{"title":"Mobile core network redimensioning for efficient resource utilization","authors":"E. Bulut, A. Gosain","doi":"10.1109/INFCOMW.2017.8116381","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116381","url":null,"abstract":"In response to the mobile data tsunami, the research community has studied WiFi offloading based efforts to provide an immediate solution to mitigate the load on both the cellular space and mobile core network. However, this has caused mobile network operators (MNO) to lose control and visibility on the user data since the traffic is usually directed towards the Internet bypassing the operator's core network. Therefore, to offload the traffic from the cellular space but still have the control and visibility and continue offering operator services (i.e., VoLTE) even over WiFi, operators have extended their core network by adding new gateways (e.g. ePDG) that integrate the trusted and untrusted WiFi offloaded traffic. On the other hand, such an extension have caused the core network data load to remain the same while requiring a different solution space. In this paper, we approach the challenges triggered by mobile data explosion from core network gateways' perspective whose load is not alleviated even with WiFi offloading. We first propose the formation of Social-Offloading-Groups (SOGs) to offload the core network in terms of the cellular connection count (i.e., session) while maintaining all regular activities of SOG members over the SOG lead. Secondly, we provide a collaborative core network architecture between geographically distributed gateways to balance their operations and reduce the utilization of core network resources.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hey network, can you understand me?","authors":"Azzam Alsudais, Eric Keller","doi":"10.1109/INFCOMW.2017.8116375","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116375","url":null,"abstract":"In this paper, we introduce Natural Language Processing to network management by leveraging the capabilities of Natural Language Processing tools, such as speech recognition and text parsing, to extract useful information to build network tasks. We propose an intermediate network-agnostic layer that acts as the medium between natural language input (spoken or written) and different network implementations. We have leveraged the programmability that Software Defined Networks (SDN) offers to build a prototype tool that takes natural language text as an input and uses it to build abstract tasks. Such tasks are then passed to a network controller to be performed in real time. To our knowledge, this is the first work that provides such interface between network users (in the form of natural language) and different network systems.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125650353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Katsaros, Denis Shtefan, Vasilis Sourlas, I. Psaras, Sergi Rene, G. Pavlou
{"title":"Information-aware access network selection","authors":"K. Katsaros, Denis Shtefan, Vasilis Sourlas, I. Psaras, Sergi Rene, G. Pavlou","doi":"10.1109/INFCOMW.2017.8116373","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116373","url":null,"abstract":"Mobile devices are increasingly presented with multiple connectivity options, including WiFi hotspots, micro-/macro-cells or even other devices in device-to-device (D2D) communications. By and large, connectivity management for mobile devices has primarily focused on contention, congestion and wireless medium conditions. In this paper, we assess the role of information-centrism in mobile device connectivity management. Motivated by the increasing availability of content and services in in-network caches and micro-data centres, we design an access network selection scheme that takes into account information availability within each connectivity option. Our simulations show that information-awareness results in a significant increase of cache hit ratios by up to 115% in certain scenarios.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125943965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mariem Ben Yahia, Yannick Le Louédec, L. Nuaymi, G. Simon
{"title":"When HTTP/2 rescues DASH: Video frame multiplexing","authors":"Mariem Ben Yahia, Yannick Le Louédec, L. Nuaymi, G. Simon","doi":"10.1109/INFCOMW.2017.8116458","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116458","url":null,"abstract":"HTTP Adaptive Streaming is a successful and largely adopted content delivery technology. Yet poor bandwidth prediction, notably in mobile networks, may cause bit-rate oscillations, increased segment delivery delays, video freezes, and may thus negatively impact the end user quality of experience. To address this issue, we propose to exploit the stream prioritization and termination features of the HTTP/2 protocol to achieve video frame filtering and scheduling, so as to maximize the amount of video data received on time by the client. We evaluate with optimal scheduling and filtering algorithms the maximum gain we may expect from such delivery schemes where video frames are carried in dedicated HTTP/2 streams. Evaluation shows that our HTTP/2-based video frame scheduling scheme brings benefits for video quality.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124673656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li
{"title":"Pervasive edge data sharing in MANET","authors":"Xintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li","doi":"10.1109/INFCOMW.2017.8116365","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116365","url":null,"abstract":"The proliferation and daily congregation of modern mobile devices have created abundant opportunities for peer edge devices to share valuable data with each other. The short contact durations, relatively small sharing sizes, and uncertain data availability, demand agile, light weight peer based data sharing. In this paper, we propose Peer Data Sharing (PDS) that enables edge devices to discover which data exist in nearby peers, and retrieve interested data robustly and efficiently. We use Wi-Fi ad hoc network as an example to demonstrate that PDS can leverage different underlying network and link technologies with proper adaption. Extensive evaluations show that PDS discovers and retrieves almost 100% data in tens of seconds, and remains robust despite wireless contention, simultaneous consumer requests and user mobility.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121672686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An attribute-based reliable multicast-over-broadcast protocol for firmware updates in smart meter networks","authors":"Samet Tonyali, K. Akkaya, Nico Saputro","doi":"10.1109/INFCOMW.2017.8116359","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116359","url":null,"abstract":"The Smart Grid (SG) initiative introduces a two-way communication between utility companies and the consumers thanks to Advanced Metering Infrastructure (AMI) networks. One of the most crucial components that constitute an AMI network is smart meters (SMs). SMs execute some programs called firmware to rule the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services. Since the SM firmware is proprietary, the update file should be communicated to the SMs in a secure way. In addition, the firmware update can target a specific subgroup of the SMs rather than all of them. In this paper, we address the problem of multicasting the firmware update securely in an IEEE 802.11s-based SG AMI network and develop a secure and reliable multicast-over-broadcast protocol by making use of ciphertext-policy attribute-based signcryption (CP-ABSC) to provide not only confidentiality and access control but also message authentication. A hash of the firmware update is signcrypted based on an access tree such that the hash can be designcrypted only by the SMs possessing the attributes that can satisfy the access tree. In this paper, we propose an attribute-based multicast-over-broadcast protocol called Broadcast-Alarm (Bcast-Alarm) which is both secure and reliable. We assessed its performance under ns-3 network simulator. The simulation results have shown that Bcast-Alarm protocol can complete downloading a firmware update file by consuming comparable amount of bandwidth compared to unicasting.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN","authors":"J. Chukwu, A. Matrawy, D. Makrakis","doi":"10.1109/INFCOMW.2017.8116411","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116411","url":null,"abstract":"This paper addresses the problem of service function chaining in a network. Currently, problems of chaining services in a network (i.e., service function chaining) can be broadly categorised into middlebox placement in a network and packet steering through middleboxes. In this work, we propose a One Pass Packet Steering (OPPS) approach for use in multi-subscriber environments, with the aim of reducing end-to-end delay between Users and Services. We show a proof of concept implementation using emulations performed with Mininet. Our results show that, given a fixed topology and different sets of policy chains containing the same middleboxes, the end to end delay of subscribers using these policy chains remains approximately the same. Also, using our emulation environment, we show how the OPPS processing time is impacted by the number of service functions.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121088785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-path collaborative in-network caching for information-centric networks","authors":"Lemei Huang, Yu Guan, Xinggong Zhang, Zongming Guo","doi":"10.1109/INFCOMW.2017.8116372","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116372","url":null,"abstract":"It is a challenge for Information-Centric Network (ICN) that how to maximize the utilization of network-embedded cache. On-path collaboration is an efficient way to reduce access latency and cache redundancy. All nodes on ICN routing path work together to achieve higher performance than individual cache, and lower collaboration overhead than regional collaborative cache. In this paper, we formulate the traffic cost minimization problem in on-path collaborative caching, and give some insights of it. A caching utility function is defined with respect to content popularity and distance to content cache or source, in order to evaluate the payoff of caching an item at one of the on-path collaborative nodes. An on-path collaborative caching scheme UtilCache is proposed, which keeps ICN cache decision procedure unchanged but replaces items by the proposed policy LCU (Least Caching Utility). LCU evicts the items with least caching utility calculated by the caching utility function. The collaborative messages are piggybacked by data packets with low communication overhead. Compared with state-of-the-art caching schemes, UtilCache yields better performance in cache hit ratio, low latency and low communication overhead. The experimental results demonstrate that the proposed UtilCache achieves up to 50% latency reduction compared with individual caching, and less overhead compared with other collaborative caching. It also validates the implementation of UtilCache is very easy to be seamlessly integrated in current ICN framework.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121314967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical network behavior based threat detection","authors":"Jin Cao, L. Drabeck, Ran He","doi":"10.1109/INFCOMW.2017.8116413","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116413","url":null,"abstract":"Malware, short for malicious software, contuses to morph and change. Traditional anti-virus software may have problems detecting malicious software that have not been seen before. By employing machine learning techniques, one can learn the general behavior patterns of different threat types and use these to detect variants of unknown threats. We have developed a malware detection system based on machine learning that uses features derived from a user's network flows to external hosts. A novel aspect of our technique is to separate hosts into different groups by how common they are visited by the users and then develop user features separately for each of these host groups. The network data for the training of the detector is based on malware samples that have been run in a sandbox and normal users' traffic that is collected from an LTE wireless network provider. Specifically, we use the Adaboost algorithm as the classification engine and obtain a good performance of 0.78% false alarm rate and 96.5% accuracy for detecting users infected with malwares. We also provide high and low confidence regions for our system based on subclasses of threats.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demo abstract: Sender-triggered selective wake-up receiver for low-power sensor networks","authors":"J. Blobel, F. Dressler","doi":"10.1109/INFCOMW.2017.8116522","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116522","url":null,"abstract":"Wake-up receivers can be used in wireless sensor networks to solve the problem of node synchronization in an energy efficient manner. Conceptually, the idea is to use a dedicated wake-up signal before the actual transmission over a main radio transceiver. Several ideas have been discussed in the literature on how to make such an architecture as energy efficient as possible. State of the art are multi-stage wake-up receivers that first detect a code, i.e., an ID, before powering up the main receiver and the microcontroller. We recently introduced an extension to this scheme that adds a flexible addressing functionality. With this so called Selective Wake-Up Receiver (SWuRx), the sender can decide whether it wants to wake up all nodes in communication range (broadcast), a subset of nodes (multicast), or just a single node (unicast). In this demo, we present for the first time a prototype of our developed SWuRx. The wake-up signal contains an address and a mask and is send with a Software Defined Radio (SDR). The LEDs on our prototype show the nodes address as well as the received data. If a node is woken up by the wake-up signal, this is shown to the user by turning on a light. This way the user can directly observe the effect of different wake-up signals.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}