Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana, Thilakarathna, Suranga Seneviratne, Ralph Holz, Mahbub Hassan, Albert Y. Zomaya
{"title":"LoRadar: LoRa sensor network monitoring through passive packet sniffing","authors":"Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana, Thilakarathna, Suranga Seneviratne, Ralph Holz, Mahbub Hassan, Albert Y. Zomaya","doi":"10.1145/3431832.3431835","DOIUrl":"https://doi.org/10.1145/3431832.3431835","url":null,"abstract":"IoT deployments targeting different application domains are being unfolded at various administrative levels such as countries, states, corporations, or even individual households. Facilitating data transfers between deployed sensors and back-end cloud services is an important aspect of IoT deployments. These data transfers are usually done using Low Power WAN technologies (LPWANs) that have low power consumption and support longer transmission ranges. LoRa (Long Range) is one such technology that has recently gained significant popularity due to its ease of deployment. In this paper, we present LoRadar , a passive packet sniffing framework for LoRa’s Medium Access Control (MAC) protocol, LoRaWAN. LoRadar is built using commodity hardware. By carrying out passive measurements at a given location, LoRadar provides key insights of LoRa deployments such as available LoRa networks, deployed sensors, their make, and transmission patterns. Since LoRa deployments are becoming more pervasive, these information are pivotal in characterizing network performance, comparing different LoRa operators, and in emergencies or tactical operations to quickly assess available sensing infrastructure at a given geographical location. We validate the performance of LoRadar in both laboratory and real network settings and conduct a measurement study at eight key locations distributed over a large city-wide geographical area to provide an in-depth analysis of the landscape of commercial IoT deployments. Furthermore, we show the usage of LoRadar in improving the network such as potential collision and jamming detection, device localization, as well as spectrum policing to identify devices that violate the daily duty-cycle quota. Our results show that most of the devices transmitting over the SF12 data rate at one of the survey location were violating the network provider’s quota.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards passive analysis of anycast in global routing: unintended impact of remote peering","authors":"Rui-Ling Bian, Shuai Hao, Haining Wang, Amogh Dhamdere, A. Dainotti, Chase Cotton","doi":"10.1145/3371927.3371930","DOIUrl":"https://doi.org/10.1145/3371927.3371930","url":null,"abstract":"Anycast has been widely adopted by today's Internet services, including DNS, CDN, and DDoS protection, in which the same IP address is announced from distributed locations and clients are directed to the topologically-nearest service replica. Prior research has focused on various aspects of anycast, either its usage in particular services such as DNS or characterizing its adoption by Internet-wide active probing methods. In this paper, we first explore an alternative approach to characterize anycast based on previously collected global BGP routing information. Leveraging state-of-the-art active measurement results as near-ground-truth, our passive method without requiring any Internet-wide probes can achieve 90% accuracy in detecting anycast prefixes. More importantly, our approach uncovers anycast prefixes that have been missed by prior datasets based on active measurements. While investigating the root causes of inaccuracy, we reveal that anycast routing has been entangled with the increased adoption of remote peering, a type of layer-2 interconnection where an IP network may peer at an IXP remotely without being physically present at the IXP. The invisibility of remote peering from layer-3 breaks the assumption of the shortest AS paths on BGP and causes an unintended impact on anycast performance. We identify such cases from BGP routing information and observe that at least 19.2% of anycast prefixes have been potentially impacted by remote peering.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126633266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lessons from \"a first-principles approach to understanding the internet's router-level topology\"","authors":"D. Alderson, J. Doyle, W. Willinger","doi":"10.1145/3371934.3371964","DOIUrl":"https://doi.org/10.1145/3371934.3371964","url":null,"abstract":"Our main purpose for this editorial is to reiterate the main message that we tried to convey in our SIGCOMM'04 paper but that got largely lost in all the hype surrounding the use of scale-free network models throughout the sciences in the last two decades. That message was that because of (1) the Internet's highly-engineered architecture, (2) a thorough understanding of its component technologies, and (3) the availability of extensive (but typically noisy) measurements, this complex man-made system affords unique opportunities to unambiguously resolve most claims about its properties, structure, and functionality. In the process, we point out the fallacy of popular approaches that consider complex systems such as the Internet from the perspective of disorganized complexity and argue for renewed efforts and increased focus on advancing an \"architecture first\" view with its emphasis on studying the organized complexity of systems such as the Internet.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy trading in the surveillance capitalism age viewpoints on 'privacy-preserving' societal value creation","authors":"R. Pal, J. Crowcroft","doi":"10.1145/3371927.3371931","DOIUrl":"https://doi.org/10.1145/3371927.3371931","url":null,"abstract":"In the modern era of the mobile apps (part of the era of surveillance capitalism, a famously coined term by Shoshana Zuboff), huge quantities of data about individuals and their activities offer a wave of opportunities for economic and societal value creation. However, the current personal data ecosystem is mostly de-regulated, fragmented, and inefficient. On one hand, end-users are often not able to control access (either technologically, by policy, or psychologically) to their personal data which results in issues related to privacy, personal data ownership, transparency, and value distribution. On the other hand, this puts the burden of managing and protecting user data on profit-driven apps and ad-driven entities (e.g., an ad-network) at a cost of trust and regulatory accountability. Data holders (e.g., apps) may hence take commercial advantage of the individuals' inability to fully anticipate the potential uses of their private information, with detrimental effects for social welfare. As steps to improve social welfare, we comment on the the existence and design of efficient consumer-data releasing ecosystems aimed at achieving a maximum social welfare state amongst competing data holders. In view of (a) the behavioral assumption that humans are 'compromising' beings, (b) privacy not being a well-boundaried good, and (c) the practical inevitability of inappropriate data leakage by data holders upstream in the supply-chain, we showcase the idea of a regulated and radical privacy trading mechanism that preserves the heterogeneous privacy preservation constraints (at an aggregate consumer, i.e., app, level) upto certain compromise levels, and at the same time satisfying commercial requirements of agencies (e.g., advertising organizations) that collect and trade client data for the purpose of behavioral advertising. More specifically, our idea merges supply function economics, introduced by Klemperer and Meyer, with differential privacy, that, together with their powerful theoretical properties, leads to a stable and efficient, i.e., a maximum social welfare, state, and that too in an algorithmically scalable manner. As part of future research, we also discuss interesting additional techno-economic challenges related to realizing effective privacy trading ecosystems.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Greenberg, D. Maltz, J. Rexford, G. Xie, Jibin Zhan, Hui Zhang
{"title":"Reflections on a clean slate 4D approach to network control and management","authors":"A. Greenberg, D. Maltz, J. Rexford, G. Xie, Jibin Zhan, Hui Zhang","doi":"10.1145/3371934.3371962","DOIUrl":"https://doi.org/10.1145/3371934.3371962","url":null,"abstract":"It's been 15 years since what we now call Software Defined Network began emerging out of a set of ideas in the networking research community. This editorial note traces how the ideas in one particular paper from that time have evolved and found practical applications.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflections on being SIGCOMM chair 2013--2017","authors":"S. Keshav","doi":"10.1145/3371934.3371942","DOIUrl":"https://doi.org/10.1145/3371934.3371942","url":null,"abstract":"This article discusses my personal view of being Chair of SIGCOMM from 2013 to 2017.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepak Vasisht, Swarun Kumar, Hariharan Rahul, D. Katabi
{"title":"Perspective: eliminating channel feedback in next generation cellular networks","authors":"Deepak Vasisht, Swarun Kumar, Hariharan Rahul, D. Katabi","doi":"10.1145/3371934.3371967","DOIUrl":"https://doi.org/10.1145/3371934.3371967","url":null,"abstract":"The ever-increasing demand for data has forced cellular networks towards advanced multi-antenna (MIMO) techniques. However, advanced MIMO solutions such as massive MIMO, coordinated multi-point, distributed MIMO, and multi-user MIMO, all require the base station to know the downlink channels to the client. In the absence of this information, the base station cannot beamform its signal to its users. Therefore, base stations require user devices to perform the measurements and send the channels back to the basestation as feedback. This feedback generates significant overhead that scales linearly with the number of antennas, and is a bottleneck for next generation of cellular networks with large antenna deployments.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Médard, S. Katti, D. Katabi, Wenjun Hu, Hariharan Rahul, J. Crowcroft
{"title":"XORs in the past and future","authors":"M. Médard, S. Katti, D. Katabi, Wenjun Hu, Hariharan Rahul, J. Crowcroft","doi":"10.1145/3371934.3371959","DOIUrl":"https://doi.org/10.1145/3371934.3371959","url":null,"abstract":"While placing the paper \"XORs in the Air\" in the context of the theoretical and practical understanding of network coding, we present a view of the progress of the field of network coding, In particular, we examine the interplay of theory and practice in the field.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116197104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The skillful interrogation of the internet","authors":"M. Crovella","doi":"10.1145/3371934.3371940","DOIUrl":"https://doi.org/10.1145/3371934.3371940","url":null,"abstract":"As SIGCOMM turns 50, it's interesting to ask how networking research has evolved over time. This is a set of personal observations about the \"mindset\" associated with Internet research.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"62 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retrospective on \"fragmentation considered harmful\"","authors":"J. Mogul, Christopher A. Kantarjiev","doi":"10.1145/3371934.3371950","DOIUrl":"https://doi.org/10.1145/3371934.3371950","url":null,"abstract":"We look back at our 1987 paper, \"Fragmentation Considered Harmful,\" to explain why we wrote it, how the prevalence of fragmentation was reduced by approaches such as Path MTU Discovery, and how fragmentation-related issues still lurk in today's Internet. Our paper listed several reasons why we thought fragmentation was harmful; some were more true in 1987 than they are today, and after our paper was published, the community realized that fragmentation (and the mechanisms used to mitigate it) exposed harms we did not anticipate in our paper.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123677411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}