{"title":"AVAIN - a Framework for Automated Vulnerability Indication for the IoT in IP-based Networks","authors":"Rolf Egert, Tim Grube, Dustin Born, M. Mühlhäuser","doi":"10.1109/NetSys.2019.8854493","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854493","url":null,"abstract":"With the rapidly increasing number of IoT-devices and their extensive integration into people's daily lives, the security of those devices is of primary importance. To achieve early detection of vulnerabilities, network scanner tools are frequently used. However, most of those tools are highly specialized; thus, multiple tools and a meaningful correlation between their results are required to obtain adequate information about vulnerabilities. To simplify this process, we propose AVAIN, a modular framework facilitating automated network reconnaissance and vulnerability indication in IP-based networks.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Lieser, Nils Richerzhagen, Simon Luser, Björn Richerzhagen, R. Steinmetz
{"title":"Understanding the Impact of Message Prioritization in Post-Disaster Ad Hoc Networks","authors":"Patrick Lieser, Nils Richerzhagen, Simon Luser, Björn Richerzhagen, R. Steinmetz","doi":"10.1109/NetSys.2019.8854517","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854517","url":null,"abstract":"In the aftermath of disasters, access to communication infrastructure is often impaired or fully unavailable. Smartphone-based ad hoc networks can be utilized to re-enable basic communication services and foster coordination and self-help capabilities of those affected. However, their capacity is limited as they need to operate in a disruption-tolerant fashion. At the same time, the communication demand increases significantly after a disaster, potentially overloading the ad hoc network and requiring message prioritization mechanisms. In this work, we contribute insights into the communication behavior and resource demand in a post-disaster ad hoc network based on a large field trial and a survey of related works. We identify—potentially undesired—interactions between delay-tolerant networks (DTNs) with message prioritization and the specific dynamics of a disaster scenario. To study these interactions in greater detail, we propose a generic architecture for the evaluation of prioritized DTNs in disaster scenarios. We identify key issues w.r.t. static and adaptive prioritization approaches based on a proof-of-concept evaluation and outline directions for future research on prioritization in DTNs.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117241304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabien Geyer, Holger Kinkelin, H. Leppelsack, Stefan Liebald, D. Scholz, G. Carle, D. Schupke
{"title":"Performance Perspective on Private Distributed Ledger Technologies for Industrial Networks","authors":"Fabien Geyer, Holger Kinkelin, H. Leppelsack, Stefan Liebald, D. Scholz, G. Carle, D. Schupke","doi":"10.1109/NetSys.2019.8854512","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854512","url":null,"abstract":"Blockchain-based Distributed Ledger Technology (DLT) is a novel paradigm to create tamper-resistant execution environments and data storage for distributed applications on top of a peer-to-peer network. This technology has shown to be of interest in many use-cases, especially in industrial processes where multiple shareholders would like to process and share data in a secure and accountable way. In this work, we evaluate the performance of a DLT-based system via modeling and a quantitative performance evaluation, focusing on the impact of the underlying communication network. Our numerical evaluation is based on the Hyperledger Fabric DLT framework, its benchmarking tool Caliper, and a dedicated test bed, where network properties such as latency or packet loss can be artificially influenced. Our experiments show that the validation of the transactions in a DLT-based system is the main contributor in the transaction latency. We also demonstrate that the properties of the communication network can influence the performance largely, even in the case where only one of the participants in the DLT system has poor network access.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130166857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stephan M. Günther, Maurice Leclaire, Maximilian Riemensberger, G. Carle, W. Utschick
{"title":"Bidirectional Network Coding in Wireless Networks","authors":"Stephan M. Günther, Maurice Leclaire, Maximilian Riemensberger, G. Carle, W. Utschick","doi":"10.1109/NetSys.2019.8854525","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854525","url":null,"abstract":"In this paper we introduce our Network Coding Module (NCM) for bidirectional random linear network coding in wireless networks. It is based on our low-level frame injection library libmoep, which allows to easily implement custom link-layer protocols. Originally intended for IEEE 802.11 only, it meanwhile also supports wired Ethernet-based networks. We evaluate the NCM in a wireless testbed with and without relay. For both cases we derive optimal packet injection rates and perform tests with TCP. The source code of this paper is made available for download under the GPLv2 at [1].","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bertram Schütz, Stefanie Thieme, N. Aschenbruck, Leonhard Brüggemann, Alexander Ditt, Dominic Laniewski, Dennis Rieke
{"title":"Link 'em: An Open Source Link Emulation Bridge for Reproducible Networking Research","authors":"Bertram Schütz, Stefanie Thieme, N. Aschenbruck, Leonhard Brüggemann, Alexander Ditt, Dominic Laniewski, Dennis Rieke","doi":"10.1109/NetSys.2019.8854509","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854509","url":null,"abstract":"This paper presents link 'em, an open source link emulation bridge for reproducible networking research. While reproducibility is one keystone of good research, most available link emulators are lacking crucial features or are prohibitively expensive. Link 'em is a Raspberry Pi-based layer-2 bridge that runs an extended version of netem in conjunction with a trace database to achieve reproducible link emulation. By invoking our novel packet loss module, which builds upon sagemath and NetfilterQueue, more sophisticated packet loss models can be used in addition to netem's existing ones. The proposed demonstration verifies the achieved reproducibility. This is done by showing the effects of a model-based link emulation via netem and a trace-based emulation using our link 'em bridge on a video live stream, compared to a pre-captured reference stream.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129872161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harald Klaus, Felicitas Hetzelt, P. Hofmann, Andreas Blecker, Daniela Schwaiger
{"title":"Challenges and Solutions for Industry-Grade Secure Connectivity","authors":"Harald Klaus, Felicitas Hetzelt, P. Hofmann, Andreas Blecker, Daniela Schwaiger","doi":"10.1109/NetSys.2019.8854501","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854501","url":null,"abstract":"This contribution discusses challenges and solutions for secure communication that are relevant for the success of the Industry 4.0 paradigm. It shows that IT security has to be solved with respect to the technical challenges of hardware or software components to be used in the Industry 4.0 context. Aditionally, the paper highlights the organizational challenge to reduce security risks to a minimum during the complete industrial life cycle.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114575607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keerthana Govindaraj, Mamia Saha, A. Artemenko, A. Kirstaedter
{"title":"Investigation of Uninterrupted Service Live Migration Using Software-Defined Networking","authors":"Keerthana Govindaraj, Mamia Saha, A. Artemenko, A. Kirstaedter","doi":"10.1109/NetSys.2019.8854521","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854521","url":null,"abstract":"The vision of Industry 4.0 is to enable a highly dynamic and flexible manufacturing system. Nevertheless, an uninterrupted and reliable service needs to be ensured to fulfill the safety requirements of the industrial applications. The latest advancements in technologies such as wireless connectivity, hardware virtualization, application offloading, etc. aims to cater to most of these requirements. Moreover, a new paradigm called Edge Computing is becoming a preferred solution to fulfil the latency and availability requirements of the Industry 4.0 applications. However, the dynamic resource management and automated service provisioning remains to be an open challenge in an environment with constantly varying requirements. Service migration is a part of dynamic resource management that enables repositioning of a service from one computation entity, which is e.g., overloaded and cannot satisfy the user requirements, to another computation entity. An uninterrupted service live migration is necessary to satisfy the low latency and high availability requirements of mobile devices on the factory floor. In this paper we introduce and investigate a new approach for an uninterrupted service live migration.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Falk, David Hellmanns, Ben W. Carabelli, N. Nayak, Frank Dürr, Stephan Kehrer, K. Rothermel
{"title":"NeSTiNg: Simulating IEEE Time-sensitive Networking (TSN) in OMNeT++","authors":"Jonathan Falk, David Hellmanns, Ben W. Carabelli, N. Nayak, Frank Dürr, Stephan Kehrer, K. Rothermel","doi":"10.1109/NetSys.2019.8854500","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854500","url":null,"abstract":"IEEE 802.1 Time-sensitive Networking (TSN) enables real-time communication with deterministically bounded network delay and jitter over standard IEEE 802.3 networks (“Ethernet”). In particular, TSN specifies a time-triggered scheduling mechanism in IEEE Std 802.1Qbv implemented by switches to control when outgoing queues get access to switch ports. Besides this time-triggered scheduling mechanism, other scheduling mechanisms can be active in the network at the same time including priority queuing and a credit-based shaper. Moreover, further supporting mechanisms such as the possibility to interrupt frames already in transmission (frame preemption) are specified by the TSN standards. Overall, this leads to a complex network infrastructure transporting both, real-time and non-real-time traffic in one converged network, making it hard to analyze the behavior of converged networks. To facilitate the analysis of TSN networks, we present TSN-specific extensions to the popular OMNeT++/INET framework for network simulations in this paper including, in particular, the time-triggered scheduling mechanism of IEEE Std 802.1Qbv. Besides the design of the TSN simulator, we present a proof-of-concept implementation and exemplary evaluation of TSN networks.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trung V. Phan, Mehrdad Hajizadeh, N. Khai, T. Bauschert
{"title":"Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks","authors":"Trung V. Phan, Mehrdad Hajizadeh, N. Khai, T. Bauschert","doi":"10.1109/NetSys.2019.8854510","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854510","url":null,"abstract":"In this paper, we propose a destination-aware adaptive traffic flow rule aggregation (DATA) mechanism for facilitating traffic flow monitoring in SDN-based networks. This method adapts the number of flow table entries in SDN switches according to the level of detail of traffic flow information that other mechanisms (e.g. for traffic engineering, traffic monitoring, intrusion detection) require. It also prevents performance degradation of the SDN switches by keeping the number of flow table entries well below a critical level. This level is not preset as a hard threshold but learned during operation by using a machine-learning based algorithm. The DATA method is implemented within a RESTful application (DATA App) which monitors and analyzes the ongoing network traffic and provides instructions to the SDN controller to adapt the traffic flow matching strategies accordingly. A thorough performance evaluation of DATA is conducted in an SDN emulation environment. The results show that—compared to the default behavior of common SDN controllers—the proposed DATA approach yields significant SDN switch performance improvements while still providing detailed traffic flow information on demand.","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Karimzadeh, Florian Gerber, Zhongliang Zhao, T. Braun
{"title":"Pedestrians Trajectory Prediction in Urban Environments","authors":"M. Karimzadeh, Florian Gerber, Zhongliang Zhao, T. Braun","doi":"10.1109/NetSys.2019.8854506","DOIUrl":"https://doi.org/10.1109/NetSys.2019.8854506","url":null,"abstract":"Increasing adoption of cellular phones equipped with global positioning system (GPS) chips enables the exploration of pedestrians' mobility patterns. Tasks such as discovering hot-spots in large cities can be addressed through the usage of accumulated GPS coordinates. In this work we utilize spatiotemporal analysis on collected geo-location points to discover Zone of Interests (ZOIs) of pedestrians in large cities to understand people's dynamics. We design an adaptive Markov model to forecast long distance trajectories of pedestrians, which adapts it's behavior constantly by switching from a first or second order Markov chain based on the quality of trace data and users' mobility patterns. From the predicted trajectories, we further introduce a mechanism to predict congested trajectories by estimating the number of pedestrians, who may take the same trajectory in a future moment. We conduct comprehensive empirical experiments using a real-life dataset, namely the Mobile Data Challenge (MDC) dataset with 185 participants. Our mechanisms can deliver a satisfactory pedestrian trajectory prediction with a precision of 86% and a recall of 84% .","PeriodicalId":291245,"journal":{"name":"2019 International Conference on Networked Systems (NetSys)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}