{"title":"Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory","authors":"Ze Yang, Youliang Tian","doi":"10.1109/NaNA53684.2021.00017","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00017","url":null,"abstract":"At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantity the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the $(t, n)$-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the $(t, n)$-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"30 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency Virtual Machine Online Migration in Cloud Data Centers","authors":"Zhonghua Xie, Tao Tao, Lisheng Ma","doi":"10.1109/NaNA53684.2021.00032","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00032","url":null,"abstract":"Service provided by virtual machine hosted at cloud data center (DC) has become the mainstream mode. However, cloud data centers are facing the threat from natural disasters. For disaster-affected data centers, to ensure the sustainability of services, virtual machine hosted at such data centers should be migrated quickly to safe data centers. This paper investigates an emergency virtual machine online migration scheme where the migration operation is carried out within the early warning of disaster. In the proposed scheme, a virtual machine can be migrated through multiple paths and the migration data center need to meet the required bandwidth and delay of connection requests supported by the virtual machine. An Integer Linear Program (ILP) model is established to get the solutions for the proposed scheme. The objective of the ILP model is to maximize the number of virtual machines successfully migrated within the given early warning time and the constraints are the available network resources. Numerical results show that the proposed model can effectively implement emergency virtual machine online migration.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129072892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge Computing","authors":"Gaofeng Hong, Qili Wen, Wei Su","doi":"10.1109/NaNA53684.2021.00037","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00037","url":null,"abstract":"The 5G non-standalone (NSA) network deployment based on the legacy Evolved Packet Core (EPC) emerges a denser access cells scenario. Due to the complex mobility characteristics of vehicles and the diversified vehicular service requirements, the traditional cellular handover mechanism may not maintain high-quality network service for various connected vehicles. This paper concentrates on satisfying the network requirements of different vehicular services, keeping network load balance and avoiding unnecessary handover under the EPC-based LTE-5G RAN-level network architecture. We first develop the modified heterogeneous cellular network architecture with the assistance of the multi-access edge computing (MEC) technology, the MEC server works as a coordinator which is responsible for handover state information management and executing network selection algorithm to help vehicles access the most suitable candidate network. The network selection algorithm uses a quality of service (QoS) coverage conversion methods which calculate the QoS boundary of candidate networks to satisfy the specific service requirement and balance the network load. A long short-term memory (LSTM)-based trajectory prediction method is designed to obtain the sojourn time of a vehicle staying in the QoS boundary of candidate networks. The sojourn time acts as a vital reference for the handover decision. Further, we simplify handover signaling interaction to reduce the handover delay. Simulation results show that the proposed scheme is validated in improving network handover performance and the QoS of users under several metrics.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121701103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yaling Zhang, Hongtao Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu
{"title":"Signature Scheme Based on The SM2 Algorithm in Fabric","authors":"Yaling Zhang, Hongtao Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu","doi":"10.1109/NaNA53684.2021.00083","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00083","url":null,"abstract":"Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied to Hyperledger Fabric. Firstly, two elliptic curve public-key cryptography algorithms are analyzed, and the feasibility of the SM2 in Fabric system is studied. Secondly, the Fabric system using the SM2 algorithm is designed and implemented, and the generation process of the Fabric chain address using the SM2 algorithm is given. Finally, experimental verification of the availability and performance of the Fabric system after the replacement of national cryptography algorithms is carried out. The experimental results show that the SM2 interface of the new Fabric alliance chain has good usability, and the average latency is reduced by 51.8%, and the transaction throughput is increased by 33.1%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV Environment","authors":"Chun Jen Lin, Yan Luo, Liang-Min Wang","doi":"10.1109/NaNA53684.2021.00081","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00081","url":null,"abstract":"Deep Reinforcement Learning (DRL) has yielded proficient controllers for complex tasks. DRL trains machine learning models for decision making to maximize rewards in uncertain environments such as network function virtualization (NFV). However, when facing limited information, agents often have difficulties making decisions at some decision point. In a real-world NFV environment, we may have incomplete information about network flow patterns. Compared with complete information feedback, it increases the difficulty to predict an optimal policy since important state information is missing. In this paper, we formulate a Partially Observable Markov Decision Process (POMDP) with a partially unknown NFV system. To address the shortcomings in real-world NFV, we conduct an extensive simulation to investigate the effects of adding recurrency to a Proximal Policy optimization (PPO2) by replacing the first post-convolutional fully-connected layer with a recurrent LSTM or adding stacked frames as input. The results show that RL based schedulers using stacking a history of frames in the PPO2’s input layer can easily adapt at evaluation time if the quality of observations changes.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Analysis of Hybrid DRAM PUFs on FPGA","authors":"Yu Zheng, Zhao Huang, Liang Li, Changjian Xie, Quan Wang, Zili Wu","doi":"10.1109/NaNA53684.2021.00074","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00074","url":null,"abstract":"The widespread application of embedded devices has attracted great concern about device security issues. Silicon physical unclonable functions (PUFs) have been proven to be a low-cost and effective hardware-based solution to ensure the security of embedded devices. Among many schemes, DRAM-based PUF is an attracted option for the reason that DRAM is ubiquitous in embedded devices and has a large address space. However, the existing DRAM PUF schemes have some defects, such as low PUF response reliability and complex key post-processing operations. Therefore, this paper presents a hybrid DRAM PUF composed of PicoPUF and DRAM PUF to address these problems. We implement the proposed hybrid DRAM PUFs on Xilinx Kintex 7 FPGA board and validate the effectiveness of our scheme. The experimental results show that compared to current DRAM PUFs, the proposed scheme can generate PUF responses with improved reliability and reduce the key post-process procedure.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji
{"title":"A fine-grained petri model for SQL time-blind injection","authors":"Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji","doi":"10.1109/NaNA53684.2021.00035","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00035","url":null,"abstract":"With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technology, this paper takes SQL time-blind injection as an example to model its process with Petri Net. The validity of the model is verified by quantitative analysis and qualitative analysis. Try to inject 10, 20, 30, 40 and 50 times into target aircraft and Petri Net model respectively. The blind injection time is recorded and compared. The results show that the injection time increases with the increase of injection times. Under the same injection times, the Petri Net model takes less time. The sending time in the token can be set. When the sending time is short, the injection speed is fast, and super real-time simulation can be realized, which can realize the rapid prediction of attacks and resource vulnerability effects. When the sending time is long, the injection process slows down. It is beneficial to observe the details of the injection process and whether conflicts occur at a fine-grained level, analyze the purpose of the attack and achieve the purpose of building a patch model. The patch model can effectively take countermeasures against attacks, predict unknown vulnerabilities and ensure network information security.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fine-tuning-based Adversarial Network for Member Privacy Preserving","authors":"Xiangyi Lu, Qing Ren, Feng Tian","doi":"10.1109/NaNA53684.2021.00082","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00082","url":null,"abstract":"With the development of machine learning, the issue of privacy leakage has attracted much attention. Member inference attack is an attack method that threatens the privacy of training datasets. It uses the model’s behavior to infer whether the input user record belongs to the training datasets, and then get the user’s private information according to the purpose of the model. This paper studies the member inference attack under the black box model. We design a defense mechanism to make the learning model and the inference attack model learn from each other, and use the gains from the attack model to fine-tune the last layer’s parameters of the learning model. The fine-tuned learning model can reduce the gains from the membership inference attack with less loss of prediction accuracy. We use different datasets to evaluate the defense mechanism on deep neural networks. The results show that when the training accuracy and test accuracy of the learning model convergence are similar, the learning model only losses about 1% of the prediction accuracy, which the accuracy of the member inference attack drops by a maximum of around 20%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133454050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing Network","authors":"Lin An, Zhuo Wang, Jiahao Yue, Xiaoliang Ma","doi":"10.1109/NaNA53684.2021.00087","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00087","url":null,"abstract":"Various innovative applications of emerging mobile Internet have exploded in recent years, which brings huge challenges to terminal devices with limited CPU computing ability and battery capacity. The realization of high-performance computing offloading based on different optimization indicators (e.g., task delay and energy consumption) is currently a research hotspot in the field of mobile edge computing (MEC). This paper proposes a joint task offloading and resource allocation algorithm via proximal policy optimization for multiple terminal users and multiple MEC servers. The proposed algorithm designs the local task butter queues for terminal users and edge task butter queues for MEC servers, which allows the tasks to be executed on butter queues in a first-in-first-out way, leading to a precise calculation of waiting delays of tasks. Moreover, it formulates the objective optimization problem as the Markov decision process and employs the proximal policy optimization algorithm to minimize the weighted sum of the task delay and energy consumption. Simulation results show the proposed algorithm outperforms the baselines with better performance.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge Computing","authors":"Yanchun Kong, Weibin Su, Gang Xu","doi":"10.1109/NaNA53684.2021.00044","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00044","url":null,"abstract":"The traditional carbon monitoring system uses eddy covariance, remote sensing and geographic information system combined with artificial ground survey, which is difficult to achieve long-term, large-scale forest carbon measurement, and has uncertainty. Through statistics of carbon emission and absorption data, we design algorithms on edge computing nodes with intelligent analysis, real-time collection of forest resources, the type of ground vegetation, soil nutrients, carbon dioxide and meteorological data, the establishment of mountain forest carbon dioxide fuzzy measurement monitoring model, to estimate forest absorption. This project aims to improve the measurement accuracy of carbon neutralization in high mountain forest land, further densify the data acquisition from grid sample plots of forest, increase the number of sample plots, and reveal the spatiotemporal evolution law through the implementation of scientific and effective comprehensive real-time monitoring of carbon dioxide absorption of forest resources, so as to provide theoretical and technical support for the study of regional carbon peak estimation.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}