A. Mauthe, D. Hutchison, Egemen K. Çetinkaya, Ivan Ganchev, J. Rak, J. Sterbenz, M. Gunkel, Paul Smith, Teresa Gomes
{"title":"Disaster-resilient communication networks: Principles and best practices","authors":"A. Mauthe, D. Hutchison, Egemen K. Çetinkaya, Ivan Ganchev, J. Rak, J. Sterbenz, M. Gunkel, Paul Smith, Teresa Gomes","doi":"10.1109/RNDM.2016.7608262","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608262","url":null,"abstract":"Communication network failures that are caused by disasters, such as hurricanes, earthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational environments. The RECODIS COST Action aims to address this shortcoming by providing solutions that are tailored to specific types of challenge, whilst considering the wider socio-economic issues that are associated with their deployment. To support this goal, in this paper, we present an overview of some of the foundational related work on network resilience, covering topics such as measuring resilience and resilient network architectures, amongst others. In addition, we provide insights into current operational best practices for ensuring the resilience of carrier-grade communication networks. The aim of this paper is to support the goals of the EU COST Action RECODIS and the wider research community in engineering more resilient communication networks.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keyword-driven security test automation of Customer Edge Switching (CES) architecture","authors":"Amir K C, A. Goulart, R. Kantola","doi":"10.1109/RNDM.2016.7608290","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608290","url":null,"abstract":"Customer Edge Switching (CES) is an experimental Internet architecture that provides reliable and resilient multi-domain communications. It provides resilience against security threats because domains negotiate inbound and outbound policies before admitting new traffic. As CES and its signalling protocols are being prototyped, there is a need for independent testing of the CES architecture. Hence, our research goal is to develop an automated test framework that CES protocol designers and early adopters can use to improve the architecture. The test framework includes security, functional, and performance tests. Using the Robot Framework and STRIDE analysis, in this paper we present this automated security test framework. By evaluating sample test scenarios, we show that the Robot Framework and our CES test suite have provided productive discussions about this new architecture, in addition to serving as clear, easy-to-read documentation. Our research also confirms that test automation can be useful to improve new protocol architectures and validate their implementation.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Mikkelsen, Radoslav Buchakchiev, T. Madsen, H. Schwefel
{"title":"Public transport occupancy estimation using WLAN probing","authors":"L. Mikkelsen, Radoslav Buchakchiev, T. Madsen, H. Schwefel","doi":"10.1109/RNDM.2016.7608302","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608302","url":null,"abstract":"Prediction of availability of physical services can be a valuable addition to transportation systems operation. In this paper we are focusing on estimation of public transport occupancy (PTO), or more specifically, on estimating bus passenger load, i.e., the number of people on the bus. This information can be used by bus operators as input to the analysis of bus routes' efficiency, or to provide an app indicating passenger load. PTO estimation based on collecting WiFi probes emitted by WiFi enabled devices is cheap and easy to install. This paper presents a prototype implementation of this method, analysis of the collected data and of the estimation algorithm accuracy. Analysis of passenger load in a bus has indicated that there are two main challenges of the estimation using WiFi probes. The algorithm provides overestimation due to inclusion of WiFi devices that are outside the bus and underestimation due to exclusion of people without an active WiFi enabled device or by missing out probes in the detection algorithm from devices carried on board. We have shown how by fine-tuning parameters of the algorithm the probes received from people outside the bus can be filtered out thereby reducing the severity of the underestimation problem. The typical approach to combat the overestimation problem is to make the adjustments based on a statistical ratio of people possessing a WiFi enabled smart device over the whole population.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"581 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teresa Gomes, János Tapolcai, C. Esposito, D. Hutchison, F. Kuipers, J. Rak, A. Sousa, Athanasios Iossifides, Rui Travanca, J. André, Luísa Jorge, Lúcia Martins, P. O. Ugalde, Alija Pašić, D. Pezaros, Simon Jouet, Stefano Secci, M. Tornatore
{"title":"A survey of strategies for communication networks to protect against large-scale natural disasters","authors":"Teresa Gomes, János Tapolcai, C. Esposito, D. Hutchison, F. Kuipers, J. Rak, A. Sousa, Athanasios Iossifides, Rui Travanca, J. André, Luísa Jorge, Lúcia Martins, P. O. Ugalde, Alija Pašić, D. Pezaros, Simon Jouet, Stefano Secci, M. Tornatore","doi":"10.1109/RNDM.2016.7608263","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608263","url":null,"abstract":"Recent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important to have emergency networks able to maintain sustainable communication in disaster areas. Moreover, the network architecture should be designed so that network connectivity is maintained among nodes outside of the impacted area, while ensuring that services for costumers not in the affected area suffer minimal impact. As a first step towards achieving disaster resilience, the RECODIS project was formed, and its Working Group 1 members conducted a comprehensive literature survey on “strategies for communication networks to protect against large-scale natural disasters,” which is summarized in this article.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129820133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonios Gouglidis, B. Green, J. Busby, M. Rouncefield, D. Hutchison, S. Schauer
{"title":"Threat awareness for critical infrastructures resilience","authors":"Antonios Gouglidis, B. Green, J. Busby, M. Rouncefield, D. Hutchison, S. Schauer","doi":"10.1109/RNDM.2016.7608287","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608287","url":null,"abstract":"Utility networks are part of every nation's critical infrastructure, and their protection is now seen as a high priority objective. In this paper, we propose a threat awareness architecture for critical infrastructures, which we believe will raise security awareness and increase resilience in utility networks. We first describe an investigation of trends and threats that may impose security risks in utility networks. This was performed on the basis of a viewpoint approach that is capable of identifying technical and non-technical issues (e.g., behaviour of humans). The result of our analysis indicated that utility networks are affected strongly by technological trends, but that humans comprise an important threat to them. This provided evidence and confirmed that the protection of utility networks is a multi-variable problem, and thus, requires the examination of information stemming from various viewpoints of a network. In order to accomplish our objective, we propose a systematic threat awareness architecture in the context of a resilience strategy, which ultimately aims at providing and maintaining an acceptable level of security and safety in critical infrastructures. As a proof of concept, we demonstrate partially via a case study the application of the proposed threat awareness architecture, where we examine the potential impact of attacks in the context of social engineering in a European utility company.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126400054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Noor-ul-Hassan Shirazi, Steven Simpson, Kanza Noor Syeda, A. Mauthe, D. Hutchison
{"title":"Towards policy refinement for resilience management in cloud","authors":"Syed Noor-ul-Hassan Shirazi, Steven Simpson, Kanza Noor Syeda, A. Mauthe, D. Hutchison","doi":"10.1109/RNDM.2016.7608296","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608296","url":null,"abstract":"Cloud computing is becoming increasingly important for provision of critical services because of potential cost saving, scalability and elasticity. Therefore, it is particularly important for clouds and cloud-based services to be resilient, i.e., they are able to operate correctly and continuously even in the presence of challenges. To do this, a number of resilience-supporting mechanisms are needed at various levels in cloud infrastructure. It is non-trivial to manage these mechanisms and there is a need for flexible instruments which assist cloud providers in this complex task. Policy based management is an established instrument to manage resilience supporting mechanisms and they are useful if it allows not only high level description of abstract policy (e.g high level security and resilience requirements), but also enables such policy to be refined and eventually mapped into an appropriate low levels in cloud settings. This paper sheds light on basic concepts behind policy based management in cloud, more specifically it emphasizes the use of policy refinement which is the process of translating higher level requirements (such as security and resilience requirements) into the sequence of actions at lower levels that can implement them, in order to generate more refined policies that govern the behaviour of an overall cloud system when under challenge. We finally present two example scenarios on how policy refinement can work for the cloud to establish its relevance for the overall resilience management.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127579703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To switch or not to switch: Service discovery and provisioning in multi-radio V2R communications","authors":"C. Campolo, A. Molinaro, A. Vinel","doi":"10.1109/RNDM.2016.7608299","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608299","url":null,"abstract":"A rich portfolio of services (e.g., road traffic information, maps download, Internet/cloud access) will be delivered to users on wheels through Vehicular Ad Hoc Networks (VANETs).Most of them will be offered by road-side units (RSUs) sparsely deployed along the roads. The prompt access to such services by passing by vehicles highly relies on the efficiency of service announcement procedures performed by the RSUs. In this paper, we present an analytical framework that models the service discovery and access mechanisms in multi-channel vehicular networks. The model accounts for dual-radio devices under different channel configurations for the delivery of announcements (e.g., on the control channel, on a service channel) and related switching mechanisms. Guidelines are suggested for the setting of service announcements parameters and channel configuration to allow providers to boost service provisioning.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115882051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Duality in stochastic binary systems","authors":"P. Romero","doi":"10.1109/RNDM.2016.7608272","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608272","url":null,"abstract":"A stochastic binary system is a mathematical model for reliability analysis. There is a logical function, called structure, that tells us whether the system survived or not after random failures on its components. The concept of duality in stochastic binary systems is here introduced. As corollary, the computational complexity of combinatorial problems from stochastic binary systems is fully characterized, and the reliability of special stochastic binary systems is found. The main results are supported in decision theory and network reliability analysis.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132541469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-failure availability analysis for multi-flow shared backup path protected mesh networks","authors":"Wenjing Wang, J. Doucette","doi":"10.1109/RNDM.2016.7608278","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608278","url":null,"abstract":"Dual-failure availability is an important metric for a survivable network where the restoration of all single failures is fully satisfied. This paper develops an algorithm to evaluate network dual-failure availability for shared backup path protection mesh networks with the existing multi-flow design model. We create four network families and each network family has eleven networks with average nodal degree ranging from 3.0 to 5.0. Experiments are implemented in Python 2.7, and results reveal that the values of network dual-failure availability increase first and then drops mildly when the average nodal degree of network increases. The proposed algorithm is scalable with network scales.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enumerating circular disk failures covering a single node","authors":"Bálazs Vass, Erika R. Kovács, János Tapolcai","doi":"10.1109/RNDM.2016.7608286","DOIUrl":"https://doi.org/10.1109/RNDM.2016.7608286","url":null,"abstract":"Current backbone networks are designed to protect a certain pre-defined list of failures, called Shared Risk Link Groups (SRLG). The list of SRLGs must be defined carefully, because leaving out one likely failure event significantly degrades the observed reliability of the network. In practice, the list of SRLGs is typically composed of every single link or node failure. It has been observed that some type of failure events manifested at multiple locations of the network, which are physically close to each other. Such failure events are called regional failures, and are often caused by a natural disaster. A common belief is that the number of possible regional failures can be large, thus simply listing them as SRLGs is not a viable solution. In this study we show the opposite, and provide an efficient algorithm enumerating all the regional failures having at a node failed as SRLGs. According to some practical assumptions this list is surprisingly short with O(|V|) SRLGs in total, and can be computed in O(|V|2) time.","PeriodicalId":422165,"journal":{"name":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121132683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}