{"title":"Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications","authors":"M. Grey, Markus Theil, M. Rossberg, G. Schäfer","doi":"10.1109/GIIS.2018.8635645","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635645","url":null,"abstract":"The advent of critical applications that rely on Internet-based communication sheds light upon the robustness limitations of todays’s Internet infrastructure. A well-known expedient are overlay applications that provide means to reroute traffic in case of network failures, but the induced overhead of existing techniques is often considered prohibitively high. Within this work we present a highly scalable backup path mechanism for large-scale distributed applications that makes use of a spherical Voronoi-based technique for peer organization and a position-dependent path selection strategy. The achieved resilience benefit of the resulting backup paths is evaluated with simulations based on real-world data, which show that connection loss in about 75% of wide-area network failures can be avoided by only two proactively selected backup peers.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the Energy Consumption of LoRaWAN in ns-3 Based on Real World Measurements","authors":"J. Finnegan, Stephen Brown, R. Farrell","doi":"10.1109/GIIS.2018.8635786","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635786","url":null,"abstract":"LPWAN technologies are defined by their focus on extended coverage while maintaining energy efficiency, at the expense of data throughput. In this research we enable the analysis of LoRa, a key LPWAN technology, in terms of energy efficiency. We perform real-world measurements of a standard LoRa chip and use the results to develop an energy consumption module in ns-3. Our contributions are an analysis of the energy consumption of different states in a LoRa transmission by the SX1272, the LoRa transceiver that is used in most common LoRaWAN devices, beyond what is provided in the datasheet, and an energy consumption module for use in three of the LoRaWAN ns-3 modules described in research, enabling more accurate energy consumption analysis of LoRa-based systems.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation of Carrier Sensing Threshold to Increase Throughput in Dense 802.11ac Wireless Networks","authors":"O. Topal, Günes Karabulut-Kurt, Akin Soysal","doi":"10.1109/GIIS.2018.8635766","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635766","url":null,"abstract":"Carrier sensing mechanisms in many of today’s wireless devices are based on virtual carrier sensing and physical carrier sensing. Virtual carrier sensing functions through the use of request to send and clear to send handshake signaling. Physical carrier sensing makes use of the carrier sense threshold (CST), which indeed aims to mitigate the collisions and interference related problems. In densely deployed networks, however, such classic carrier sensing mechanisms limit the spatial reuse rate, which can result in unsatisfied user demands. In this paper, an adaptive carrier sensing algorithm, which adjusts the CST depending on the overall throughput gain and fairness among the networks, is proposed to increase the spatial reuse and the system throughput. The connectivity issue of the associated clients has been addressed. As a first step, the effect of CST change is investigated in terms of airtime usage, fairness and different node densities in a simple grid 802.11ac dense network deployment. The performance evaluation of the proposed approach is done by using Network Simulator-3 (ns-3). Simulation results show that with the use of the proposed approach, the overall system throughput can be increased by as much as 100% of the throughput provided by the traditional carrier sense multiple access (CSMA)protocol.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis
{"title":"An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree","authors":"Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis","doi":"10.1109/GIIS.2018.8635743","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635743","url":null,"abstract":"The Smart Grid (SG) paradigm constitutes the new technological evolution of the traditional electrical grid, providing remote monitoring and controlling capabilities among all its operations through computing services. These new capabilities offer a lot of benefits, such as better energy management, increased reliability and security, as well as more economical pricing. However, despite these advantages, it introduces significant security challenges, as the computing systems and the corresponding communications are characterized by several cybersecurity threats. An efficient solution against cyberattacks is the Intrusion Detection Systems (IDS). These systems usually operate as a second line of defence and have the ability to detect or even prevent cyberattacks in near real-time. In this paper, we present a new IDS for the Advanced Metering Infrastructure (AMI) utilizing machine learning capabilities based on a decision tree. Decision trees have been used for multiple classification problems like the distinguishment between the normal and malicious activities. The experimental evaluation demonstrates the efficiency of the proposed IDS, as the Accuracy and the True Positive Rate of our IDS reach 0.996 and 0.993 respectively.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of LDDoS Attacks Based on TCP Connection Parameters","authors":"Michael Siracusano, S. Shiaeles, B. Ghita","doi":"10.1109/GIIS.2018.8635701","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635701","url":null,"abstract":"Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy. They force vulnerable webservers to open all available connections to the adversary, denying resources to real users. Mitigation advice focuses on solutions that potentially degrade quality of service for legitimate connections. Furthermore, without accurate detection mechanisms, distributed attacks can bypass these defences. A methodology for detection of LDDoS attacks, based on characteristics of malicious TCP flows, is proposed within this paper. Research will be conducted using combinations of two datasets: one generated from a simulated network, the other from the publically available CIC DoS dataset. Both contain the attacks slowread, slowheaders and slowbody, alongside legitimate web browsing. TCP flow features are extracted from all connections. Experimentation was carried out using six supervised AI algorithms to categorise attack from legitimate flows. Decision trees and kNN accurately classified up to 99.99% of flows, with exceptionally low false positive and false negative rates, demonstrating the potential of AI in LDDoS detection.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diversity in Direct Mobile-to-Mobile Communication Systems: An Experimental Approach","authors":"K. Maliatsos, L. Marantis, P. Bithas, A. Kanatas","doi":"10.1109/GIIS.2018.8635726","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635726","url":null,"abstract":"-5G aspires to be the technology that will create, support and enhance automation and industry digitization use cases providing inherent support to device-centric communications, i.e., vehicular (V2X) and Device-to-Device (D2D) communications, tactile internet, as well as Internet-of-Things (IoT) applications. Moreover, 5G deployment options include support of multiple (novel and established) radio access networks (RAN). In this multi-RAN, massive machine-type communication environment, a variety of broadcast, multicast and unicast applications must be simultaneously supported. In this work, we present an implementation of a diversity engine enabled by adaptive, novel, printed ESPAR antennas. The scheme improves system performance in terms of reliability and throughput with increased Signal-to-Noise Ratio (SNR) with simultaneous broadcast and directive support. The scheme was implemented and demonstrated for vehicular use cases in the context of the Horizon 2020 project ROADART.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Grid Architecture, Communications and Data Model: The WiseGRID approach","authors":"D. Stratogiannis, Stamatia Gkiala-Fikari","doi":"10.1109/GIIS.2018.8635708","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635708","url":null,"abstract":"Current technical, social, economic and environmental trends impose the optimization of power grid and energy management via the digitalization and Smart Grid (SG) development. The SG incorporates advanced communications and pervasive computing capabilities ensuring improvement in terms of control, efficiency, reliability, flexibility and safety along with novel advanced services to customers and business actors in the energy market. In this paper, the architecture, communications and enhanced data model developed under the WiseGRID project are presented, exploring the main challenges and requirements for the design and deployment of the ICT infrastructure required as part of a complex SG system. In particular, in this work special focus is given on the Smart Grid Architecture Model (SGAM) employed and on two of the main ICT tools developed to establish the interoperability among the entities involved in the SG. Finally, the work performed towards the development of a harmonized data model for SGs is presented in order to be used during the demonstration phase of the project.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput-Aware RRHs Clustering in Cloud Radio Access Networks","authors":"Nazih Salhab, Rana Rahim, R. Langar","doi":"10.1109/GIIS.2018.8635647","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635647","url":null,"abstract":"Cloud-Radio Access Network (C-RAN) is an attractive solution to Mobile Network Operators. Firstly, C-RAN leverages the effect of pooling multiple Baseband Units (BBUs) to offer centralized processing resources while hosting them on cloud. This results in multiple benefits ranging from statistical multiplexing gains, to energy efficiency. Secondly, C-RAN allows deploying Remote Radio Heads (RRHs) in proximity of end-users allowing exploiting Inter-Cell Interference Cancellation (ICIC) to maximize throughput by coordinating multiple RRHs. In this context, we propose, in this paper, a new throughput-aware RRHs clustering method for C-RAN that maximizes the throughput for end-users, while meeting multiple constrained resources on BBUs. Our approach consists of two stages: First, individual throughput value and requirements of each RRH are calculated taking into account the Signal-to-Interference-plus-Noise Ratio (SINR) values and the distance between RRHs and users. Then, they are included into a k-dimensional Multiple-Choice Knapsack Problem (k-MCKP) subject to several constraints in terms of required resources in order to form RRHs clusters that maximize the global throughput. Simulation results demonstrate the good performance of our proposal in terms of end-users throughput, spectral efficiency and execution time, when compared with the optimal solution and the basic strategy using no-clustering scenarios.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130332864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Power Allocation and Transmission Time Selection in Duty-cycled Wireless Sensor Networks","authors":"Christos N. Efrem, A. Panagopoulos","doi":"10.1109/GIIS.2018.8635725","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635725","url":null,"abstract":"Energy-aware resource allocation plays an important role in battery-limited wireless sensor networks (WSNs), as it improves network performance, in terms of energy savings, and prolongs network lifetime as well. In this paper, we study a duty-cycled WSN where the sensor nodes transmit their data simultaneously to a central access point and then return to sleep mode (this process is repeated in each time period). In particular, we propose a joint power allocation and transmission time selection algorithm in order to minimize the maximum energy consumption of the sensor nodes, under power and time constraints as well as quality-of-service (QoS) requirements. In the problem formulation, we also take into account the circuit energy consumption of each sensor node. Moreover, the proposed algorithm, which is based on a successive convex approximation method, converges very quickly and achieves a Karush-Kuhn-Tucker (KKT) solution for the problem. Finally, numerical results reveal that the proposed technique provides significant performance gain when compared to a baseline scheme.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/giis.2018.8635702","DOIUrl":"https://doi.org/10.1109/giis.2018.8635702","url":null,"abstract":"","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}