Proceedings of the 24th Annual International Conference on Mobile Computing and Networking最新文献

筛选
英文 中文
Towards Replay-resilient RFID Authentication 面向重放弹性RFID认证
Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, H. Ding, Jizhong Zhao
{"title":"Towards Replay-resilient RFID Authentication","authors":"Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, H. Ding, Jizhong Zhao","doi":"10.1145/3241539.3241541","DOIUrl":"https://doi.org/10.1145/3241539.3241541","url":null,"abstract":"We provide the first solution to an important question, \"how a physical-layer authentication method can defend against signal replay attacks''. It was believed that if an attacker can replay the exact same reply signal of a legitimate authentication object (such as an RFID tag), any physical-layer authentication method will fail. This paper presents Hu-Fu, the first physical layer RFID authentication protocol that is resilient to the major attacks including tag counterfeiting, signal replay, signal compensation, and brute-force feature reply. Hu-Fu is built on two fundamental ideas, namely inductive coupling of two tags and signal randomization. Hu-Fu does not require any hardware or protocol modification on COTS passive tags and can be implemented with COTS devices. We implement a prototype of Hu-Fu and demonstrate that it is accurate and robust to device diversity and environmental changes, including locations, distance, and temperature. Hu-Fu provides a new direction of battery-free/low-power device authentication that enables numerous IoT applications.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Cisco DNA-C as a Platform 思科DNA-C平台
S. Prabhu, B. Raju, Laxmi Mukund
{"title":"Cisco DNA-C as a Platform","authors":"S. Prabhu, B. Raju, Laxmi Mukund","doi":"10.1145/3241539.3267712","DOIUrl":"https://doi.org/10.1145/3241539.3267712","url":null,"abstract":"Cisco DNA Center is the foundational controller and analytics Center at the heart of Cisco's intent-based network. DNA Center supports the expression of intent for multiple use cases, including base automation capabilities, fabric provisioning, and policy-based segmentation in the enterprise network. DNA Center adds context to this journey through the introduction of Analytics and Assurance. DNA Center provides end-to-end visibility into the network with full context through data and insights","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link Linux去苹果采摘:跨平台自组织通信与苹果无线直接链接
Milan Stute, David Kreitschmann, M. Hollick
{"title":"Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link","authors":"Milan Stute, David Kreitschmann, M. Hollick","doi":"10.1145/3241539.3267716","DOIUrl":"https://doi.org/10.1145/3241539.3267716","url":null,"abstract":"Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wireless ad hoc protocol that Apple introduced around 2014 and which is the base for applications such as AirDrop and AirPlay. We have reverse engineered the protocol and explain its frame format and operation in our MobiCom '18 paper \"One Billion Apples' Secret Sauce: Recipe of the Apple Wireless Direct Link Ad hoc Protocol.\" AWDL builds on the IEEE 802.11 standard and implements election, synchronization, and channel hopping mechanisms on top of it. Furthermore, AWDL features an IPv6-based data path which enables direct communication. To validate our own work, we implement a working prototype of AWDL on Linux-based systems. Our implementation is written in C, runs in userspace, and makes use of Linux's Netlink API for interactions with the system's networking stack and the pcap library for frame injection and reception. In our demonstrator, we show how our Linux system synchronizes to an existing AWDL cluster or takes over the master role itself. Furthermore, it can receive data frames from and send them to a MacBook or iPhone via AWDL. We demonstrate the data exchange via ICMPv6 echo request and replies as well as sending and receiving data over a TCP connection.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128908751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MobiCom'18 Panel: Hammer & Nail vis-a-vis AI / ML Applications to Networked Systems MobiCom’18专题讨论:面向网络系统的AI / ML应用
P. Bhagwat, A. Goldsmith, Manish Gupta, R. Rastogi, Gautam M. Shroff
{"title":"MobiCom'18 Panel: Hammer & Nail vis-a-vis AI / ML Applications to Networked Systems","authors":"P. Bhagwat, A. Goldsmith, Manish Gupta, R. Rastogi, Gautam M. Shroff","doi":"10.1145/3241539.3241590","DOIUrl":"https://doi.org/10.1145/3241539.3241590","url":null,"abstract":"Artificial Intelligence (AI) and Machine Learning (ML) approaches, well known from IT disciplines, are beginning to excite the networking and networked systems community. Of late, we are seeing a huge excitement about applying AI and ML to networked systems. Is this merely a hype? Are there use cases and genuine applications that could lead to real deployment and practical solutions? What are the key challenges in applying AI and ML to networked systems? Can researchers and practitioners in communication networks and networked systems tap into machine learning and AI techniques to optimize network architecture, control and management, leading to increased automation in network operations? Can researchers and practitioners in the AI community explore synergy with networking researchers to optimize network architecture and design? The above are some of the questions that would be addressed during the panel discussion. The objective of the panel discussion would be to tap the minds of the global experts in order to understand the merits and limitations and the future landscape in the intersection of networking/networked systems and AI/ML.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Demos and Exhibits 会议详情:演示和展览
Amit Saha
{"title":"Session details: Demos and Exhibits","authors":"Amit Saha","doi":"10.1145/3285067","DOIUrl":"https://doi.org/10.1145/3285067","url":null,"abstract":"","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintaining UAV Stability using Low-Power WANs 利用低功耗广域网维护无人机稳定性
Akshay Gadre, Revathy Narayanan, Swarun Kumar
{"title":"Maintaining UAV Stability using Low-Power WANs","authors":"Akshay Gadre, Revathy Narayanan, Swarun Kumar","doi":"10.1145/3241539.3267747","DOIUrl":"https://doi.org/10.1145/3241539.3267747","url":null,"abstract":"Future urban spaces are expected to see Unmanned Aerial Vehicles (UAVs) deployed for wide-ranging applications including product delivery, imaging and search-and-rescue. Yet today's UAVs rely critically on inertial sensors and GPS to remain stable in-flight, meaning they struggle to penetrate urban canyons where GPS is unavailable. This poster presents LoRaTilt, a system that maintains stability of a UAV using a Low-Power Wide-Area Network (LP-WAN) transmitter. We mount a light-weight and ten-year battery-powered LP-WAN transmitter on a UAV and process its signals from base stations up to hundreds of meter away. We demonstrate how our system estimates and corrects for UAV drift in GPS-denied settings with minimal impact on the cost and flight life of a UAV. Our proof-of-concept experiments show a promising median accuracy of 1.2326 mm and 0.0164 radians in estimating the displacement and orientation of a drone with a LoRa LP-WAN radio.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132457628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An SDN Based Content Cache at the WiFi Edge 基于SDN的WiFi边缘内容缓存
Lalhruaizela Chhangte, D. Manjunath, N. Karamchandani
{"title":"An SDN Based Content Cache at the WiFi Edge","authors":"Lalhruaizela Chhangte, D. Manjunath, N. Karamchandani","doi":"10.1145/3241539.3267752","DOIUrl":"https://doi.org/10.1145/3241539.3267752","url":null,"abstract":"We describe the current version of Wi-Cache, a SDN framework for caching at the WiFi edge. Wi-Cache is motivated by the belief that edge caching technologies are needed to augment emerging network technologies to meet the increasing (volume, quality, and variety) demand for content, which is itself changing its characteristics significantly. Wi-Cache is being used to test new ideas for edge caching. Specifically, Wi-Cache is a framework for edge caching which allows caching and delivery of content on WiFi APs. Apart from a network induced handoff of clients, it allows communication between the APs for content delivery. We have also developed an API that is exposed for implementation of algorithms for content delivery and placement, and cache replacement.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication 近距离证明:安全和可用的移动双因素认证
Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yaochao Zhang, Terri Hedgpeth
{"title":"Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication","authors":"Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yaochao Zhang, Terri Hedgpeth","doi":"10.1145/3241539.3241574","DOIUrl":"https://doi.org/10.1145/3241539.3241574","url":null,"abstract":"Mobile two-factor authentication (2FA) has become commonplace along with the popularity of mobile devices. Current mobile 2FA solutions all require some form of user effort which may seriously affect the experience of mobile users, especially senior citizens or those with disability such as visually impaired users. In this paper, we propose Proximity-Proof, a secure and usable mobile 2FA system without involving user interactions. Proximity-Proof automatically transmits a user's 2FA response via inaudible OFDM-modulated acoustic signals to the login browser. We propose a novel technique to extract individual speaker and microphone fingerprints of a mobile device to defend against the powerful man-in-the-middle (MiM) attack. In addition, Proximity-Proof explores two-way acoustic ranging to thwart the co-located attack. To the best of our knowledge, Proximity-Proof is the first mobile 2FA scheme resilient to the MiM and co-located attacks. We empirically analyze that Proximity-Proof is at least as secure as existing mobile 2FA solutions while being highly usable. We also prototype Proximity-Proof and confirm its high security, usability, and efficiency through comprehensive user experiments.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"27 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Scalable Network Slicing Architecture for 5G 面向5G的可扩展网络切片架构
Tulja Vamshi Kiran Buyakar, P. Amogh, T. B. Reddy, A. Franklin
{"title":"Scalable Network Slicing Architecture for 5G","authors":"Tulja Vamshi Kiran Buyakar, P. Amogh, T. B. Reddy, A. Franklin","doi":"10.1145/3241539.3267762","DOIUrl":"https://doi.org/10.1145/3241539.3267762","url":null,"abstract":"The diversified use cases of next-generation mobile networks can be realized by the key concept of Network Slicing that enables mobile network operators to slice a single physical network into multiple virtual network instances optimized to specific services and business goals. Scaling of network slices is required to cope with the resources needed for peak traffic demand. In this paper, we demonstrate scaling of network slices based on the type of network slice such as enhanced Mobile Broadband (eMBB), massive Machine Type Communication (mMTC) in order to ensure Service Level Agreement (SLA) guarantees of the network slices with the help of our proposed Network Slicing Profiler (NSP) and Network Slice Scaling Function (NSSF) in an ETSI MANO based network slicing framework.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low Latency Mobile Augmented Reality with Flexible Tracking 具有灵活跟踪的低延迟移动增强现实
Wenxiao Zhang, B. Han, P. Hui
{"title":"Low Latency Mobile Augmented Reality with Flexible Tracking","authors":"Wenxiao Zhang, B. Han, P. Hui","doi":"10.1145/3241539.3267719","DOIUrl":"https://doi.org/10.1145/3241539.3267719","url":null,"abstract":"Jaguar is a mobile Augmented Reality (AR) framework that leverages GPU acceleration on edge cloud to push the limit of end-to-end latency for AR systems and enable accurate and large-scale object recognition based on image retrieval. It integrates the emerging AR development tools (e.g., ARCore and ARKit) into its client design for achieving flexible, robust and context-aware object tracking. Our prototype implementation of Jaguar reduces the end-to-end AR latency to ~33 ms and achieves accurate six degrees of freedom (6DoF) tracking. In this demo, we will show that our Jaguar client recognizes movie posters within the camera view by offloading computation intensive tasks to edge cloud and augments these posters with their movie trailers in 3D upon receiving the recognition results.","PeriodicalId":378965,"journal":{"name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信