{"title":"Energy Depletion Attack Against Routing Protocol in the Internet of Things","authors":"Cong Pu","doi":"10.1109/CCNC.2019.8651771","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651771","url":null,"abstract":"Low power and lossy networks (LLNs) are undeniably vulnerable to various Denial-of-Service (DoS) attacks due to the shared wireless medium, the lack of physical protection, and instinctive resource constraints. In this paper, we propose a misbehavior-aware threshold detection scheme, called MAD, against energy depletion attack in RPL-based LLNs, where a malicious node intentionally generates and sends a large number of packets to legitimate nodes to excessively consume the energy resource of intermediate nodes located along the forwarding paths, and finally makes the resource-constrained network suffer from denial of service. In the MAD, each node maintains a count of the number of received packets from its child node within a specific time window, and then compares the count with a dynamically calculated threshold to detect potential malicious node. We conduct extensive simulation experiments for performance evaluation and comparison with the original RPL with and without adversary, respectively. The simulation results show that the proposed scheme is a viable approach against energy depletion attack in RPL-based LLNs.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115248494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maxime Labonne, Alexis Olivereau, Baptiste Polvé, D. Zeghlache
{"title":"A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection","authors":"Maxime Labonne, Alexis Olivereau, Baptiste Polvé, D. Zeghlache","doi":"10.1109/CCNC.2019.8651856","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651856","url":null,"abstract":"An ensemble learning approach for classification in intrusion detection is proposed. Its application to the KDD Cup 99 and NSL-KDD datasets consistently increases the classification accuracy compared to previous techniques. The cascade-structured meta-specialists architecture is based on a three-step optimization method: data augmentation, hyperparameters optimization and ensemble learning. Classifiers are first created with a strong specialization in each specific class. These specialists are then combined to form meta-specialists, more accurate than the best classifiers that compose them. Finally, meta-specialists are arranged in a cascading architecture where each classifier is successively given the opportunity to recognize its own class. This method is particularly useful for datasets where training and test sets differ greatly, as in this case. The cascade-structured meta-specialists approach achieved a very high classification accuracy (94.44% on KDD Cup 99 test set and 88.39% on NSL-KDD test set) with a low false positive rate (0.33% and 1.94% respectively).","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Device-to-Device 5G Cellular Communication in the Post-Disaster Scenario","authors":"C. DeepakG., Alexandros Ladas, C. Politis","doi":"10.1109/CCNC.2019.8651832","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651832","url":null,"abstract":"The wireless communication is an integral part of the society, however, wireless network infrastructure may not fully function during post-disaster wireless network scenario in which we need wireless services even more than normal circumstances. In such post-disaster scenarios, the base stations (BS) could possibly be dysfunctional or overloaded by an excessive number of user calls or data, whereas user terminals are likely to be partially connected to or fully isolated from the BS radio signals. In this paper, we study the network behavior during the post-disaster when BSs undergo the thinning process due to the damage to the network infrastructure. During network recovery phase, we also study the network performance when new temporary BSs are distributed which will bring the network into BS superposition phase. Furthermore, Device-to-Device (D2D) assisted cellular communication helps to increase the link level network connectivity which is highly appreciated during post- disaster network scenario because the network coverage is more desirable than the network throughout in such cases. We also present the analytical study of D2D and cellular communication and show that it will effectively increase the network coverage which may ultimately save many lives during the golden hours of post-disaster phase.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128335089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kurdi, Ghada A. K. Al-Hudhud, M. Al-Dawod, Wafa Al-Shaikh, Lina Altoaimy
{"title":"Service-Sharing Approach Using a Mutual Exclusion Algorithm for Smart Cashier Systems","authors":"H. Kurdi, Ghada A. K. Al-Hudhud, M. Al-Dawod, Wafa Al-Shaikh, Lina Altoaimy","doi":"10.1109/CCNC.2019.8651826","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651826","url":null,"abstract":"Service sharing is an important problem in distributed systems, where it affects wait time and allows for the equal use of services by a group of nodes. Mutual exclusion provides an appropriate sharing technique of a critical section (CS) among nodes by the priority order. The primary condition of mutual exclusion is that one node can only use one CS at any given time. In real life, queues and cashier services have long wait times that do not consider the priority of each node. The work presented in this paper proposed a token-based approach, which is a type of mutual exclusion that is suitable for smart cashier systems. In addition, a Fairness algorithm for priority process (FAPP) is implemented for minimizing wait time, decreasing queue length, and promoting fair CS use. The system performance evaluation based on the experiments performed proves the superiority of the proposed algorithm over the first-in-first-out (FIFO) approach in terms of reducing the waiting time.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127622844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient relay selection over fading channels","authors":"R. Milocco, P. Mühlethaler, S. Boumerdassi","doi":"10.1109/CCNC.2019.8651688","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651688","url":null,"abstract":"In this work, we use the energy consumed by one bit of information per meter toward the destination as a local metric to be minimized in channels affected by shadow fading. Given a fixed amount of energy available for transmitting information, the proposed strategy consists in maximizing the amount of information delivered within a given time interval by optimizing both the transmission rate and power.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122009222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Joint Offloading and Resource Allocation Scheme for Mobile Edge Computing","authors":"Boutheina Dab, N. Aitsaadi, R. Langar","doi":"10.1109/CCNC.2019.8651879","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651879","url":null,"abstract":"Recently Mobile Edge Computing (MEC) promises a great latency reduction by pushing mobile computing and storage to the network edge. MEC solutions allows the intensive applications to be computed in nearby servers at the edge. In this work, we envision a multi-user WiFi-based MEC architecture. We tackle the problem of joint task assignment and resource allocation. The main objective of our scheme is to minimize the energy consumption on the mobile terminal side under the application latency constraint. Based on extensive simulations conducted in NS3 while considering real input traces, we show that our approach outperforms the related prominent strategies in terms of: i) energy consumption and ii) completion delay.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thidarut Junjalearnvong, Ryota Okumura, K. Mizutani, H. Harada
{"title":"Performance Evaluation of Multi-hop Network Configuration for Wi-SUN FAN Systems","authors":"Thidarut Junjalearnvong, Ryota Okumura, K. Mizutani, H. Harada","doi":"10.1109/CCNC.2019.8651777","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651777","url":null,"abstract":"Wireless Smart Utility Network Field Area Network (Wi-SUN FAN) is one of the Wi-SUN profiles that is expected to be adopted by many smart devices in advanced smart city infrastructures to provide Machine-to-Machine (M2M) communication in Low power and Lossy Networks (LLNs). The physical and data link layer of Wi-SUN FAN systems is complied with IEEE 802.15.4-2015 to perform multi-hop data transmission. Currently, the implementation of Wi-SUN FAN devices has been initiated. However, the Wi-SUN FAN devices face a serious problem of very slow network configuration. In this paper, the multi-hop network configuration time of the current Wi-SUN FAN devices is measured by the experiment to analyze the factors that cause the slow configuration. The optimization scheme to accelerate the configuration process is discussed and the instant response configuration scheme that further reduces the configuration time is proposed. In addition, the computer simulation is performed to study the trade-off relationship between the configuration time and the percentage of time used in the configuration process. Finally, the appropriate values of the configuration parameters that can complete the configuration process in each hop within 1 minute while minimally deteriorate the transmission performance in both conventional and proposed configuration schemes are determined.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bruno Donassolo, Ilhem Fajjari, Arnaud Legrand, P. Mertikopoulos
{"title":"Demo: Fog Based Framework for IoT Service Orchestration","authors":"Bruno Donassolo, Ilhem Fajjari, Arnaud Legrand, P. Mertikopoulos","doi":"10.1109/CCNC.2019.8651852","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651852","url":null,"abstract":"In recent years, Fog computing paradigm has received the attention of academic and industrial communities. By offering nearby computational, storage and network resources, this new architecture deals with the explosion of IoT (Internet of Things) traffic while responding to the stringent requirements of new applications. Unfortunately, as of today, there is a lack of practical solutions to enable the exploitation of this novel paradigm. To deal with this shortcoming, this demo gives an insight into FITOR, our proposed orchestration system for IoT applications in Fog. Our solution makes use of both Grid5000 [1] and FIT/IoT-LAB [2] to build a realistic fog environment. FITOR is responsible for the orchestration of micro-service based IoT applications while making use of a holistic monitoring of the fog infrastructure.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Advanced Coordination Protocol for Safer and more Efficient Lane Change for Connected and Autonomous Vehicles","authors":"John A. Hodgkiss, S. Djahel, Y. H. Aoul","doi":"10.1109/CCNC.2019.8651668","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651668","url":null,"abstract":"In this paper we will explore novel ways of utilizing inter-vehicle and vehicle to infrastructure communication technology to achieve a safe and efficient lane change manoeuvre for Connected and Autonomous Vehicles (CAVs). The need for such new protocols is due to the risk that every lane change manoeuvre brings to drivers and passengers lives in addition to its negative impact on congestion level and resulting air pollution, if not performed at the right time and using the appropriate speed. To avoid this risk, we design two new protocols, one is built upon and extends an existing protocol, and it aims to ensure safe and efficient lane change manoeuvre, while the second is an original lane change permission management solution inspired from mutual exclusion concept used in operating systems. This latter complements the former by exclusively granting lane change permissions in a way that avoids any risk of collision. Both protocols are being implemented using computer simulation and the results will be reported in a future work.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taichi Miya, Kohta Ohshima, Yoshiaki Kitaguchi, K. Yamaoka
{"title":"The Upper Limit of Flow Accommodation under Allowable Delay Constraint in HANETs","authors":"Taichi Miya, Kohta Ohshima, Yoshiaki Kitaguchi, K. Yamaoka","doi":"10.1109/CCNC.2019.8651741","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651741","url":null,"abstract":"For HANETs, it is important to integrate independent MANETs and operate them as one system. Moreover, communications with a time restriction have recently been increasing, so it is necessary to discuss about delay reduction in the field of HANETs. In this paper, we discuss the upper limit of flow accommodation under an allowable delay constraint. We suggest using the result as a performance evaluation index for routing algorithms for HANETs.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}