{"title":"Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining","authors":"Nguyen Canh Thang, Minho Park","doi":"10.1109/ITNAC46935.2019.9077969","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077969","url":null,"abstract":"Service Function Chaining (SFC) provides a special capability that defines an ordered list of network services as a virtual chain and makes a network more flexible and manageable. However, SFC is vulnerable to various attacks caused by compromised switches, especially the middlebox-bypass attack. In this paper, we propose a system that can detect not only middlebox-bypass attacks but also other incorrect forwarding actions by compromised switches. The existing solutions to protect SFC against compromised switches and middlebox-bypass attacks can only solve individual problems. The proposed system uses both probe-based and statistics-based methods to check the probe packets with random pre-assigned keys and collect statistics from middleboxes for detecting any abnormal actions in SFC. It is shown that the proposed system takes only 0.08 ms for the packet processing while it prevents SFC from the middlebox-bypass attacks and compromised switches, which is the negligible delay.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting","authors":"J. Konorski","doi":"10.1109/ITNAC46935.2019.9077973","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077973","url":null,"abstract":"NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substitution b an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppable unless object recipients can afford costly object examination. We argue that limited-time validity of stolen credentials gives rise to a mitigation scheme that does without such examination; instead, propagation of trust in an object is carefully designed. We formulate NDN, trust, and intruder models, and specify the mitigation scheme as a Markovian infection process on a graph, whose desirable properties we establish. We validate through simulations that bogus and genuine objects can be distinguished in a probabilistic sense, and evaluate several introduced measures of interest.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes","authors":"Yong Jin, M. Tomoishi","doi":"10.1109/ITNAC46935.2019.9078020","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078020","url":null,"abstract":"End-to-end key exchange for the subsequent secret sharing and secure communication between two remote parties has been an important issue due to the threats of eavesdropping and Man-In-The-Middle (MITM) attacks. In this paper, we propose a secure end-to-end key exchange mechanism between two remote parties by cooperation of multiple devices at each party using QR (Quick Response) codes. In the key exchange process, the data transmission will be conducted by two different applications via two different infrastructure networks, SMS (Short Message Service) via cellular network (e.g. LTE, 4G, etc) and Email via Ethernet respectively, between the two remote parties using two different devices at each party in order to mitigate security risks. Public-key cryptography will be adopted for the data transmission during the key exchange and the corresponding asymmetric key pair will be used only once. The data transmission within the multiple devices at each party only uses QR codes (scan and display) without involving any network based communication. The main contribution of this paper is that a novel secure end-to-end key exchange approach has been proposed in which unless both the devices using cellular network and Ethernet have been compromised or MITM attacked by the same attacker the key will not be leaked during the exchange process. We verified the main features of the proposed mechanism and confirmed the effectiveness of the design.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilising SDN to Counter BGP Convergence Delays","authors":"H. Alotaibi, Shuo Li, M. Gregory","doi":"10.1109/ITNAC46935.2019.9078017","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078017","url":null,"abstract":"Software Defined Networking (SDN) is a new paradigm for the control and management of computer networks and it is now a focus for research and industrial development. SDN revolutionizes network operation, design, and management through centralized control, abstractions, flexibility and programmability. In multi-domain SDN, domains are connected using the Border Gateway Protocol (BGP) to exchange routing and path information among the domains or different autonomous systems. BGP is a long-established protocol that has remained fairly static over time. BGP suffers from a high convergence time when updates are made, and this is detrimental to the flexible operation of modern IP networks. In this paper, we investigate how the SDN paradigm could be applied to improve multi-domain SDN traffic control and management mechanism. Research into a new multi-state BGP engine is introduced that reduces the high BGP convergence time in multi-domain SDN. Improvements to BGP operation that contribute to its integration in future SDN-based flexible and programmatic networking is an important outcome.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132527573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routing","authors":"Da-Ren Chen, Hao-Yen Chang, Ye-Zheng Chen","doi":"10.1109/ITNAC46935.2019.9077948","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077948","url":null,"abstract":"A transportation network for the coal-fired power plant is very complicated and custom-designed. It requires special transportation equipment such as coal sieving, crusher machines connecting transportation belts with different capability of input/output and speeds to different directions. In this paper, we analyze the max-cut and min-flow properties of the coal transportation network in a thermal power plant in Taiwan. Firstly, we analyze the current daily operational coal transportation and model several transportation modes based on minimum spanning tree from a dedicate ship uploaders to each coal-fired generators. Secondly, based on the derived modes, we propose fault-tolerant routing for one-to-one, one-to-many and many-to-many transportation in different operation cases. The routing algorithms are implemented with a web-based user friendly software using JAVA. Finally, the transportation performance is evaluated by using a max-cut min-flow theorem and we conclude this paper.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131344720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous Systems","authors":"Liwei Yang, W. Zhang, Lining Deng, Junning Zhang","doi":"10.1109/ITNAC46935.2019.9077960","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077960","url":null,"abstract":"Visible Light Communication (VLC) systems are becoming an effective means of wireless communication with the potential to provide dense and fast connectivity at low cost. In this paper, we consider a VLC-WiFi heterogeneous system and investigate dynamic resource allocation for a multi-user environment to maximize the downlink capacity. This work addresses the joint allocation problem of assigning users to Access points (APs) and scheduling them to resource blocks (RBs). An improved Proportional Fairness (PF) algorithm is proposed that takes into account the fairness of the hybrid heterogeneous VLC-WiFi network. Simulation results demonstrate that the proposed algorithm outperforms the traditional PF scheme, while the simulations have also illustrated the effectiveness of the proposed method.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ghaffar, Xue Jun Li, Boon-Chong Seet, W. A. Awan, Niamat Hussain
{"title":"Compact Multiband Frequency Reconfigurable Antenna for 5G Communications","authors":"A. Ghaffar, Xue Jun Li, Boon-Chong Seet, W. A. Awan, Niamat Hussain","doi":"10.1109/ITNAC46935.2019.9077974","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077974","url":null,"abstract":"This paper presents a frequency reconfigurable antenna with compact size to cover sub 6 GHz. First, a wideband triangle shape antenna is designed to cover from 2.31 GHz to 4.4 GHz. Two slots are included in the design to get multiband response. To make the antenna frequency reconfigurable, two pin diodes are added to get dual-band and tri-band mode. By changing the states of pin diode, resonance in the sub 6GHz band (2.5 GHz, 3.5 GHz, and 3.7-4.2 GHz) is achieved. When both diodes are on, it resonate at 2.18-2.36 GHz, 2.68-3.32GHz, and 3.75-4.50 GHz. In dual-band case, when both diodes are off, the resonance frequency is 2.25-2.58 GHz, and 3.5-4.46 GHz.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rate Matching Pattern Estimation","authors":"Byoungjo Choi, S. Berber","doi":"10.1109/ITNAC46935.2019.9077982","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077982","url":null,"abstract":"Rate matching in 3GPP standard is a process of getting the right amount of bits out of full-rate channel encoded bits, either by repetition or by puncturing, at the transmitter. The rate matching parameters may not be available at the receiver in various non-cooperative communication contexts, and the estimation of the rate matching pattern is required before any channel decoding attempt. A generic rate matching pattern estimation problem is formally formulated for repetitive rate matching. A set of ML estimators are derived based on the conditional probability of the observed bit-repetition index over a perfect channel as well as over BSC channel. Their performances are explored through simulations. It was found that the detection error rate of the proposed ML estimator was relatively high when very few bits are repeated, but was reduced by our ML estimator exploiting multiple observations.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123102329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Inference Graph of Cybersecurity Rules","authors":"Dawood Sheniar, Nabeel Hadaad, R. Addie","doi":"10.1109/ITNAC46935.2019.9077958","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077958","url":null,"abstract":"The concept that cybersecurity architecture is the discovery, definition and validation of rules is introduced. The new concept of inference graphs for illustrating the relationship between cybersecurity rules is defined. Three increasingly complex examples of inference graphs for systems needing cybersecurity architecture are presented, including the detailed proofs which form the basis of these inference graphs, in some cases. The software which has been developed to support the development and use of cybersecurity inference graphs is described including details of the public server where it can be used. It is shown that cybersecurity inference graphs can significantly contribute to development of, and validation of cybersecurity and also that rigorous validation of cybersecurity is not necessarily as difficult as previously thought.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G and the Future of Security in ICT","authors":"D. Soldani","doi":"10.1109/ITNAC46935.2019.9078011","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078011","url":null,"abstract":"This work analyzes the most significant root cause categories of Telecoms security incidents over the recent years, prominent initiatives to mitigate the identified cyber security threats and associated risks, and joint efforts on cyber security standards and certification frameworks, ongoing globally. The benefits of 5G requirements, technologies, new threat landscape, system assets and security control zone, and enhanced solutions to product, deployment and operation, and application security are then presented. Reduction of national dependency on any one supplier -irrespective of its country of origin -and a more competitive, sustainable and diverse Telecoms supply chain, along with proper risk mitigation and transparency measures is the most effective solution to 5G, and beyond, cyber security.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122006770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}