{"title":"A Method for Comparing OpenFlow and P4","authors":"Paul Zanna, P. Radcliffe, K. G. Chavez","doi":"10.1109/ITNAC46935.2019.9077951","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077951","url":null,"abstract":"OpenFlow has had a significant impact on computer networking and ushered in the age of Software Defined Networking (SDN). Now the P4 programming language promises to drive this innovation even further by allowing the unparalleled customisability of network devices. Even though they have different capabilities and goals, there is still an overlap in functionality between OpenFlow and P4. This overlap, predominately in the way packets are processed, has not been compared and therefore remains a question that could impact operators considering these two implementations. The primary reason for the lack of comparison data lies in the physical deployment model of these technologies. The inability to isolate pipeline processing and perform a comparison based on identical functionality, without the external influence from auxiliary functions, has made this type of measurement difficult. In this paper, we present such a comparison using the Zodiac FX a hybrid hardware/software Ethernet switch with a dedicated open-source firmware capable of running both implementations equally. By developing a P4 compiler backend capable of generating an equivalent packet processing pipeline for the Zodiac FX, we have been able to perform a direct like-for-like comparison of the performance and efficiency of these two approaches. This comparison highlights the similarity in performance of the two approaches when implementing the equivalent functionality on the same hardware.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cherrington, Joan Lu, David Airehrour, F. Thabtah, Qiang Xu, Samaneh Madanian
{"title":"Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials","authors":"M. Cherrington, Joan Lu, David Airehrour, F. Thabtah, Qiang Xu, Samaneh Madanian","doi":"10.1109/ITNAC46935.2019.9077992","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077992","url":null,"abstract":"Feature Selection (FS) is a crucial step in high-dimensional and big data analytics. It mitigates the ‘curse of dimensionality’ by removing redundant and irrelevant features. Most FS algorithms use a single source of data and struggle with heterogeneous data, yet multi-source (MS) and multi-view (MV) data are rich and valuable knowledge sources. This paper reviews numerous, emerging FS techniques for both these data types. The major contribution of this paper is to underscore uses and limitations of these heterogeneous methods concurrently, by summarising their capabilities and potentials to inform key areas of future research, especially in numerous applications.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri
{"title":"A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency","authors":"Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri","doi":"10.1109/ITNAC46935.2019.9077991","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077991","url":null,"abstract":"Communities globally are experiencing an increasing number of patients with medical conditions and elderly people, living alone, who need immediate attention and support in case of medical emergency incidents. At times, even calling an ambulance becomes difficult for them and even then ambulance may turn up late causing to their sufferings. On the other hand, ambulances may turn up only to find a situation a non-emergency one not requiring an ambulance but that costs them money and wastes their time. In context to such situations, informal caregivers, in forms of friends, families and neighbours, can initially attend the patients and elderly people before the arrival of ambulance. Selection of appropriate informal caregivers is critical for a patient or a particular medical emergency situation and in this paper we propose a context-aware recommendation system (CARS) to recommend appropriate informal caregivers based on a list of pre-identified context information of informal caregivers, patients and elderly people. CARS operates as part of the technology-assisted medical emergency framework introduced by us. This work discusses the different phases of CARS, namely, context dimension, context acquisition and processing and context recommendation, and explains the entire informal caregiver recommendation procedure of CARS. Preliminary simulation results have shown that our proposed CARS perform better than other such existing systems.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks","authors":"Xue Jun Li, M. Ma, N. Arjun","doi":"10.1109/ITNAC46935.2019.9078019","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078019","url":null,"abstract":"One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many security protocols have been proposed. This paper proposes character-wise encryption (CWE) method to provide better security against CP attacks (the probability of successful attack is low as 10−33) as compared to the shift-key based method. In addition, the proposed method results in shorter encryption time. For example, with a domain name length of 30, CWE can reduce the encryption time by 10.7% as compared to the shift-key based method.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhsiul Hassan, N. Nafi, Nguyen Vo, Rahul G. Thakkar, M. Gregory
{"title":"Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming","authors":"Muhsiul Hassan, N. Nafi, Nguyen Vo, Rahul G. Thakkar, M. Gregory","doi":"10.1109/ITNAC46935.2019.9077979","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077979","url":null,"abstract":"High frequency analog beamforming, especially over 20GHz array antenna, is a challenge as the width of the feed line is reduced. In this paper different beamforming techniques have been analysed using theory and simulation to compare Beam Efficiency (BE), 3 dB beamwidth and Minimum Side-lobe Level (MSLL). Techniques such as Gaussian, Taylor, and Chebyshev give more power levels that are complicated to implement in a very thin substrate system. Staircase power distribution is an exciting recent technique, and that can be tailored to reduce the number of power levels with the same features as in BE, 3 dB beamwidth and MSLL, which is a significant achievement. The analysis can be used to design power distribution feed lines for high frequency array antenna.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124126254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James Jin Kang, Kiran Fahd, S. Venkatraman, Rolando Trujillo-Rasua, P. Dowland
{"title":"Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks","authors":"James Jin Kang, Kiran Fahd, S. Venkatraman, Rolando Trujillo-Rasua, P. Dowland","doi":"10.1109/ITNAC46935.2019.9077977","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077977","url":null,"abstract":"Affordable and expandable low power networks such as 5G and Low Power Wide Area Networks (LPWAN) in the public and private network areas have improved network bandwidth capacities and processing performance. Internet of Things (IoT) technologies are increasing in popularity with numerous applications and devices being developed for smart environments and health-related applications. This raises security concerns in these networks, as many IoT devices handle confidential information such as IP/MAC addresses, which could be used to identify a user's location. As a result, there is vulnerability to data tampering by man-in-the-middle (MITM) attacks, which feature two observable characteristics: (1) there is a measurable delay in the session and (2) has unusual travel times compared to prior normal transactions. To improve the detection of these attacks, this paper proposes a novel scheme using a hybrid routing mechanism, which involves appointing dedicated nodes for enforcing routing between IoT devices and users with minimal intervention and workload to the network. The function of dedicated devices with more computational and battery power can provide three advantages: (1) determine secured paths within the network by avoiding suspicious nodes and networks, (2) provide stable travel times (less fluctuations) for a trusted time server (TTS) to improve the accuracy of estimated travel times, and (3) provide packet inspection for security checks. This proposed solution contributes towards increasing the security of IoT networks by enabling the real-time detection of intruders.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relay Selection Scheme for Energy Harvesting IoT Networks with Direct Link","authors":"Chenchen Liu, Yuyang Zheng, Zhengyu Zhang, Weilong Ren","doi":"10.1109/ITNAC46935.2019.9077994","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077994","url":null,"abstract":"In this paper, we propose a relay selection scheme in an energy-harvesting relay Internet of things network, which contains a source node, a multi-relay node and a destination node. The direct link between the source node and the destination node is used for signal transmission. In the proposed scheme, the relay selection is based on the instantaneous channel status information of the wireless link, which can decrease the outage probability. In addition, the relay node employs the technique of simultaneous wireless information and power transfer to harvest energy, and each relay node is equipped with a power splitter to split the received signal into signal processing part and energy harvesting part. A closed-form and simple asymptotic expression for the outage probability of the proposed relay selection scheme is provided. Computer simulations confirm that the optimal power splitting factor of each relay node is able to minimize the outage probability. We have also verified the effectiveness of the devised strategy.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsplittable flow Edge Load factor Balancing in SDN using P4 Runtime","authors":"E. Kawaguchi, Hikaru Kasuga, N. Shinomiya","doi":"10.1109/ITNAC46935.2019.9077984","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077984","url":null,"abstract":"The spread of services and applications using cloud computing has led to an increase in the amount of network traffic. Therefore, traffic control methods using an SDN architecture for flexibly managing a network have been studied. Previous studies have proposed a traffic load balancing method by a single SDN controller. However, implementation with multiple SDN controllers has been considered to cope with scalability and redundancy. This paper model the distributed network as a flow network and defines the ratio of flow to capacity in an edge as a load factor. Besides, this study proposes a traffic load balancing method considering Unsplittable flow Edge Load factor Balancing problem and implements it to confirm its feasibility in a real network.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124883157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Random Backoff based D2D Discovery in Cellular Networks","authors":"Zhongyang Yu, Boon-Chong Seet","doi":"10.1109/ITNAC46935.2019.9077983","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077983","url":null,"abstract":"Device to Device (D2D) communication is one of the key features of future 5th generation (5G) cellular networks. Most D2D researchers have focused on the data communication phase, assuming the device discovery has already been done. However, there are still many challenges in the discovery phase, with the transmission collision as one of the critical problems to be resolved. Collisions occur when the number of beacon-transmitting D2D user equipment (UEs) exceeds the limited amount of discovery resources, resulting in two or more UEs selecting the same resource to transmit their beacons simultaneously. One promising way of avoiding continuous collisions is to undertake a random backoff upon the occurrence of the first collision. In this paper, the performance of a random-backoff based D2D discovery (RDD) scheme with beta-distributed UE arrivals is analyzed in terms of the discovery rate and discovery latency. The impact of different parameters such as the maximum number of transmission attempts and backoff window length on the performance of the RDD scheme are also investigated.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1665 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proposal of information diffusion model using information vitality","authors":"Yuya Ota, N. Shinomiya","doi":"10.1109/ITNAC46935.2019.9078000","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078000","url":null,"abstract":"In the case of existing information diffusion models, probability of information diffusion only follows parameters of neighbor nodes sending and receiving information. But the momentum of diffusion gains in an exponential fashion whenever the information passes through influential nodes in a real network. For example, when information diffuses through SNS, the speed of diffusion increases whenever information passes nodes that is influential users. This paper quantifies the degree of influence as information vitality, and proposes the model using it. In addition, the paper considers relationship between diffusion speed and information vitality in simulation of the model.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}