D. Migault, Daniel Palomares, Hendrik Hendrik, M. Laurent-Maknavicius
{"title":"Secure IPsec based offload architectures for mobile data","authors":"D. Migault, Daniel Palomares, Hendrik Hendrik, M. Laurent-Maknavicius","doi":"10.1145/2642687.2642690","DOIUrl":"https://doi.org/10.1145/2642687.2642690","url":null,"abstract":"Radio Access Network (RAN) are likely to be overloaded, and some places will not be able to provide the necessary requested bandwidth. In order to respond to the demand of bandwidth, overloaded RAN are currently offloading their traffic on WLAN. WLAN Access Points like (ISP provided xDSL boxes) are untrusted, unreliable and do not handle mobility. As a result, mobility, multihoming, and security cannot be handled by the network anymore, and must be handled by the terminal. This paper positions offload architectures based on IPsec and shows that IPsec can provide end-to-end security, as well as seamless connectivity across IP networks. Then, the remaining of the paper evaluates how mobility on these IPsec based architectures impacts the Quality of Service (QoS) for real time applications such as an audio streaming service. QoS is measured using network interruption time and POLQA. Measurements compare TCP/HLS and UDP/RTSP over various IPsec configurations.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic forecasting using a multi layer perceptron model","authors":"O. S. Parra, Gustavo Garcia, B. S. R. Daza","doi":"10.1145/2642687.2642705","DOIUrl":"https://doi.org/10.1145/2642687.2642705","url":null,"abstract":"The goal of failures forecasting is to predict faults in the network, doing that it is possible to guarantee reliability and quality of service in real time to maintain the network availability and reliability and to initiate appropriate actions of restoration of 'normality'. The following article describes the process performed for implementing failures prediction system in LAN using artificial neural networks multilayer Perceptron. It describes the system, the tests made for the selection of the own parameters of the neural network like the training algorithm and the obtained results.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gökçe Görbil, O. Abdelrahman, Mihajlo Pavloski, E. Gelenbe
{"title":"Storms in mobile networks","authors":"Gökçe Görbil, O. Abdelrahman, Mihajlo Pavloski, E. Gelenbe","doi":"10.1145/2642687.2642688","DOIUrl":"https://doi.org/10.1145/2642687.2642688","url":null,"abstract":"Mobile networks are vulnerable to signalling attacks and storms caused by traffic that overloads the control plane through excessive signalling, which can be introduced via malware and mobile botnets. With the advent of machine-to-machine (M2M) communications over mobile networks, the potential for signalling storms increases due to the normally periodic nature of M2M traffic and the sheer number of communicating nodes. Several mobile network operators have also experienced signalling storms due to poorly designed applications that result in service outage. The radio resource control (RRC) protocol is particularly susceptible to such attacks, motivating this work within the EU FP7 NEMESYS project which presents simulations that clarify the temporal dynamics of user behavior and signalling, allowing us to suggest how such attacks can be detected and mitigated.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems","authors":"Ana Nieto, Javier López","doi":"10.1145/2642687.2642689","DOIUrl":"https://doi.org/10.1145/2642687.2642689","url":null,"abstract":"Context-based Parametric Relationship Models (CPRM) define complex dependencies between different types of parameters. In particular, Security and QoS relationships, that may occur at different levels of abstraction, are easily iden- tified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, increase the complexity of the final diagrams used in the analysis, and makes the current solution for assessing Security and QoS tradeoff (SQT) impractical for untrained users. In this paper, we define a recommendation system based on contextual parametric relationships in accordance with the definition of CPRM. The inputs for the system are generated dynamically based on the context provided by CPRM-based systems.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121601783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-aware opportunistic routing protocol for wireless networks","authors":"M. Salehi, A. Boukerche","doi":"10.1145/2642687.2642692","DOIUrl":"https://doi.org/10.1145/2642687.2642692","url":null,"abstract":"Next hop selection can be considered as the most important challenge regarding packet routing in wireless networks. Opportunistic Routing is a novel research topic which benefits from the broadcast nature of the wireless medium to route packets to their destination more reliably. Trust management protocols, on the other hand, are developed to assist in delivering data packets in presence of attacker nodes in the network. In this paper, a novel opportunistic routing protocol is proposed which selects next hop forwarder nodes not only according to the link delivery probability between nodes, but also based upon the trust level that nodes calculate for other nodes while communicating packets. Simulation results represent that the proposed method performs well in a hostile environment where malicious nodes prevent from forwarding received packets.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"23 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamidreza Ghafghazi, Amr H. El Mougy, H. Mouftah, C. Adams
{"title":"Classification of technological privacy techniques for LTE-based public safety networks","authors":"Hamidreza Ghafghazi, Amr H. El Mougy, H. Mouftah, C. Adams","doi":"10.1145/2642687.2642693","DOIUrl":"https://doi.org/10.1145/2642687.2642693","url":null,"abstract":"Public Protection and Disaster Relief (PPDR) organizations emphasize the need for dedicated and broadband Public Safety Networks (PSNs) with the capability of providing a high level of security for critical communications. Considering the preceding fact, Long Term Evolution (LTE) has been chosen as the leading candidate technology for PSNs. However, a study of privacy challenges and requirements in LTE-based PSNs has not yet emerged. This paper aims to highlight those challenges and further discusses possible scenarios in which privacy might be violated in this particular environment. Then, a classification of technological privacy techniques is proposed in order to protect and enhance privacy in LTE-based PSNs. The given classification is a useful means for comparison and assessment of applicable privacy preserving methods. Moreover, our classification highlights further requirements and open problems for which available privacy techniques are not sufficient.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132085280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems","authors":"M. Al-Mutawa, Shivakant Mishra","doi":"10.1145/2642687.2642696","DOIUrl":"https://doi.org/10.1145/2642687.2642696","url":null,"abstract":"Offloading computations to remote servers from small mobile devices such as smartphones is a popular technique used in pervasive computing. It addresses the computing and power constraints of small mobile devices. However, a key problem with this technique is a potential loss of data privacy. When a computation is offloaded, user data also needs to be shipped to the possibly untrusted remote nodes. This paper introduces the concept of data partitioning to address this potential loss of data privacy in computation offload to remote nodes. The data partitioning approach allows a user to identify the sensitive parts of her data, which is then prevented from being shipped to untrusted remote servers. The overall execution consists of identifying sensitive parts of user data, shipping code and non-private data for remote execution and getting the results back, and then combining the results from local and remote executions on the mobile device. Data partitioning can be used for a variety of personal digital files that the users create and modify using applications. These include videos, images, audios, and perhaps even textual documents and spreadsheets. It allows mobile users to enjoy a better computing experience by not only further improving the performance and saving power, but also preserving data privacy. The paper demonstrates the applicability of the data partitioning approach via prototypes of three different applications developed for Android devices.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gowdemy Rajalingham, Yue Gao, Quang-Dung Ho, T. Le-Ngoc
{"title":"Quality of service differentiation for smart grid neighbor area networks through multiple RPL instances","authors":"Gowdemy Rajalingham, Yue Gao, Quang-Dung Ho, T. Le-Ngoc","doi":"10.1145/2642687.2642695","DOIUrl":"https://doi.org/10.1145/2642687.2642695","url":null,"abstract":"The Smart Grid (SG) optimizes the existing power grid with a reliable and secure SG Communications Network. For uplink data traffic, the Neighbor Area Network (NAN) segment's size and converge-cast traffic can be addressed with the Routing Protocol for Low Power and Lossy Networks (RPL). Additionally, a broad range of SG applications, such as monitoring, control and automation applications, have been proposed in order to achieve the anticipated SG goals. These applications, each possessing different Quality of Service (QoS) requirements such as bandwidth, latency, reliability and security, will require traffic prioritization and differentiation. Generally, QoS is addressed through queue scheduling mechanisms or prioritized channel access at the Medium Access Control (MAC) layer. In this paper, extensions to the standard MAC level QoS techniques are explored with an emphasis on network layer QoS mechanisms. Specifically, the effectiveness of multiple instances of the RPL network graph, built upon differing objective functions, for QoS differentiation is investigated. To that effect, three variants of RPL, standard RPL, multi-instance RPL (RPL-M) and multi-instance RPL with prioritized channel backoffs (RPL-M+) along with two distinct traffic classes have been examined as data traffic rate and composition was varied.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a trust security model for smart meters in an urban power grid network","authors":"Aljawharah Alnasser, N. Rikli","doi":"10.1145/2642687.2642703","DOIUrl":"https://doi.org/10.1145/2642687.2642703","url":null,"abstract":"In this paper, a network of smart meters that are part of the next generation electrical power system is considered, and are assumed to send their readings wirelessly. Cyber-attacks against such network will be addressed. An independent, distributed, and lightweight trust evaluation model is proposed and evaluated. The trust model is implemented at two levels: first at the smart meter level, where nodes collect information on its neighbor nodes and forward it to the collecting node; and second at the collecting node level, where malicious nodes are detected and isolated by requesting from the nodes to stop communicating with them. Simulation results present how fast the network use the collected data from the nodes to detect all malicious nodes.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qoe-based performance evaluation of video transmission using the BATMAN routing protocol","authors":"R. Sanchez-Iborra, M. Cano","doi":"10.1145/2642687.2642694","DOIUrl":"https://doi.org/10.1145/2642687.2642694","url":null,"abstract":"Video communications has become one of the most demanded services among end users. Furthermore, telcos forecast a great growth of this kind of transmissions during the next years, representing the majority of total Internet traffic. The strict requirements of multimedia services pose a great challenge to beat in order to provide acceptable levels of quality; even more in wireless systems, whose inherent characteristics difficult the achievement of the desired multimedia quality. Regarding wireless accessing, Mobile Ad-hoc NETworks (MANETs) are receiving a great attention due to its ease-of-deployment and decentralized architecture. The dynamic nature of these networks adds further issues for the quality provisioning of video services. For that reason, efficient ad-hoc routing protocols are needed. In this work, we evaluate the performance of the proactive routing protocol BATMAN supporting video traffic over different mesh topologies. Using computer simulation, we compare the results obtained with BATMAN with those attained for the extended and well-known routing protocol OLSR. From the results, we conclude that BATMAN presents more robustness than OLSR against the impairments introduced by the wireless medium for video transmission. However, BATMAN presents some scalability issues compared to OLSR. We show that BATMAN can be improved in terms of scalability with a proper tuning of the control-packets flooding interval.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133798554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}