{"title":"Crosstalk-induced Impact of Coexisting DWDM Network on Continuous-variable QKD","authors":"Binjie Chu, Yichen Zhang, Yijia Zhao, Yifan Xu, Xing Chen, Xiangyu Wang, Song Yu","doi":"10.1109/DRCN48652.2020.1570604589","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604589","url":null,"abstract":"In this paper, the crosstalk-induced impact of coexisting dense-wavelength-division-multiplexed (DWDM) channels on continuous-variable quantum key distribution (CV-QKD) in practical communication environment is investigated. We analyze the nonlinear effect resulting from classical channels on the transmitted local oscillator in CV-QKD, while various existing studies mainly focus on the crosstalk-induced excess noise. We demonstrate that the generally ignored phenomenon of four-wave mixing in excess noise analysis is a visible factor causing local oscillator fluctuation characterized by the statistical properties of the power evolution of local oscillator. Besides, the impact of stimulated Raman scattering on local oscillator is derived in the same theoretical approach and experimentally investigated. Finally, by establishing a trusted model for local oscillator fluctuation we perform the security analysis to constrain the threshold of fluctuation. All of the above analysis should be taken into account as a supplementary for evaluating the performance of CV-QKD with coexisting DWDM system and optimal allocation of classical and quantum channels.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Gangopadhyay, J. Pedro, J. Santos, N. Borges, Paulo Santos, H. Bock, N. Prasad, R. Prasad
{"title":"Evaluating the cost benefit of real-time optical performance in dynamic optical restoration","authors":"B. Gangopadhyay, J. Pedro, J. Santos, N. Borges, Paulo Santos, H. Bock, N. Prasad, R. Prasad","doi":"10.1109/DRCN48652.2020.1570638832","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570638832","url":null,"abstract":"Network availability is becoming a key aspect for next generation networks. Operators and service-providers are struggling to keep the network total cost of ownership (TCO) under control while providing seamless connectivity to end-users. In the same context, the authors investigate the benefit of a framework exploiting real-time optical performance to compute restoration paths while executing dynamic layer-0 (L0) restoration. This investigative study evaluates total network cost and is based on five reference networks with a five-year traffic growth model between two network-operation modes - i) a traditional framework where dynamic L0 restoration path and resources are calculated with offline planned \"end-of-life\" (EoL) optical performance data and ii) a real-time framework where dynamic L0 restoration path and resources are calculated with real-time calculated \"current-state-of-life\" (CoL) performance data.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116205878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software-Defined Network Design driven by Availability Requirements","authors":"Dorabella Santos, Teresa Gomes, D. Tipper","doi":"10.1109/DRCN48652.2020.1570604282","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604282","url":null,"abstract":"In Software Defined Networking (SDN), the controller locations are mainly constrained by delays between switches and controllers, and between the controllers themselves. In addition to the delay requirements, the availability of the connections between switches and controllers is also a key issue for control plane performance. Here, we explore the idea of having a spanning tree substructure called the spine, whose links can be upgraded to have high availability in order to support availability requirements for the control paths (routing paths between switches and controllers). We formulate an optimization model of the joint controller placement and spine design problem for SDN networks, under delay, availability and path redundancy requirements.Numerical results are presented showing the trade-offs between the number of controllers, delay requirements and upgrade cost.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siwar Kriaa, S. Papillon, L. Jagadeesan, V. Mendiratta
{"title":"Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers","authors":"Siwar Kriaa, S. Papillon, L. Jagadeesan, V. Mendiratta","doi":"10.1109/DRCN48652.2020.1570604424","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604424","url":null,"abstract":"Software-defined networks (SDN), through their programmability, significantly increase network resilience by enabling dynamic reconfiguration of network topologies in response to faults and potentially malicious attacks detected in real-time. Another key trend in network softwarization is cloud- native software, which, together with SDN, will be an integral part of the core of future 5G networks. In SDN, the control plane forms the \"brain\" of the software-defined network and is typically implemented as a set of distributed controller replicas to avoid a single point of failure. Distributed consensus algorithms are used to ensure agreement among the replicas on key data even in the presence of faults. Security is also a critical concern in ensuring that attackers cannot compromise the SDN control plane; byzantine fault tolerance algorithms can provide protection against compromised controller replicas. However, while reliability/availability and security form key attributes of resilience, they are typically modeled separately in SDN, without consideration of the potential impacts of their interaction. In this paper we present an initial framework for a model that unifies reliability, availability, and security considerations in distributed consensus. We examine -- via simulation of our model -- some impacts of the interaction between accidental faults and malicious attacks on SDN and suggest potential mitigations unique to cloud-native software.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Livinus Obiora Nweke, G. Weldehawaryat, S. Wolthusen
{"title":"Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols","authors":"Livinus Obiora Nweke, G. Weldehawaryat, S. Wolthusen","doi":"10.1109/DRCN48652.2020.1570604241","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604241","url":null,"abstract":"Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication networks and systems for power utility automation in particular not only requires distributed processing, but in case of the generic object oriented substation events and sampled value (GOOSE/SV) protocols also hard real-time characteristics. This motivates the desire to include both quality of service (QoS) and explicit network topology in an adversary model based on a π-calculus process algebraic formalism based on earlier work. This allows reasoning over process states, placement of adversarial entities and communication behaviour. We demonstrate the use of our model for the simple case of a replay attack against the publish/subscribe GOOSE/SV subprotocol, showing bounds for non-detectability of such an attack.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Belocchi, V. Cardellini, A. Cammarano, G. Bianchi
{"title":"Paxos in the NIC: Hardware Acceleration of Distributed Consensus Protocols","authors":"G. Belocchi, V. Cardellini, A. Cammarano, G. Bianchi","doi":"10.1109/DRCN48652.2020.1570611009","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570611009","url":null,"abstract":"Modern network infrastructures rich of logically centralized agents, such as DHCP, AAA, SDN controller agents, need to use redundancy in order to guarantee high availability and consensus protocols to have strong consistency. Unfortunately, consensus protocols, which are traditionally deployed as application-layer services running on end-to-end servers, are often recognized as system performance bottlenecks. In this paper, we present a possible solution leveraging programmable network hardware in order to offer consensus as service for the application, thus reducing occupied server resources and accelerating the protocol with programmable hardware. This is obtained by defining a high-level abstraction for describing consensus protocols and conducting a feasibility study through the implementation of the Paxos protocol with a SmartNIC.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125708563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Optimization Model for Probabilistic Protection under Uncertain Virtual Machine Capacity in Cloud","authors":"Mitsuki Ito, Fujun He, E. Oki","doi":"10.1109/DRCN48652.2020.1570609411","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570609411","url":null,"abstract":"This paper presents robust optimization models for minimizing the required backup capacity with probabilistic protection against multiple simultaneous failures of physical machines in a cloud provider. If random failures occur, the required capacities for virtual machines are allocated to the dedicated backup physical machines, which are determined in advance. We consider two uncertainties, failure event and virtual machine capacity. By adopting the robust optimization technique, we formulate three mixed integer linear programming problems. There are differences of robustness between the three models. Then we provide theorems concerned with the differences and prove them. The theorems are supported by numerical results. Our three presented models are applicable to the case that virtual machine capacities are uncertain, and by using these models, we can obtain the optimal solution of the allocation of virtual machines under the uncertainty.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121442301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulaziz Alqahtani, D. Tipper, Katrina Kelly-Pitou, Amy Babay
{"title":"Identifying Vulnerable Critical Infrastructure Zones in Smart Cities","authors":"Abdulaziz Alqahtani, D. Tipper, Katrina Kelly-Pitou, Amy Babay","doi":"10.1109/DRCN48652.2020.1570613452","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570613452","url":null,"abstract":"Emerging smart cities are leveraging technologies to create smart critical infrastructures with the goal of improving the quality of life. These smart infrastructures introduce new vulnerabilities to the failure of ICT and electric power. Hence there is a need for holistic analysis of critical infrastructures incorporating power and communications with other infrastructures when determining weak points. Here we propose a framework for identifying the most important geographical zones within a city from a critical infrastructure viewpoint. The framework combines multiple metrics including societal, geographic and network science based, as well as including power requirements. Furthermore it enables analyst to study both networked critical infrastructure and standalone critical infrastructure. A case study of four critical infrastructures in the city of Pittsburgh, Pennsylvania is given illustrating the approach. The results show that considering the infrastructures as a group in a holistic fashion yields much different results when compared with studying each infrastructure individually. Further, we demonstrate how the results of the holistic analysis can be incorporated into a risk analysis.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Massive MIMO Uplink Detector Based On Joint Jacobi and Gauss-Seidel Methods","authors":"M. Albreem, Ayman A. El-Saleh, M. Juntti","doi":"10.1109/DRCN48652.2020.1570610672","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570610672","url":null,"abstract":"In fifth generation (5G) cellular system, massive multiple-input multiple-output (MIMO) is utilized to improve the diversity gain, reliability, link robustness, latency, and power and spectral efficiencies. However, a large number of antennas requires sophisticated signal processing to detect data. Although the detection based on maximum likelihood (ML) obtains the best performance, it is not hardware friendly because of the exponential complexity. Therefore, several iterative methods are proposed to estimate the signal without computing the inverse of equalization matrix, and hence, minimize the complexity. The Jacobi (JA) and the Gauss-Seidel (GS) methods achieve a satisfactory performance. However, large iterations’ number is in demand which produces a high computational complexity. This paper proposes a detector for massive MIMO uplink (UL) system based on the JA and GS methods. Proposed detector obtains a balance between the performance and the complexity. In this research, initialization is performed based on the JA method. After-that, the estimation is performed based on the GS method. Numerical results show that the proposed JAGS detector outperforms the GS and the JA based detector. Moreover, proposed JA-GS based detector requires few iterations to obtain the target performance and hence, a considerable reduction in computational complexity is achieved.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Connectivity Resilience of a Telecommunications Network to Multiple Link Failures Through a Third-Party Network","authors":"A. Sousa","doi":"10.1109/DRCN48652.2020.1570613461","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570613461","url":null,"abstract":"Currently, telecommunication networks are fully resilient, in terms of connectivity, to single link failures. On the other hand, multiple simultaneous link failures are becoming a concern to network operators, mainly due to malicious human activities. Full connectivity resilience to multiple link failures is too costly and other solutions must be envisaged. For a given maximum number of simultaneous link failures, the connectivity resilience metric adopted here is the minimum number of network node pairs that can still communicate for any set of failing links. In this work, the connectivity resilience to multiple link failures is improved by resorting to a third-party network for temporary additional connectivity (i.e., while the failing links are not reestablished). In such a solution, some nodes must be selected to act as gateway nodes between the two networks. For a given network topology and a given number of gateway nodes, the aim is to select the most appropriate gateway nodes so that the connectivity resilience is improved as much as possible. To address this problem, a Gateway Node Selection (GNS) algorithm is proposed where the most damaging sets of failing links are identified and, then, a set cover problem type is defined and solved to select the gateway nodes. The computational results demonstrate the effectiveness of the proposed GNS algorithm over two well-known network topologies.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}