision Support Based on Artificial Intelligence and Holistic Health Records iHELP:基于人工智能和整体健康记录的个性化健康监测和决策支持
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631475
George Manias, H. O. D. Akker, Ainhoa Azqueta-Alzúaz, Diego Burgos-Sancho, N. D. Capocchiano, Borja Llobell Crespo, Athanasios Dalianis, A. Damiani, Krasimir Filipov, Giorgos Giotis, M. Kalogerini, R. Kostadinov, Pavlos Kranas, D. Kyriazis, A. Lophatananon, Shwetambara Malwade, G. Marinos, Fabio Melillo, Vicent Moncho Mas, K. Muir, M. Nieroda, A. Nigro, C. Pandolfo, M. Patiño-Martínez, Florin Picioroaga, Aristodemos Pnevmatikakis, S. Syed-Abdul, T. Tomson, D. Vicheva, U. Wajid
{"title":"iHELP: Personalised Health Monitoring and Decision Support Based on Artificial Intelligence and Holistic Health Records","authors":"George Manias, H. O. D. Akker, Ainhoa Azqueta-Alzúaz, Diego Burgos-Sancho, N. D. Capocchiano, Borja Llobell Crespo, Athanasios Dalianis, A. Damiani, Krasimir Filipov, Giorgos Giotis, M. Kalogerini, R. Kostadinov, Pavlos Kranas, D. Kyriazis, A. Lophatananon, Shwetambara Malwade, G. Marinos, Fabio Melillo, Vicent Moncho Mas, K. Muir, M. Nieroda, A. Nigro, C. Pandolfo, M. Patiño-Martínez, Florin Picioroaga, Aristodemos Pnevmatikakis, S. Syed-Abdul, T. Tomson, D. Vicheva, U. Wajid","doi":"10.1109/ISCC53001.2021.9631475","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631475","url":null,"abstract":"Scientific and clinical research have advanced the ability of healthcare professionals to more precisely define diseases and classify patients into different groups based on their likelihood of responding to a given treatment, and on their future risks. However, a significant gap remains between the delivery of stratified healthcare and personalization. The latter implies solutions that seek to treat each citizen as a truly unique individual, as opposed to a member of a group with whom they share common risks or health-related characteristics. Personalisation also implies an approach that takes into account personal characteristics and conditions of individuals. This paper investigates how these desirable attributes can be developed and introduces a holistic environment, the iHELP, that incorporates big data management and Artificial Intelligence (AI) approaches to enable the realization of data-driven pathways where awareness, care and decision support is provided based on person-centric early risk prediction, prevention and intervention measures.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115938594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUI 一个轻量级的可扩展的面向代理的带有GUI的LoRaWAN模拟器
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631494
Mi Chen, L. Mokdad, J. Ben-othman, J. Fourneau
{"title":"MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUI","authors":"Mi Chen, L. Mokdad, J. Ben-othman, J. Fourneau","doi":"10.1109/ISCC53001.2021.9631494","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631494","url":null,"abstract":"As one of the LPWAN categories, LoRaWAN attracts great attention on IoT and M2M communication. It offers a comprehensive area communication network solution with a low data rate and low power consumption. Many research works on medium scheduling or resource allocation have been proposed to improve network performance. However, with many devices in the network, it is sometimes too difficult to deploy a test-bed to evaluate the network performance in the industry. However, different studies often use different simulators. Thus, it is also challenging to study the impact of different algorithms on the network by simulation. Thus, an extendable simulator becomes necessary for both industrial networks deploying and academic study. In this paper, we developed a lightweight, extendable simulator exclusive to LoRaWAN named MULANE. We also offered a GUI is to simplify the simulation process. Moreover, the simulator is agent-oriented, making the research works implementation easier by creating new agents,","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115113965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Improving Fuzzer Efficiency for the MQTT Protocol 提高MQTT协议模糊器效率的探讨
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631520
Luis Gustavo Araujo Rodriguez, D. Batista
{"title":"Towards Improving Fuzzer Efficiency for the MQTT Protocol","authors":"Luis Gustavo Araujo Rodriguez, D. Batista","doi":"10.1109/ISCC53001.2021.9631520","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631520","url":null,"abstract":"MQTT's security has been a major concern because of its weak protocol implementations. Over the last few years, several fuzzing frameworks have been proposed to mitigate this issue. However, these frameworks lack sufficient knowledge of MQTT's specifications, requiring a considerable amount of network packets to cover all of its features and functionality. In this paper, we explain how to improve the efficiency of fuzzing frameworks for MQTT by using a grammar based on its specifications. Although defining a grammar is time-consuming and complex, these drawbacks are overshadowed by its benefits, such as deep state exploration and efficiency. Our improvements are implemented in MQTTGRAM, a new grammar-based fuzzer for MQTT. Due to these improvements, MQTTGRAM offers higher code coverage with significantly fewer packets than existing MQTT fuzzers. For instance, MQTTGRAM exchanges up to 9x fewer packets than its counterparts without reducing the line coverage.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127732590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-Based Strategy to Avoid Fake AI in eHealth Scenarios with Reinforcement Learning 基于区块链的策略,通过强化学习避免电子健康场景中的虚假人工智能
2021 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2021-09-05 DOI: 10.1109/ISCC53001.2021.9631523
Armando Ruggeri, R. D. Salvo, M. Fazio, A. Celesti, M. Villari
{"title":"Blockchain-Based Strategy to Avoid Fake AI in eHealth Scenarios with Reinforcement Learning","authors":"Armando Ruggeri, R. D. Salvo, M. Fazio, A. Celesti, M. Villari","doi":"10.1109/ISCC53001.2021.9631523","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631523","url":null,"abstract":"Every year the healthcare sector suffers from incorrect therapies and an increasing number of patients analysis, which causes congestion in the hospitals and, potentially, worsening of patient's clinical conditions. Extending the concept of the Decision Support System already investigated by the authors, this work advances the state of the art of Reinforcement Learning (RL) via Markov Decision Process formulation, considering an agent acting in his environment motivated by the achievement of the maximum individual objective by appropriate incentives. Transparency, security and privacy of the model are guaranteed by the adoption of Blockchain to enhance the perception of safety around medical operators improving access to hospital services. Experiments focused on the Smart Contract execution time and resources usage have proved the goodness of the proposed model considering both private and public Blockchain configurations.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126917421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信