{"title":"Distance-Statistical Based Byzantine-Robust Algorithms in Federated Learning","authors":"Francesco Colosimo, F. Rango","doi":"10.1109/CCNC51664.2024.10454840","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454840","url":null,"abstract":"New machine learning (ML) paradigms are being researched thanks to the current widespread adoption of AI-based services. Since it enables several users to cooperatively train a global model without disclosing their local training data, Federated Learning (FL) represents a new distributed methodology capable of attaining stronger privacy and security guarantees than current methodologies. In this paper, a study of the properties of FL is conducted, with an emphasis on security issues. In detail, a thorough investigation of currently known vulnerabilities and their corresponding countermeasures is conducted, focusing on aggregation algorithms that provide robustness against Byzantine failures. Following this direction, new aggregation algorithms are observed on a set of simulations that recreate realistic scenarios, in the absence and presence of Byzantine adversaries. These combine the Distance-based Krum approach with the Statistical based aggregation algorithm. Achieved results demonstrate the functionality of the proposed solutions in terms of accuracy and convergence rounds in comparison with well-known federated algorithms under a correct and incorrect estimation of the attackers number.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"9 8","pages":"1034-1035"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natively Secure 6G IoT Using Intelligent Physical Layer Security","authors":"Israt Ara, Brian Kelley","doi":"10.1109/CCNC51664.2024.10454737","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454737","url":null,"abstract":"Physical Layer Security (PLS) as a native signaling enhancement to Layer-l security guarantees consumer privacy at the air interface. This paper proposes applying AIIML integration to Radio Access Networks (RAN) for enhanced 6G Internet of Things (loT) security. The paper defines a AIIML based PLS system model that can guarantee security against an eavesdropper. The paper also proposes an operational overview of AIIML integrated PLS with shared key agreement protocol in an O-RAN architecture for 6G IoT, and proposed sApps, that will lead the way of a new paradigm in low latency communication scheme for the consumers. Simulations of Key Bit Error rate (BER) detection in the presence of Rayleigh fading plus noise demonstrate that the AIIML-based PLS model jointly improves security and consumer communication performance.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"8 4","pages":"918-924"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative Study","authors":"Simone Marasi, Stefano Ferretti","doi":"10.1109/CCNC51664.2024.10454631","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454631","url":null,"abstract":"Money laundering in cryptocurrencies is a significant concern, as it facilitates and conceals crime and can distort markets and the broader financial system. To combat this issue, researchers have turned to techniques to develop effective Anti-Money Laundering (AML) frameworks. The findings contribute to the ongoing efforts to promote social good by reducing the impact of criminal activities on society. By preventing money laundering, we can also help to combat other criminal activities such as drug trafficking, corruption, and terrorism. This paper focuses on the use of Graph Neural Networks (GNNs) to classify cryptocurrencies transactions. Specifically, the study employs Graph Convolutional Networks (GCNs), Graph Attention Networks (GAT), the Chebyshev spatial convolutional neural network (ChebNet), and GraphSAGE network to classify Bitcoin transactions. The study finds that ChebNet, GraphSAGE and a variant of GAT outperform other methods and improve upon the state of the art in terms of recall and F1 scores, thus suggesting that they can be more reliable in identifying illicit transactions.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"11 8","pages":"272-277"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication Systems","authors":"Ju Yeong Baek, Young-Seok Lee, Bang Chul Jung","doi":"10.1109/CCNC51664.2024.10454823","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454823","url":null,"abstract":"We consider a downlink reconfigurable intelligent surfaces-based non-orthogonal multiple access technique with constellation adjustment (RIS-NOMA-CA) for 6G wireless communication systems. We mathematically analyze the bit-error-rate (BER) performance of the RIS-NOMA-CA technique assuming the optimal joint maximum likelihood (JML) detector at receivers. To the best of our knowledge, theoretical analysis of the downlink RIS-NOMA-CA technique has not been reported in the literature. We show that the RIS-NOMA-CA technique yields a better BER performance than the conventional RIS-NOMA technique without CA through computer simulations, and our analytical result matches well with simulation results.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"109 2","pages":"1076-1077"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of Modeling Participant Behavior in CrowdSensing Evaluation","authors":"Christine Bassem","doi":"10.1109/CCNC51664.2024.10454892","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454892","url":null,"abstract":"In crowdsensing platforms, algorithms and models for task allocation play a critical role in shaping user behaviors, engagement levels, the quality of the collected data, and the performance of the platform as a whole. Regardless of the sensing model, task allocation mechanisms are difficult to evaluate and benchmark. In contrast to evaluating deployments of crowd-sensing platforms with real crowds, they are often evaluated via simulators that are incapable of modeling the complexities of human behavior, specifically in terms of their commitment to the platform and quality of sensing, but their strength is the ability to rapidly experiment with multiple algorithms. In this paper, we abstract the general characteristics of participant behaviors in crowdsensing, and implement these characteristics within the TACSim simulation framework. Further exemplifying the extendability power of that simulation framework, and the benefits it can offer the crowdsensing community.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"106 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework: Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp)","authors":"Sudharshan Paindi Jayakumar, Alberto Conte","doi":"10.1109/CCNC51664.2024.10454773","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454773","url":null,"abstract":"The growing demand for fast and reliable wireless services has led to the deployment of more base stations, which has made manual optimization of base station parameters more complex and time-consuming. This can lead to suboptimal network performance and a poor user experience. To address this challenge, we propose a Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp), an automated framework for predicting optimized base station parameters. Our framework first compares three clustering algorithms: K-means, DBSCAN, and Agglomerative Clustering, selecting the most suitable one for specific scenarios based on their unique attributes. Simultaneously, our framework leverages machine learning (ML) algorithms to predict the optimal parameters for each base station with an evaluation of multiple ML models to identify the best fit for our data. It also incorporates data drift monitoring to track gradual changes in data distribution over time, ensuring ML model accuracy through periodic retraining. In the simulated scenario, our framework achieved an average of 76% reduction in memory overhead and simplified training by utilizing fewer models, effectively minimizing computational resources. The drift detection system demonstrated an exceptional accuracy of 98.87%, outperforming other cases. These results highlight the potential of our framework to significantly benefit network operators by automating base station parameter tuning, reducing human involvement, and substantially improving network performance and cost savings.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"102 7","pages":"1026-1029"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud-Oriented Indoor-Outdoor Real-Time Localization IoT Architecture for Industrial Environments","authors":"Laura Belli, Luca Davoli, Gianluigi Ferrari","doi":"10.1109/CCNC51664.2024.10454636","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454636","url":null,"abstract":"Localization services for precise and continuous monitoring of the locations of both humans and vehicles in industrial environments are among the most relevant applications in Industrial Internet of Things (IIoT) contexts, to maximize safety and optimize operational activities. Unfortunately, localization in industrial scenarios is particularly challenging because targets can generally move freely in both indoor and outdoor areas. In this paper, we propose a localization monitoring architecture based on a prototypical wearable IoT device equipped with Ultra-Wide Band (UWB), inertial, and GNSS/RTK technologies for seamless localization in heterogeneous environments. We focus on a Web of Things (WoT) approach, verifying suitability and limitations in a real use case scenario. Our approach shows that the proposed architecture can effectively enhance the safety of workers, detecting potentially dangerous events and triggering alarms (e.g., via smart buzzers or gas concentration warning devices) based on a cloud WoT architecture.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"64 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Storage Workload Characterization: An Approach with Time-Series Analysis","authors":"Abiola Adegboyega","doi":"10.1109/CCNC51664.2024.10454778","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454778","url":null,"abstract":"The cloud hosts diverse applications with different workload characteristics. Public cloud traces provide opportunities for analysis to gain insights informing autoscaling, forecasting among other operations. This paper presents the statistical analysis of a recent Alibaba cloud storage workload. The isolation & aggregation of all read/write time-series per recorded workload was done. Application of statistical methods yielded novel distributions from which forecasting solutions integrating time-varying variance captured workload burstiness. A 25% improvement in forecasting accuracy over current methods was achieved. The set of workload time-series has been made available online for further analysis by the research community.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"43 9","pages":"1090-1091"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Interaction with Large Language Models for Web Accessibility: Implications and Challenges","authors":"Giovanni Delnevo, Manuel Andruccioli, S. Mirri","doi":"10.1109/CCNC51664.2024.10454680","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454680","url":null,"abstract":"The widespread diffusion of Large Language Models (LLMs) has ushered in a transformative era across numerous research domains, including web accessibility. In fact, they can potentially offer automated solutions for generating accessible content, performing accessibility testing, and enhancing the overall user experience for individuals with disabilities. In this paper, we investigate how LLMs can be successfully employed to evaluate and correct web accessibility. Then, we delve into the positive implications and the current challenges derived from the interaction between developers and LLMs in this specific context. Finally, we present some future directions that could be explored to ensure that web content remains accessible to all.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"83 3","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Analysis of Model Poisoning Attacks Against Blockchain-Based Federated Learning","authors":"Rukayat Olapojoye, Mohamed Baza, Tara Salman","doi":"10.1109/CCNC51664.2024.10454875","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454875","url":null,"abstract":"Undoubtedly, Machine Learning (ML) has revolutionized many applications in recent years. A vast amount of heterogeneous data distributed globally is being used to build efficient and robust prediction models. This has led to the need for decentralized ML paradigms. Federated Learning (FL) has emerged as a decentralized ML paradigm that creates global models from multiple privately trained local datasets. Nevertheless, FL comes with some challenges, such as using a central server, leading to a single point of failure and trust issues. Blockchain-based Federated learning (BFL) has been proposed to resolve these challenges. However, due to the openness of the Blockchain system, malicious clients can access critical information, such as the number of participating clients, and launch attacks on the BFL system. This paper presents a practicable model poisoning attack on BFL systems. Several experiments are conducted with different attack scenarios and settings explored. The evaluations and results show the efficacy and impact of the model poisoning.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"71 3","pages":"943-949"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}