{"title":"A Linux kernel implementation of Segment Routing with IPv6","authors":"David Lebrun","doi":"10.1109/INFCOMW.2016.7562234","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562234","url":null,"abstract":"Network operators seek more flexibility to provide added-value services to their customers. We propose to leverage the IPv6 Segment Routing architecture with a example usecase. We also provide an implementation of SR-IPv6 and we evaluate its performance on broadband routers.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Nguyen, L. Henderson, James Chacko, Cem Sahin, Anton Paatelma, H. Saarnisaari, Nagarajan Kandasamy, K. Dandekar
{"title":"BeamViewer: Visualization of dynamic antenna radiation patterns using Augmented Reality","authors":"D. Nguyen, L. Henderson, James Chacko, Cem Sahin, Anton Paatelma, H. Saarnisaari, Nagarajan Kandasamy, K. Dandekar","doi":"10.1109/INFCOMW.2016.7562185","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562185","url":null,"abstract":"Wireless research and education are often hindered by the fact that RF electromagnetic signals are invisible and therefore hard to visualize. Domain-specific software, such as those used for antenna radiation pattern measurements, has significantly enhanced the level of radiation visualization through interactive 3D plots. However, the intuition stops there and does not carry over into the real-word operational environment of antennas and radios. As a result, there exists a real disconnect in visualization between the available antenna radiation patterns and their effects on wireless network performance. In this demo1 we present BeamViewer, an augmented reality framework to help visualize and capture the dynamic radiation patterns of reconfigurable antennas in real time. BeamViewer takes inputs from the cognitive radios controlling beam-steerable antennas and annotates on a live-view mobile screen the active pre-measured radiation patterns. This capability adds an unprecedented level of instant visualization and provides valuable insights into the dynamics of a reconfigurable antenna-based cognitive radio network.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A smart heuristic for relieving RBB in dependable transmission environment","authors":"Fei Song, Wei Quan, Hui-Jing Yang, Wei Zhao, Hongke Zhang","doi":"10.1109/INFCOMW.2016.7562215","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562215","url":null,"abstract":"Wireless access technologies had effectively accelerated the evolution of Internet and enhanced the overall capacity of networks. However, due to the complexity of multiple paths in mobile scenarios, the managements of network and terminal are more and more challenging. For instance, when disordered packets arrive at the destination, they have to be stored within the transport layer buffer at the receiver side, which may seriously restrict the transmission performance. We present a smart heuristic to handle and relieve such Receive Buffer Blocking (RBB) issue in dependable environment. A novel modeling approach for describing the properties of RBB is also presented by selecting “Theoretical maximum of disordered packets” as the target. Both loss free and loss occurs circumstances are considered comprehensively. The functionality of our scheme is confirmed via mathematical perspective based on the proposed model. The reasonable treatment method for one way delay and packet loss during the scheduling policy design are also discussed.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Industrial Wireless Sensor Network (IWSN) protocols","authors":"A. Al-Yami, Wajih A. Abu-Al-Saud, F. Shahzad","doi":"10.1109/INFCOMW.2016.7562133","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562133","url":null,"abstract":"Industrial Wireless Sensor Networks (IWSN) are preferred over bulky wired networks in industrial monitoring and automation. These sensors are used to access locations, which are technically unreachable. The use of IWSN not only reduced the cost of automation systems but also played a significant role in alarm management by real time data transfer. ZigBee and WirelessHART are already deployed protocols for IWSN. ISA100.11a developed by International Society of Automation was specially designed for IWSN. The main features of this standard are low power consumption, real time fast data transfer, scalability, security, reliability, coexistence with other network architectures and robustness in harsh industrial environments. To achieve these features, these protocols use layer structure, which provides security, fast and reliable data transfer. IEEE 802.15.4 is used at its physical layer with variable data slots. This paper presents the results of the simulation of ZigBee, WirelessHART and ISA100 done on Pymote framework, which is extended by one of the authors, and Castalia. This paper compares and discusses the simulated results obtained from all three protocols.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yujie Liu, Yong Li, M. Canini, Yue Wang, Jian Yuan
{"title":"Scheduling multi-flow network updates in Software-Defined NFV systems","authors":"Yujie Liu, Yong Li, M. Canini, Yue Wang, Jian Yuan","doi":"10.1109/INFCOMW.2016.7562137","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562137","url":null,"abstract":"Combining Network Functions Virtualization (NFV) with Software-Defined Networking (SDN) is an emerging solution to provide fine-grained control over scalable and elastic packet processing functions. Due to changes in network policy, traffic characteristics, or physical topology in Software-Defined NFV (SDNFV) systems, the controller needs to carry out network updates frequently, i.e., change the data plane configuration from one state to another. In order to adapt to a newly desired network state quickly, the network update process is expected to be completed in the shortest time possible. However, the update scheduling schemes need to address resource constraints including flow table sizes, CPU capacities of Virtualized Network Functions (VNFs) and link bandwidths, which are closely coupled. Thus, the problem is difficult to solve, especially when multiple flows are involved in the network update. In this work we investigate the multi-flow update problem in SDNFV systems, and formulate it as a mixed integer programming problem, which is NP-complete. We propose an approximation algorithm via linear relaxation. By extensive simulations, we demonstrate that our algorithm approaches the optimal solution, while requiring 10x-100x less computing time.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youichi Nishiyama, M. Ishino, Y. Koizumi, T. Hasegawa, Kohei Sugiyama, A. Tagami
{"title":"Proposal on routing-based mobility architecture for ICN-based cellular networks","authors":"Youichi Nishiyama, M. Ishino, Y. Koizumi, T. Hasegawa, Kohei Sugiyama, A. Tagami","doi":"10.1109/INFCOMW.2016.7562122","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562122","url":null,"abstract":"Forthcoming 5G networks raise an important research issue of seamless mobility management of cellular and non-cellular networks. Adopting Information Centric Networking (ICN) architecture as common mobility management is promising because existing mobility management mechanisms are complicated and incur large signaling overhead. This paper designs a routing-based mobility architecture to provide seamless mobility for the both networks. The architecture consists of routing during longer duration and anchor-less forwarding during shorter duration. A main contribution of the paper is that the architecture is designed by carefully considering how to port it to cellular networks with as few modifications to them as possible.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoyu Zhang, Shupeng Wang, Lei Zhang, Chunjie Zhang, Changsheng Li
{"title":"Ensemble feature selection with discriminative and representative properties for malware detection","authors":"Xiaoyu Zhang, Shupeng Wang, Lei Zhang, Chunjie Zhang, Changsheng Li","doi":"10.1109/INFCOMW.2016.7562161","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562161","url":null,"abstract":"Malware data are typically depicted with extremely high-dimensional features, which lays an excessive computational burden on detection methods. For the sake of effectiveness and efficiency, feature selection is an indispensable part for malware detection. In this paper, we propose an ensemble feature selection method with integration of discriminative and representative properties for malware detection. Based on the labeled and unlabeled data, the most discriminative and representative features are selected, respectively. The former extracts the features that are most distinctive with respect to the classes, and the latter focuses on the features that best represent the data. A comprehensive metric is subsequently obtained, which retains the most informative features.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security concerns for automotive communication and software architecture","authors":"Huafeng Yu, Chung-Wei Lin","doi":"10.1109/INFCOMW.2016.7562147","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562147","url":null,"abstract":"Cyber security concerns in the automotive industry have been constantly increasing as automobiles are more computerized and networked. Recent successful hacks of modern vehicles demonstrate the big security concerns for automotive systems. However it is still very hard and even impossible to predict what kinds of security issues will happen. In this paper, we present the automotive security concerns from several different and fundamental points of view: communication, system and software architecture. We first discuss different security concerns related to communication media and protocols, such as CAN bus and Ethernet. We then consider concerns for automotive architecture: general system architecture and AUTOSAR-based architecture. For each view, we summarize the open questions and challenges in the design of secured automotive systems. In spite of addressing security concerns with very specific solutions, we promote a system-level security design approach considering both communication and software architecture. This requires to consider the security issues and design from an architecture and systems engineering points of view.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123497223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A key agreement method for wireless body area networks","authors":"Zhouzhou Li, Honggang Wang","doi":"10.1109/INFCOMW.2016.7562165","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562165","url":null,"abstract":"A secure and efficient key agreement method is required by Wireless Body Area Network, especially for intersensor/controller communication. The communicating parties share similar channel information at physical layer that the others cannot grasp. The physical layer information-based key generation and agreement will only pass check symbols from one side to the other side of the communication channel. Then the receiving side can recover the original information stored at the sending side from the received check symbols and the similar local information. This way can achieve both high security and efficiency. This paper further improves the security and efficiency of the above method.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A length-aware cuckoo filter for faster IP lookup","authors":"Minseok Kwon, P. Reviriego, S. Pontarelli","doi":"10.1109/INFCOMW.2016.7562258","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562258","url":null,"abstract":"A cuckoo filter is a highly efficient data structure that provides approximate set-membership testing and addresses some drawbacks of a Bloom filter such as deletion and space overhead. Motivated by the application of Bloom filters to IP lookup, and in general, fast packet processing at routers, we propose a new filter called a length-aware cuckoo filter (LACF), for faster IP lookup with limited extra storage requirement. LACF uses different numbers of hash functions to store and search for entries based on the prefix length popularity of routing entries. Our preliminary results show that LACF reduces the false positive rates for IP lookup by a factor of up to two, with less than 1% storage increase. As future work, we will implement LACF in real network routers, and validate its effectiveness as an IP packet forwarding mechanism.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130399785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}