{"title":"Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications","authors":"H. Salameh, Sufyan Almajali, M. Ayyash, H. Elgala","doi":"10.1109/SDS.2017.7939139","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939139","url":null,"abstract":"Cognitive radio networks (CRNs) have a great potential in supporting time-critical data delivery among the Internet of Things (IoT) devices and for emerging applications such as smart cities. However, the unique characteristics of different technologies and shared radio operating environment can significantly impact network availability. Hence, in this paper, we study the channel assignment problem in time-critical IoT-based CRNs under proactive jamming attacks. Specifically, we propose a probabilistic spectrum assignment algorithm that aims at minimizing the packet invalidity ratio of each cognitive radio (CR) transmission subject to delay constrains. We exploit the statistical information of licensed users' activities, fading conditions, and jamming attacks over idle channels. Simulation results indicate that network performance can be significantly improved by using a security- availability- and quality-aware channel assignment that provides communicating CR pair with the most secured channel of the lowest invalidity ratio.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OSPF routing protocol performance in Software Defined Networks","authors":"A. Rego, S. Sendra, J. M. Jiménez, Jaime Lloret","doi":"10.1109/SDS.2017.7939153","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939153","url":null,"abstract":"Software Defined networks (SDNs) paradigm tries to improve the network performance, facilitating the network management and the scalability basing on open-source software and adding a new entity called controller that manages the entire network. One of the goals of the controller is taking decisions in regards to routing instead of distributing it among the network nodes, as usual. However, this field inside SDN needs more work because it is not clearly defined how the traditional routing protocols will work over a SDN. Thus, in this paper, we analyze how a dynamic routing protocol as Open Shortest Path First (OSPF) works in a SDN. The study analyzes the stability of network through parameters as convergence time and round trip time (RTT) and the quality of service (QoS) when a video is streamed between end devices. The results have been compared with a traditional network in order to evaluate the similarity in terms of stability and performance. Results show that, despite the proposal uses an OSPF implementation that does not have a performance as good as the traditional solution in terms of convergence time, with the SDN proposed we get better performance in terms of Quality of Service.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis as software-defined security for SDN environment","authors":"Nadya el Moussaid, A. Toumanari, Maryam el Azhari","doi":"10.1109/SDS.2017.7939146","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939146","url":null,"abstract":"The security of cloud environment is always a target for attackers in order to exploit any of the system's vulnerabilities. Recently, software-defined systems (SDS) has become a focus of several researches. Where, SDS is in the way to replace the traditional networking, in order to provide facilities which are based on remote and centralized control. The security of SDS is a major requirement to guarantee the integrity, confidentiality and availability of data and the communication. This paper presents a security analysis as a software-defined security service that enforces the security within the SDN in the cloud environment. The security analysis is specified through the attack graph and alert correlation clustering, which aims to enhance the work of other security approaches such as IDS by giving a global view and hint about the security state of the environment, also by reducing the rate of false positive alerts.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. A. Noghani, C. H. Benet, A. Kassler, A. Marotta, Patrick Jestin, Vivek V. Srivastava
{"title":"Automating Ethernet VPN deployment in SDN-based Data Centers","authors":"K. A. Noghani, C. H. Benet, A. Kassler, A. Marotta, Patrick Jestin, Vivek V. Srivastava","doi":"10.1109/SDS.2017.7939142","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939142","url":null,"abstract":"Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed to address many of those concerns and vendors started to deploy EVPN based solutions in DC edge routers. However, manual configuration leads to a time-consuming, error-prone configuration and high operational costs. Automating the EVPN deployment from cloud platforms such as OpenStack enhances both the deployment and flexibility of EVPN Instances (EVIs). This paper proposes a Software Defined Network (SDN) based framework that automates the EVPN deployment and management inside SDN-based DCs using OpenStack and OpenDaylight (ODL). We implemented and extended several modules inside ODL controller to manage and interact with EVIs and an interface to OpenStack that allows the deployment and configuration of EVIs. We conclude with scalability analysis of our solution.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote speech 1: The path to which the 5G takes us, from the atom to the direct communication between devices and machines","authors":"J. Monserrat","doi":"10.1109/FMEC.2017.7946396","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946396","url":null,"abstract":"This keynote speech analyses the current positioning of vendors and operators concerning the mobile market and its evolution towards the 5G. The seminar will deal with the analysis of the Mobile World Congress 2017, focusing then in the 5G process and the last advances in 3GPP specifications. Special attention will be paid to the D2D and mmW communication topic and the last advances in the research conducted in Prof. Monserrat group.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Software Defined architecture for Cyberphysical Systems","authors":"Ala Darabseh, N. Freris","doi":"10.1109/SDS.2017.7939141","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939141","url":null,"abstract":"The explosive proliferation of smart devices and cloud computing has ushered the era of Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the cyberspace. The success of deploying an Internet of Things (IoT) interconnecting billions of devices relies heavily upon making the right choices in revisiting traditional architectures for networked control and information processing. Inspired by the concept of Software Defined Systems (SDSys), we propose a control architecture for cyberphysical systems and discuss its advantages in terms of scalability, robustness, security, flexibility, and interoperability. The proposed architecture explicitly leverages the fact that agents possess computational units that may be used for in-network processing and decentralized control actions. We integrate a set of components such as sensors, actuators, access points and coordinators and specify the communication flow, the data flow, and the control flow in a programmable fashion. Control is spread over multiple layers (self-controllers, coordinators, local area controllers, and super-controllers) that form a hierarchy with added autonomy for distributed and decentralized actions. A middleware layer is integrated into the proposed design with several services and units to account for real-time operations in highly dynamic environments. We proceed to identify a wide range of potential vulnerabilities to cyberattacks at all levels, and propose solutions for effective resilience, detection and recovery. The proposed architecture aims at a holistic view with increased adaptability, where the controllers efficiently collaborate to quickly capture and respond to abnormal situations in a self-adjusting manner.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125215446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A routing scheme for Cognitive Radio networks with Self-Interference Suppression capabilities","authors":"Rawan F. El Khatib, H. Salameh","doi":"10.1109/SDS.2017.7939135","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939135","url":null,"abstract":"In this work, we investigate the routing and channel assignment problem in Self-Interference Suppression (SIS)-enabled CRNs, where FD communication is possible. Specifically, we propose a novel metric called “Path Capacity” that reflects the number of links that can be simultaneously activated across a given path while using the minimum possible spectrum resources. Accordingly, we develop a novel routing scheme that selects the best path along with the channel assignment such that the highest capacity is achieved. We analytically formulate the routing problem as a route selection and channel assignment optimization, with the objective of minimizing the required number of distinct channels for each CR source-destination pair. We show that the optimization problem is a Binary Quadratic Programming (BQP) problem, which is, in general, NP-hard. Accordingly, we present a sequential fixing procedure that provides a near-optimal solution. Simulation results are provided, which show that a careful routing and channel assignment in SIS-enabled CRNs can significantly improve network performance.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"76 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility management based SDN-IPv6 Routing Header","authors":"Mouad Idri","doi":"10.1109/SDS.2017.7939156","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939156","url":null,"abstract":"Mobile networks are moving into the 5G which is envisaged to face various complexity of network management caused by the intensifying data traffic demand, diverse wireless environments, and multiple service necessities. The requirements are strong to propose new network architecture aiming to meet heterogeneous services demands coming from various technologies such as LTE, WiFi and beyond. It is then challenging to tackle the mobility management and more specifically vertical handovers which aim to maintain ongoing session. As a proposed technology, Software-defined network (SDN) that permits network operators to easily introduce new services and to simplify network management. Adding to this, Distributed Mobility Management (DMM) which is emerging as a new trend to blueprint future mobile network architectures in order to overcome the centralized aspect of the current mobile network. Due to the foreseen domination of IPv6, a combined solution is discussed to simplify users' mobility and to assure the QoS of different applications. Based on SDN and DMM, IPv6 Routing Header will be the main suggested solution to guarantee mobility management in heterogeneous network.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Attribute-Based Access Control for Remote Healthcare Monitoring","authors":"I. Ray, Bithin Alangot, Shilpa Nair, K. Achuthan","doi":"10.1109/SDS.2017.7939154","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939154","url":null,"abstract":"Remote Healthcare Monitoring (RHM) IoT infrastructure uses sensors and smartphones to collect vital parameters from patients. These parameters pertaining to medical records are shared with healthcare professionals at geographically distant locations to provide timely medical care. RHM applications deployed on IoT infrastructure must address the issues of security and privacy in a constrained environment. We present our H-Plane framework for RHM and propose the use of the NIST Next Generation Access Control (NGAC) framework for specifying and enforcing access control policies.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127198041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa
{"title":"Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution","authors":"A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa","doi":"10.1109/SDS.2017.7939155","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939155","url":null,"abstract":"The multi-tenant Cloud environment creates a plethora of both technical and legal difficulties for digital forensics. Digital forensics typically relies on the analysis of evidence images or residual data. Due to the distributed nature of cloud environments can cause the required dataset to scale rapidly. When coupled with diversely heterogeneous environments, the widespread uptake of anti-forensic data and encryption, privacy requirements and a non-standardised architecture across Cloud Service Providers (CSPs), attribution of any activity for a forensic investigation becomes a tedious task. This paper presents an architecture agnostic, privacy-preserving solution to reducing the digital forensics target search space of a investigation within cloud and edge computing environments which will leverage standard metering and network logs for efficient activity attribution.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}