2019 29th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

筛选
英文 中文
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining 检测业务功能链中的受损交换机和Middlebox-Bypass攻击
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077969
Nguyen Canh Thang, Minho Park
{"title":"Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining","authors":"Nguyen Canh Thang, Minho Park","doi":"10.1109/ITNAC46935.2019.9077969","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077969","url":null,"abstract":"Service Function Chaining (SFC) provides a special capability that defines an ordered list of network services as a virtual chain and makes a network more flexible and manageable. However, SFC is vulnerable to various attacks caused by compromised switches, especially the middlebox-bypass attack. In this paper, we propose a system that can detect not only middlebox-bypass attacks but also other incorrect forwarding actions by compromised switches. The existing solutions to protect SFC against compromised switches and middlebox-bypass attacks can only solve individual problems. The proposed system uses both probe-based and statistics-based methods to check the probe packets with random pre-assigned keys and collect statistics from middleboxes for detecting any abnormal actions in SFC. It is shown that the proposed system takes only 0.08 ms for the packet processing while it prevents SFC from the middlebox-bypass attacks and compromised switches, which is the negligible delay.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting 减轻NDN设置中受时间限制的被盗凭据内容中毒
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077973
J. Konorski
{"title":"Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting","authors":"J. Konorski","doi":"10.1109/ITNAC46935.2019.9077973","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077973","url":null,"abstract":"NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substitution b an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppable unless object recipients can afford costly object examination. We argue that limited-time validity of stolen credentials gives rise to a mitigation scheme that does without such examination; instead, propagation of trust in an object is carefully designed. We formulate NDN, trust, and intruder models, and specify the mitigation scheme as a Markovian infection process on a graph, whose desirable properties we establish. We validate through simulations that bogus and genuine objects can be distinguished in a probabilistic sense, and evaluate several introduced measures of interest.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes 基于QR码的多设备合作的安全端到端密钥交换机制
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078020
Yong Jin, M. Tomoishi
{"title":"A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes","authors":"Yong Jin, M. Tomoishi","doi":"10.1109/ITNAC46935.2019.9078020","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078020","url":null,"abstract":"End-to-end key exchange for the subsequent secret sharing and secure communication between two remote parties has been an important issue due to the threats of eavesdropping and Man-In-The-Middle (MITM) attacks. In this paper, we propose a secure end-to-end key exchange mechanism between two remote parties by cooperation of multiple devices at each party using QR (Quick Response) codes. In the key exchange process, the data transmission will be conducted by two different applications via two different infrastructure networks, SMS (Short Message Service) via cellular network (e.g. LTE, 4G, etc) and Email via Ethernet respectively, between the two remote parties using two different devices at each party in order to mitigate security risks. Public-key cryptography will be adopted for the data transmission during the key exchange and the corresponding asymmetric key pair will be used only once. The data transmission within the multiple devices at each party only uses QR codes (scan and display) without involving any network based communication. The main contribution of this paper is that a novel secure end-to-end key exchange approach has been proposed in which unless both the devices using cellular network and Ethernet have been compromised or MITM attacked by the same attacker the key will not be leaked during the exchange process. We verified the main features of the proposed mechanism and confirmed the effectiveness of the design.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilising SDN to Counter BGP Convergence Delays 利用SDN对抗BGP收敛延迟
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078017
H. Alotaibi, Shuo Li, M. Gregory
{"title":"Utilising SDN to Counter BGP Convergence Delays","authors":"H. Alotaibi, Shuo Li, M. Gregory","doi":"10.1109/ITNAC46935.2019.9078017","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078017","url":null,"abstract":"Software Defined Networking (SDN) is a new paradigm for the control and management of computer networks and it is now a focus for research and industrial development. SDN revolutionizes network operation, design, and management through centralized control, abstractions, flexibility and programmability. In multi-domain SDN, domains are connected using the Border Gateway Protocol (BGP) to exchange routing and path information among the domains or different autonomous systems. BGP is a long-established protocol that has remained fairly static over time. BGP suffers from a high convergence time when updates are made, and this is detrimental to the flexible operation of modern IP networks. In this paper, we investigate how the SDN paradigm could be applied to improve multi-domain SDN traffic control and management mechanism. Research into a new multi-state BGP engine is introduced that reduces the high BGP convergence time in multi-domain SDN. Improvements to BGP operation that contribute to its integration in future SDN-based flexible and programmatic networking is an important outcome.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132527573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routing 基于容错路由的输煤网络的最大割最小流定理
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077948
Da-Ren Chen, Hao-Yen Chang, Ye-Zheng Chen
{"title":"Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routing","authors":"Da-Ren Chen, Hao-Yen Chang, Ye-Zheng Chen","doi":"10.1109/ITNAC46935.2019.9077948","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077948","url":null,"abstract":"A transportation network for the coal-fired power plant is very complicated and custom-designed. It requires special transportation equipment such as coal sieving, crusher machines connecting transportation belts with different capability of input/output and speeds to different directions. In this paper, we analyze the max-cut and min-flow properties of the coal transportation network in a thermal power plant in Taiwan. Firstly, we analyze the current daily operational coal transportation and model several transportation modes based on minimum spanning tree from a dedicate ship uploaders to each coal-fired generators. Secondly, based on the derived modes, we propose fault-tolerant routing for one-to-one, one-to-many and many-to-many transportation in different operation cases. The routing algorithms are implemented with a web-based user friendly software using JAVA. Finally, the transportation performance is evaluated by using a max-cut min-flow theorem and we conclude this paper.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131344720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous Systems 可见光通信(VLC)- WiFi异构系统的动态资源分配
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077960
Liwei Yang, W. Zhang, Lining Deng, Junning Zhang
{"title":"Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous Systems","authors":"Liwei Yang, W. Zhang, Lining Deng, Junning Zhang","doi":"10.1109/ITNAC46935.2019.9077960","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077960","url":null,"abstract":"Visible Light Communication (VLC) systems are becoming an effective means of wireless communication with the potential to provide dense and fast connectivity at low cost. In this paper, we consider a VLC-WiFi heterogeneous system and investigate dynamic resource allocation for a multi-user environment to maximize the downlink capacity. This work addresses the joint allocation problem of assigning users to Access points (APs) and scheduling them to resource blocks (RBs). An improved Proportional Fairness (PF) algorithm is proposed that takes into account the fairness of the hybrid heterogeneous VLC-WiFi network. Simulation results demonstrate that the proposed algorithm outperforms the traditional PF scheme, while the simulations have also illustrated the effectiveness of the proposed method.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compact Multiband Frequency Reconfigurable Antenna for 5G Communications 用于5G通信的紧凑型多波段频率可重构天线
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077974
A. Ghaffar, Xue Jun Li, Boon-Chong Seet, W. A. Awan, Niamat Hussain
{"title":"Compact Multiband Frequency Reconfigurable Antenna for 5G Communications","authors":"A. Ghaffar, Xue Jun Li, Boon-Chong Seet, W. A. Awan, Niamat Hussain","doi":"10.1109/ITNAC46935.2019.9077974","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077974","url":null,"abstract":"This paper presents a frequency reconfigurable antenna with compact size to cover sub 6 GHz. First, a wideband triangle shape antenna is designed to cover from 2.31 GHz to 4.4 GHz. Two slots are included in the design to get multiband response. To make the antenna frequency reconfigurable, two pin diodes are added to get dual-band and tri-band mode. By changing the states of pin diode, resonance in the sub 6GHz band (2.5 GHz, 3.5 GHz, and 3.7-4.2 GHz) is achieved. When both diodes are on, it resonate at 2.18-2.36 GHz, 2.68-3.32GHz, and 3.75-4.50 GHz. In dual-band case, when both diodes are off, the resonance frequency is 2.25-2.58 GHz, and 3.5-4.46 GHz.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Rate Matching Pattern Estimation 速率匹配模式估计
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077982
Byoungjo Choi, S. Berber
{"title":"Rate Matching Pattern Estimation","authors":"Byoungjo Choi, S. Berber","doi":"10.1109/ITNAC46935.2019.9077982","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077982","url":null,"abstract":"Rate matching in 3GPP standard is a process of getting the right amount of bits out of full-rate channel encoded bits, either by repetition or by puncturing, at the transmitter. The rate matching parameters may not be available at the receiver in various non-cooperative communication contexts, and the estimation of the rate matching pattern is required before any channel decoding attempt. A generic rate matching pattern estimation problem is formally formulated for repetitive rate matching. A set of ML estimators are derived based on the conditional probability of the observed bit-repetition index over a perfect channel as well as over BSC channel. Their performances are explored through simulations. It was found that the detection error rate of the proposed ML estimator was relatively high when very few bits are repeated, but was reduced by our ML estimator exploiting multiple observations.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123102329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Inference Graph of Cybersecurity Rules 网络安全规则推理图
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077958
Dawood Sheniar, Nabeel Hadaad, R. Addie
{"title":"The Inference Graph of Cybersecurity Rules","authors":"Dawood Sheniar, Nabeel Hadaad, R. Addie","doi":"10.1109/ITNAC46935.2019.9077958","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077958","url":null,"abstract":"The concept that cybersecurity architecture is the discovery, definition and validation of rules is introduced. The new concept of inference graphs for illustrating the relationship between cybersecurity rules is defined. Three increasingly complex examples of inference graphs for systems needing cybersecurity architecture are presented, including the detailed proofs which form the basis of these inference graphs, in some cases. The software which has been developed to support the development and use of cybersecurity inference graphs is described including details of the public server where it can be used. It is shown that cybersecurity inference graphs can significantly contribute to development of, and validation of cybersecurity and also that rigorous validation of cybersecurity is not necessarily as difficult as previously thought.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
5G and the Future of Security in ICT 5G与信息通信安全的未来
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078011
D. Soldani
{"title":"5G and the Future of Security in ICT","authors":"D. Soldani","doi":"10.1109/ITNAC46935.2019.9078011","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078011","url":null,"abstract":"This work analyzes the most significant root cause categories of Telecoms security incidents over the recent years, prominent initiatives to mitigate the identified cyber security threats and associated risks, and joint efforts on cyber security standards and certification frameworks, ongoing globally. The benefits of 5G requirements, technologies, new threat landscape, system assets and security control zone, and enhanced solutions to product, deployment and operation, and application security are then presented. Reduction of national dependency on any one supplier -irrespective of its country of origin -and a more competitive, sustainable and diverse Telecoms supply chain, along with proper risk mitigation and transparency measures is the most effective solution to 5G, and beyond, cyber security.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122006770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信