2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)最新文献

筛选
英文 中文
Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning 基于异常行为的Shodan和Censys-Like扫描检测
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993960
Seungwoon Lee, Seung-Hun Shin, B. Roh
{"title":"Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning","authors":"Seungwoon Lee, Seung-Hun Shin, B. Roh","doi":"10.1109/ICUFN.2017.7993960","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993960","url":null,"abstract":"Shodan and Censys, also known as IP Device search engines, build searchable databases of internet devices and networks. Even these tools are useful for security, those also can provide the vulnerabilities to malicious users. To prevent the information disclosure of own IP devices on those search engines, a fundamental solution is blocking the access from the scanners of them. Therefore, it is needed to understand and consider their scanning mechanism. Therefore, we propose an abnormal behavior based scan detection of Shodan and Censys. To do this, several traditional scan detection approaches are combined and applied to satisfy their specification. Proposed idea is monitoring packets whether it is abnormal or not and adding on the suspicious list if it is. This is based on traditional threshold approaches. To figure out it is abnormal, stateful TCP stateful packet inspection is used. The response behavior during the connection can be identified with TCP flag and abnormal behavior can be classified with SYN Scan, Banner Grabbing, and Combined SYN and Banner Grabbing. Demonstration is simulated in a Censys-like environment and detected time variation per variance of distributed detectors and Threshold value is analyzed.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A novel mobility aware downlink scheduling algorithm for LTE-A networks 一种新的LTE-A网络移动感知下行调度算法
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993798
Önem Yildiz, R. Sokullu
{"title":"A novel mobility aware downlink scheduling algorithm for LTE-A networks","authors":"Önem Yildiz, R. Sokullu","doi":"10.1109/ICUFN.2017.7993798","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993798","url":null,"abstract":"The Long Term Evolution-Advanced (LTE-A) standard brings together different data and voice communication technologies and allows for the integration of more versatile users and services. To meet the users' needs for high resource demand efficiently, resource scheduling algorithms become even more important, in order to balance good system performance in terms of high throughput and fairness. In this paper, a new Mobility Aware downlink Scheduling algorithm (MAS) is proposed and compared with Round Robin and Best-CQI algorithms in terms of throughput, fairness and Block Error Rate (BLER). Simulation results show that the MAS algorithm not only provides a good balance between throughput and fairness parameters but is also quite robust to mobility.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123764621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN IEEE 802.11ac客户端到服务器WLAN中安全性对带宽和延迟的影响
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993928
S. S. Kolahi, A. Almatrook
{"title":"Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN","authors":"S. S. Kolahi, A. Almatrook","doi":"10.1109/ICUFN.2017.7993928","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993928","url":null,"abstract":"In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of IPv4 and IPv6 on average decreased by 16.79% and 10.22% respectively. Throughput for UDP is decreased by 18.07% and 12.99% for IPv4 and IPv6 respectively. For both IPv4 and IPv6, WPA2 wireless security implementation also increases the round trip time (RTT) and CPU Utilization for both TCP and UDP.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122604211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A robust and lightweight name resolution approach for IoT data in ICN ICN中物联网数据的强大且轻量级的名称解析方法
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993748
Lijun Dong, Guoqiang Wang
{"title":"A robust and lightweight name resolution approach for IoT data in ICN","authors":"Lijun Dong, Guoqiang Wang","doi":"10.1109/ICUFN.2017.7993748","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993748","url":null,"abstract":"One discriminating characteristics of data in the Internet of Things (IoT) applications is that it may have multiple producers (e.g. many sensor devices deployed in an area to sense the same information). It is very important that the name resolution service is able to provide the proper producer selection based on client's criteria and the producers' contextual information. The paper proposes a robust and lightweight name resolution approach for IoT data in Information Centric Networking, which is considered to be one of the most promising architectures for future Internet as well as future IoT. The paper considers that each content has a Home Node, which acts as the only host virtually to the rest of the network. The paper discusses the procedures for Home Node adjustment due to the appearance of a new producer or disappearance of an existing producer. It also presents the solution for Home Node recovery when failure happens. The paper analyzes the advantages of the proposed approach, such as significantly less update message overhead, efficient storage usage and resilience to node failure.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133728930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BlockNDN: A bitcoin blockchain decentralized system over named data networking blockkndn:一个比特币区块链去中心化的数据网络系统
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993751
Tong Jin, Xiang Zhang, Yirui Liu, Kai Lei
{"title":"BlockNDN: A bitcoin blockchain decentralized system over named data networking","authors":"Tong Jin, Xiang Zhang, Yirui Liu, Kai Lei","doi":"10.1109/ICUFN.2017.7993751","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993751","url":null,"abstract":"Blockchain provides a new approach for participants to maintain reliable databases in untrusted networks without centralized authorities. However, there are still many serious problems in real blockchain systems in IP network such as the lack of support for multicast and the hierarchies of status. In this paper, we design a bitcoin-like blockchain system named BlockNDN over Named Data Networking and we implement and deploy it on our cluster as well. The resulting design solves those problems in IP network. It provides completely decentralized systems and simplifies system architecture. It also improves the weak-connectivity phenomenon and decreases the broadcast overhead.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Industrial control system security framework for ethiopia 埃塞俄比亚工业控制系统安全框架
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993912
A. Berhe, Ki-Hyung Kim, Gebere Akele Tizazu
{"title":"Industrial control system security framework for ethiopia","authors":"A. Berhe, Ki-Hyung Kim, Gebere Akele Tizazu","doi":"10.1109/ICUFN.2017.7993912","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993912","url":null,"abstract":"ICSs are typically used in Ethiopia in industries such as electric, water, sugar factories and different discrete types of manufacturing industries. These control a system which includes supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCS) are critical to the operation of Ethiopian critical infrastructures that are becoming highly interconnected and mutually dependent systems. It is important to note that most of the nation's critical infrastructures and industrial processes mentioned above are publicly owned and operated. Thus, to minimize the risks of critical systems, preparing industrial control system security framework by considering Ethiopian Context is a must. In this paper, we prepare ICS security framework based on industry good practice from the fields of ICS and IT security and aims to help organizations address the challenges of increased use of standard IT technologies in the ICS environment. The paper provides recommended ICS security architecture, network security and communication protocol in the context of Ethiopian ICS requirement.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116054484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An automated testing method for AUTOSAR software components based on SiL simulation 基于SiL仿真的AUTOSAR软件组件自动化测试方法
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993793
Sooyong Jeong, W. Lee
{"title":"An automated testing method for AUTOSAR software components based on SiL simulation","authors":"Sooyong Jeong, W. Lee","doi":"10.1109/ICUFN.2017.7993793","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993793","url":null,"abstract":"Testing automotive software using Software-in-the-Loop (SiL) simulation doesn't require the hardware such as test vehicles and ECUs. Existing testing techniques based on SiL rely on manual processes because automation techniques of testing AUTOSAR components using SiL simulation have not yet been established. In this paper, we present an automated testing technique and its implementation based on SiL simulation. We have evaluated the effectiveness and efficiency of the presented technique through a case study.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116153902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of IPSec security on VoIP in different environments 不同环境下IPSec安全对VoIP的影响
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993945
S. S. Kolahi, Keysha Mudaliar, Cheng Zhang, Zhizhong Gu
{"title":"Impact of IPSec security on VoIP in different environments","authors":"S. S. Kolahi, Keysha Mudaliar, Cheng Zhang, Zhizhong Gu","doi":"10.1109/ICUFN.2017.7993945","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993945","url":null,"abstract":"In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput are almost same for both operating systems. CPU usage was higher on both operating systems with IPsec enabled and the results for RTT and Jitter were inconsistent. In general, the results indicated that Fedora 16 performance was better than Windows 7. The results show that although IPSec can add security, it can reduce the VoIP performance in terms of higher delay and higher CPU usage.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132525696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The virtualized MPTCP proxy performance in cellular network 蜂窝网络中虚拟化MPTCP代理性能研究
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993881
Sunyoung Chung, Seonghoon Moon, Songkuk Kim
{"title":"The virtualized MPTCP proxy performance in cellular network","authors":"Sunyoung Chung, Seonghoon Moon, Songkuk Kim","doi":"10.1109/ICUFN.2017.7993881","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993881","url":null,"abstract":"For massive traffic handling in the cellular network, network function virtualization (NFV) is considered to be the most cost-efficient solution in the 5G networks. Since NFV decouples the network function from the underlying hardware, the purpose-built machines can be replaced by the commodity hardware. However, NFV might suffer from the very fact that it is a solely software-based solution. The objective of this paper is to find out the NFV performance issue in cellular network. Also, we want to investigate whether NFV is comparable with MPTCP connections. Since not many servers are MPTCP-enabled, a SOCKS proxy is usually deployed in between to enable MPTCP connections. We regarded a virtualized proxy as an NFV instance and set up two types of virtualized SOCKS proxies, one as KVM and the other as docker. We also tried to find out if there is a performance difference between hypervisor-based and container-based virtualization in our setting. As the results show, the docker proxy performs better than the KVM proxy. In terms of resource consumption, for example, the docker utilized 31.9% of host CPU, whereas the KVM consumed 36.9% when both of them handling 2,000 concurrent requests. The throughput comparison of different TCP connections reflects the characteristics of MPTCP flow that performs best in a long and large flow. The latency between the server and the proxy determined the throughput of MPTCP with a virtualized proxy. If the latency between the server and the proxy gets larger (RTT 100ms), the MPTCP proxy throughput of all three different flow got worse than the single TCP connections, whether it is a short flow (1KB) or a long flow (164MB). However, if the latency is in the middle range (RTT 50ms), the MPTCP proxy throughput of a short (1KB) and medium (900KB) flow works poorly, but a long flow (164MB) still works better than the single TCP connections.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An evaluation of quality metrics for 360 videos 对360度视频质量指标的评估
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-04 DOI: 10.1109/ICUFN.2017.7993736
Huyen T. T. Tran, N. P. Ngoc, Cuong Manh Bui, Minh Hong Pham, T. Thang
{"title":"An evaluation of quality metrics for 360 videos","authors":"Huyen T. T. Tran, N. P. Ngoc, Cuong Manh Bui, Minh Hong Pham, T. Thang","doi":"10.1109/ICUFN.2017.7993736","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993736","url":null,"abstract":"360 videos are becoming more and more popular on video streaming platforms. However, a good quality metric for 360 videos is still an open issue. In this work, we investigate both objective and subjective quality metrics for 360 videos. The goals are to understand the perceived quality range provided by existing mobile 360 videos and, especially, to identify appropriate objective quality metrics for 360 video communications. To that end, a subjective test is conducted in this study. Then, the relationship between objective quality and subjective quality is investigated. Especially, ten objective quality measures are computed, considering the coding distortion measurement, cross-format distortion measurement, and end-to-end distortion measurement. It is found that most of the objective quality measures are well correlated with subjective quality. Also, among the evaluated quality measures, PSNR is shown to be the most appropriate for 360 video communications.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信