2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

筛选
英文 中文
Limited Size Lossy Compression for WSNs 无线传感器网络的有限大小有损压缩
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843510
Sanku Kumar Roy, I. Nikolaidis
{"title":"Limited Size Lossy Compression for WSNs","authors":"Sanku Kumar Roy, I. Nikolaidis","doi":"10.1109/LCN53696.2022.9843510","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843510","url":null,"abstract":"We consider the problem of lossy compression of time series data collected by wireless sensor nodes, such that it produces a limited volume of compressed data for a given amount of raw data. The lossy compression is performed in a manner that minimizes the resulting L∞ reconstruction error. Producing a bounded volume of compressed data is desirable in circumstances where we wish to know, or limit, the rate at which the compressed data are communicated, e.g., for periodic communication scheduling of fixed payload transmissions. The work is also geared to understanding the impact of, and accommodating for, storage limitations of Wireless Sensor Network (WSN) nodes. The proposed scheme belongs to the class of piecewise linear approximations (PLAs) and its performance is compared to other PLA schemes proposed for WSNs. The evaluation is carried out using existing public data sets.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network 面向车联网多层视频流的高性价比分布式边缘车辆选择
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843472
Roy Chowdhury, Sukumar Nandi, D. Goswami
{"title":"Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network","authors":"Roy Chowdhury, Sukumar Nandi, D. Goswami","doi":"10.1109/LCN53696.2022.9843472","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843472","url":null,"abstract":"Video traffic demands for vehicle infotainment services have rapidly increased in recent years. To reduce bandwidth costs and delays, content distributors (CD) use edge vehicles to distribute video contents over vehicular networks. CDs usually offer multiple subscription tiers of varying video qualities for their clients. A CD’s business goal is to make a minimal edge vehicle selection to maximize Internet traffic offloading while satisfying heterogeneous video quality requirements of clients belonging to different subscription tiers. This work proposes an optimum cost-effective solution for edge vehicle selection for delay-constrained live video streaming over vehicular networks with multi-tier bitrate agreements. The edge vehicle selection problem is formulated as the minimum set covering problem for optimum results, and a distributed approximation solution is proposed to increase scalability. Simulation results show that the proposed solution is cost-effective for CDs and saves significant control message overhead while satisfying delay constraints and multi-tier bitrate agreements.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127686226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRA: Leveraging AF_XDP for Programmable Network Functions with IPv6 Segment Routing SRA:利用AF_XDP可编程网络功能与IPv6段路由
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843244
Baosen Zhao, Yifang Qin, Wanghong Yang, Pengfei Fan, Xu Zhou
{"title":"SRA: Leveraging AF_XDP for Programmable Network Functions with IPv6 Segment Routing","authors":"Baosen Zhao, Yifang Qin, Wanghong Yang, Pengfei Fan, Xu Zhou","doi":"10.1109/LCN53696.2022.9843244","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843244","url":null,"abstract":"The IPv6 Segment Routing (SRv6) is a promising solution to support services such as service function chain (SFC) and network function virtualization (NFV). But the SRv6 implementation in the Linux kernel is being criticized for lack of programmability and scalability. In this paper, we present an efficient implementation of the SRv6 data plane based on AF_XDP (SRA) in userspace. By leveraging the AF_XDP supported in the Linux kernel, we implement a high-performance and programmable framework that allows network operators to encode their own network functions. Moreover, these functions can automatically execute in userspace and Linux network namespaces while processing specific packets. In addition, SRA also implements SR-proxy to support the Virtual Network Functions (VNFs) chaining based on SRv6. Experimental results show that SRA achieves high performance and enhances integration with the kernel ecosystem. In all scenarios, SRA processes faster than other implementations, such as the SRv6 implementation in the Linux kernel and SREXT module, and in some scenarios, SRA is even 10 times faster than the SRv6 implementation in the Linux kernel. Meanwhile, the proposed architecture can be easily extended to support new SRv6 behaviors and network functions.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"27 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset 针对船舶雷达系统的网络攻击:分类、模拟环境和数据集
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843801
Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, I. Fink, Marissa Schmidt, Klaus Wehrle, Martin Henze
{"title":"Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset","authors":"Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, I. Fink, Marissa Schmidt, Klaus Wehrle, Martin Henze","doi":"10.1109/LCN53696.2022.9843801","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843801","url":null,"abstract":"Shipboard marine radar systems are essential for safe navigation, helping seafarers perceive their surroundings as they provide bearing and range estimations, object detection, and tracking. Since onboard systems have become increasingly digitized, interconnecting distributed electronics, radars have been integrated into modern bridge systems. But digitization increases the risk of cyberattacks, especially as vessels cannot be considered air-gapped. Consequently, in-depth security is crucial. However, particularly radar systems are not sufficiently protected against harmful network-level adversaries. Therefore, we ask: Can seafarers believe their eyes? In this paper, we identify possible attacks on radar communication and discuss how these threaten safe vessel operation in an attack taxonomy. Furthermore, we develop a holistic simulation environment with radar, complementary nautical sensors, and prototypically implemented cyberattacks from our taxonomy. Finally, leveraging this environment, we create a comprehensive dataset (RadarPWN) with radar network attacks that provides a foundation for future security research to secure marine radar communication.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Best Paper Awards for Prior IEEE LCN Conferences 历届IEEE LCN会议最佳论文奖
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/lcn53696.2022.9843309
{"title":"Best Paper Awards for Prior IEEE LCN Conferences","authors":"","doi":"10.1109/lcn53696.2022.9843309","DOIUrl":"https://doi.org/10.1109/lcn53696.2022.9843309","url":null,"abstract":"","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LCN 2022 Cover Page LCN 2022封面
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/lcn53696.2022.9843383
{"title":"LCN 2022 Cover Page","authors":"","doi":"10.1109/lcn53696.2022.9843383","DOIUrl":"https://doi.org/10.1109/lcn53696.2022.9843383","url":null,"abstract":"","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microservices Configurations and the Impact on the Performance in Cloud Native Environments 微服务配置及其对云原生环境性能的影响
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843385
Mohamed-Anis Mekki, Nassima Toumi, A. Ksentini
{"title":"Microservices Configurations and the Impact on the Performance in Cloud Native Environments","authors":"Mohamed-Anis Mekki, Nassima Toumi, A. Ksentini","doi":"10.1109/LCN53696.2022.9843385","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843385","url":null,"abstract":"Cloud-native rethinks the application architecture by embracing a micro-service approach, where each microservice is packaged into containers to run in a centralized or an edge cloud. When deploying the container running the micro-service, the tenant has to specify the amount of CPU and memory limit to run their workload. However, it is not straightforward for a tenant to know in advance the computing amount that allows running the microservice optimally. This will impact the service performances and the infrastructure provider, particularly if the resource overprovisioning approach is used. To overcome this issue, we conduct in this paper an experimental study aiming to detect if a tenant’s configuration allows running its service optimally. We run several experiments on a cloud-native platform, using different types of applications under different resource configurations. The obtained results provide insights on how to detect and correct performance degradation due to misconfiguration of the service resource.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134552777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Neighbor Selection Strategies in the Wild for CDN/V2V WebRTC Live Streaming: Can we learn what a good neighbor is? CDN/V2V WebRTC直播的邻居选择策略:我们能了解什么是好邻居吗?
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843647
Zhejiayu Ma, Soufiane Rouibia, F. Giroire, G. Urvoy-Keller
{"title":"Neighbor Selection Strategies in the Wild for CDN/V2V WebRTC Live Streaming: Can we learn what a good neighbor is?","authors":"Zhejiayu Ma, Soufiane Rouibia, F. Giroire, G. Urvoy-Keller","doi":"10.1109/LCN53696.2022.9843647","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843647","url":null,"abstract":"A hybrid CDN/Viewer-to-Viewer (V2V) architecture is an attractive solution for HTTP (HLS) and MPEG-DASH-based live streaming providers. It combines a traditional CDN with a V2V overlay for exchanging video fragments, reducing the cost of the CDN while maintaining the quality of experience. This work explores machine learning models to address the key challenge of neighbor selection. Our goal is to predict the connection quality between two arbitrary viewers using features such as locality, access providers, operating systems, past CDN, and V2V throughput. The proposed solutions are validated using an A/B testing approach on our production system, demonstrating a significant improvement in key system metrics compared to the traditional locality-based methods. We observe 17% higher V2V throughput, 26% lower delay, 37% fewer lost chunks, 39% fewer re-buffering, and 20% fewer quality switches.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction and detection model for hierarchical Software-Defined Vehicular Network 分层软件定义车辆网络预测与检测模型
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843483
Houda Amari, L. Khoukhi, Lamia Hadrich Belguith
{"title":"Prediction and detection model for hierarchical Software-Defined Vehicular Network","authors":"Houda Amari, L. Khoukhi, Lamia Hadrich Belguith","doi":"10.1109/LCN53696.2022.9843483","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843483","url":null,"abstract":"Vehicle Ad-hoc Network (VANET) is the main component of the intelligent transportation system. With the development of the next-generation intelligent vehicular networks, the latter aims to provide strategic and secure services and communications in roads and smart cities. Due to VANET’s unique characteristics, such as high mobility of its nodes, self-organization, distributed network, and frequently changing topology, security, data integrity, and users’ privacy information are major concerns. Also, attack prevention is still an open issue. Distributed Denial of Service (DDoS) is one of the most dangerous attacks in VANETs, which aims to flood the system’s bandwidth. In this article, we propose a hierarchical architecture for securing Software-Defined Vehicular Network (SDVN) and a security model for predicting and detecting DDoS attacks based on behavioral analysis of nodes achieved by a Markov stochastic process. Simulation results show that our model effectively mitigates DDoS attacks with a high-reliability rate.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Raising the AWAREness of BFT Protocols for Soaring Network Delays 提高对BFT协议在急剧增长的网络时延中的认识
2022 IEEE 47th Conference on Local Computer Networks (LCN) Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843564
Martin Nischwitz, M. Esche, Florian Tschorsch
{"title":"Raising the AWAREness of BFT Protocols for Soaring Network Delays","authors":"Martin Nischwitz, M. Esche, Florian Tschorsch","doi":"10.1109/LCN53696.2022.9843564","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843564","url":null,"abstract":"Classic BFT protocols are often deployed in the LAN setting, with low delays and reliable links. Recent publications of BFT protocols have decreased drastically in their communication complexity and the application to previously unsuited areas such as mobile or sensor networks is getting more traction. To facilitate that development and showcase suitability under harsher network conditions, we take one of the most recent BFT protocols, HotStuff, and analyze the impact of increased and varying network delays on its performance. We apply the delay prediction scheme AWARE and make some simple modifications to the prediction algorithm in order to increase its performance even further.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信