View: session overviewtalk overview
- 6TiSCH
- 6LoPWAN
- WSN
- IEEE 802.15.4
- TSCH
- BLE
- IEEE 802.15.1
- Privacy / Anonymity
- Attacks and Defenses
- Authentication, Authorization and Accounting
- Hardware Security
- Intrusion Detection
- Moving Target Defense (MTD)
- Blockchain
09:00 | Group Key Management in Constraint IoT Settings ABSTRACT. The Internet of Things (IoT) enables software to orchestrate physical spaces. This results in high security requirements for IoT communication in factories, households, or critical infrastructures. Besides point-to-point communication, group communication is frequently used in the IoT. It has to be secured, which typically requires the exchange of cryptographic keys. Several protocols have been proposed for Group Key Management (GKM). They vary in their targeted settings, in their Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead. This paper surveys existing GKM mechanisms, analyzes their suitability for constraint IoT settings, and identifies open issues that require further research. |
09:15 | JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion PRESENTER: Wei Cai ABSTRACT. Abstract—Recent research shows the increasing threat to website fingerprints (WF) of privacy-sensitive web users especially with machine learning technique such as deep learning or machine learning(DL/ML) decreased efficiency of previous countermeasures. It caused by the range of features of previous countermeasures manually extract cannot cover the features automatically extracted by DL/ML based attacks. In this paper, we propose a black-box countermeasure to website fingerprint attack based on decision-boundary confusion. It discards the manual selection of features, but uses the classification results of classifiers to determine the decision boundary of classifiers, so as to automatically find the adversarial traffic that can confuse the classifier. At the same time, in order to fix the retrain problem caused by adversarial traffic, we add a method bases on Monte Carlo estimation to confuse decision boundary. Therefore, it is difficult for classifiers to form stable and effective decision boundary after retraining the adversarial traffic. Results shows that our method gets a defense success rate of 72.4% when facing the baseline WF Attacks, outperforming existing SOTA method Walkie-Talkie’s 63.6% defense success rate. At the same time, our method improves the ability of the adversarial traffic to resist retrain, increased the retrain defense success rate from 6.4% to 72.4% under 31% overhead. |
09:30 | ABSTRACT. The domain name system (DNS) is the infrastructure of many services and applications, thus the availability and consistency of the domain name resolution process are crucial but have long troubled DNS. The availability problem is caused by a denial-of-service (DoS) attack or a single point of failure (SPOF). The consistency problem originates from the lack of a forced data synchronization mechanism between authoritative server replicas or between parent/child authoritative servers. We proposed a novel blockchain-based domain name resolution and management architecture named FI-DNS to solve the above problems fundamentally. FI-DNS solves availability and consistency problems in the name resolution process from the mechanism level and guarantees the authenticity and integrity of name resolution results by using public-key cryptography. FI-DNS also supports root zone collaborative management based on smart contracts, which is compatible with the current governance model led by Internet Corporation for Assigned Names and Numbers (ICANN). We implemented the prototype system to prove the feasibility and effectiveness of the FI-DNS architecture. We built an experimental environment with real domain name data, evaluated the name resolution performance and stability of the FI-DNS prototype system, and compared the prototype system with DNS. |
09:45 | A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC PRESENTER: Ping Peng ABSTRACT. The SM4 algorithm is the first commercial cryptographic algorithm officially announced in China for wireless local area network products. It is suitable for scenarios that require high real-time performance, such as wireless communication and IoT sensor nodes. It can be seen that the security research of the SM4 algorithm is of great significance to wireless devices in the IoT. Like other symmetric encryption algorithms, the SM4 algorithm faces some security threats, such as side-channel attacks. Among them, cache timing attacks and power/electromagnetic analysis attacks are becoming more and more threatening due to their low execution difficulty and powerful attack capabilities. Most implementations of anti-side channel attacks against the SM4 algorithm can only resist one of above two attacks. However, side-channel leakages associated with above attacks often coexist. Therefore in this paper, we present a hardware/software collaborative SM4 implementation on ARM-FPGA embedded SoC which can resist above two types of attacks simultaneously. It randomly divides the 32 rounds of SM4 encryption into three stages: the beginning software stage, the middle hardware stage, and the final software stage. Besides, we shuffle the order of some independent operations in each round of the software stages and add dummy rounds to the hardware stage. Finally, we conduct above two types of attacks on unprotected software/hardware SM4, shuffled software SM4 and our scheme, then evaluate their performance respectively. The data throughput of our scheme is 0.86 times that of the original software SM4, while the FPGA resource requirements of our scheme are 0.87 times that of the unprotected hardware implementation. |
10:00 | AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables ABSTRACT. Aiming at the problem of trace anonymization performance of backbone networks, we propose a real-time anonymization method for the IP address of backbone network packets based on flow tables (named AFT-Anon). This method can dynamically build an anonymous flow table based on the captured data packets. The first data packet of a network flow is encrypted according to a specific encryption algorithm, and the encrypted fields are stored in the flow record. Subsequent data packets can obtain the encrypted fields by searching flow records and replace the corresponding fields of the original data packets to achieve anonymization of data packets. Based on the proposed method, a high-speed network anonymization system is developed and deployed on the backbone link of an Internet service provider network. Experimental results show that the proposed method can improve the anonymization performance by more than 20 times, compared with the existing methods such as Crypto-Pan, and it can meet the requirements for online anonymization of 10G link. |
- LoRa, LoRaWAN
- NB-IoT
- LTE-M
- Sigfox
- Wi-SUN
09:00 | Determinism through modulation diversity: can combining multiple IEEE 802.15.4-2015 SUN modulations improve communication reliability? PRESENTER: Pere Tuset-Peiro ABSTRACT. The IEEE 802.15.4-2015 standard includes the SUN (Smart Utility Networks) modulations, i.e., SUN-FSK, SUN-OQPSK and SUN-OFDM, which provide long range communications and allow to trade data rate, occupied bandwidth and reliability. However, given the constraints of low-power devices and the challenges of the wireless channel, communication reliability cannot still meet the PDR (Packet Delivery Ratio) requirements of industrial applications, i.e., PDR>99%. Hence, in this paper we evaluate the benefits of improving communication reliability by combining packet transmissions with modulation diversity using multiple IEEE 802.15.4g SUN modulations. The results derived from a real-world deployment show that going from 1 to 3 packet transmissions with the same SUN modulation can increase PDR from 85.0/84.6/71.3% to 94.2/94.1/86.0% using SUN-FSK, SUN-OQPSK and SUN-OFDM, respectively. Combining the same number of packet transmissions with modulation diversity allows to further increase the average PDR to 97.1%, indicating its potential as a tool to help meeting the reliability requirements of industrial applications. |
09:15 | Bringing Fairness in LoRaWAN through SF Allocation Optimization ABSTRACT. We propose an optimization model for single-cell LoRaWAN planning which computes the limit range of each spreading factor (SF) in order to maximize the minimum packet delivery ratio (PDR) of every node in the network. It allows to balance the opposite effects of attenuation and collision of the transmissions and guarantee fairness among the nodes. We show that our optimization framework improves the worst PDR of the nodes by more than 13 percentage points compared to usual SF boundaries based on SNR threshold. A study of the tradeoff between precision and resolution time of the model shows its effectiveness even with a small number of possible distance limits, and its scalability when the node density increases. |
09:30 | An Efficient Heuristic LoRaWAN Adaptive Resource Allocation for IoT Applications ABSTRACT. Long Range Wide Area Network (LoRaWAN) enables flexible long-range communication with low power consumption and low-cost design perspectives. However, the adoption of this technology brings new challenges due to the densification of IoT devices in the network, which causes signal interference and affects the QoS directly. On the other hand, the flexibility in the LoRaWAN transmission configurations allows higher management in the use of end-device parameters, which allows better resource utilization and improves network scalability. This paper proposes an adaptive solution to handle the define best LoRaWAN parameter settings to reduce the channel utilization and, consequently, maximize the number of packets delivered. Additionally, to validate our method, we formulated mixed-Integer linear programming and results compared to those given by the heuristics. Results provided by the heuristic are close to those provided by the MILP. |
09:45 | On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming ABSTRACT. This paper explores the possibility of having confirmed traffic in LoRaWAN networks under channel-oblivious jamming. Our results show that a LoRaWAN cell can handle up to 500 end-devices with a relatively good message success probability 0.8 if the network is strongly jammed 60 % of the time by using a maximum of 16 re-transmissions. We have also proved that using a channel for downlink transmissions operating in the lowest SF is a major weakness in the LoRaWAN specification. Indeed, our results suggest that for a LoRaWAN cell with 600 end-devices the network goodput can be decreased by 53.06 % when ACK transmissions on the second receive window are allowed. This was done by using an open-source network simulator that allows evaluating many scenarios that can help LoRaWAN operators to better scale their networks in order to be more resilient against jamming attacks before actual deployments. |
10:00 | Performance Comparisons of NB-IoT, LTE Cat-M1, Sigfox, and LoRa Moving at High Speeds in the Air ABSTRACT. Recently, NB-IoT, LTE Cat-M1, Sigfox, and LoRa have been proposed as promising Low-Power Wide Area Networks (LPWANs) technologies for Internet-of-Things (IoT) applications. These technologies are aimed for IoT applications such as smart meters that can tolerate long transmission delays and only need a narrow band to periodically transmit a small amount of data. Although the performances of these technologies have been studied or compared in the literature, most comparisons were conducted in non-mobile conditions. In this work, we used drones flying at 70 km/hr along a 10 km motorway to do the performance measurements. In this paper, we report and compare the performances of these technologies in such high-speed mobile conditions in the air. |
10:15 | An Algorithm to Satisfy the QoS Requirements in a Heterogeneous LoRaWAN Network PRESENTER: Dmitry Bankov ABSTRACT. LoRaWAN is a popular low power wide area network technology widely deployed used in many scenarios, such as environmental monitoring and smart cities. Different applications demand various quality of service (QoS), and their service within a single network requires special solutions for QoS provision. We consider the problem of QoS provision in heterogeneous LoRaWAN networks that consist of several groups of devices that require different packet loss rate (PLR). To solve this problem, we develop a mathematical model that can find the PLR distribution in a LoRaWAN network. With the model, we show that the PLR can vary significantly, and it is wrong to consider only the average PLR for the QoS provision. Finally, we develop an algorithm for assigning modulation and coding schemes to end-devices that provides PLRs below the required thresholds. |
- Intelligent Transport Systems (ITS)
- IEEE 802.11p ITS-G5
- Millimeter Waves
- V2X, V2I, V2N, V2V, V2P, V2D, V2G
- Inter and intra vehicle communication and protocols
11:00 | Spatial Modulation under Vehicular Rayleigh Fading Channels ABSTRACT. Spatial modulation (SM) is a promising scheme to avoid inter channel interference involved in classical MIMO systems as a result of its elegant design that activates only one transmit antenna at each signaling period. In addition, the demand to provide data services for vehicular communication applications is ever increasing. Therefore, in this paper, we investigate the average bit error probability (ABEP) performance of a vehicular SM communication system operating over Rayleigh fading channel that is varying from one signaling period to another within the same transmitted data block. Further, to simplify the decoding complexity at the receiver, the channel is assumed to be estimated at the first location of each data block and then used to detect the received symbols at the remaining locations of the block. For such a system, and unlike other literature works, we derive novel, exact and closed-form simplified enough expressions for the average pairwise error probabilities (average-PEPs), which are then used to compute the system’s overall per-block ABEP efficiently. The derived expressions are generic and valid for vehicular and non-vehicular fading environments. Numerical and simulation results of various examples are provided to validate the theoretical analyses and also to get some insights into the effect of the different vehicular system parameters (such as the speed of the mobile, the carrier frequency, and the block size of the channel variations) on the overall SM error performance. |
11:15 | PRESENTER: Mingzhi Sha ABSTRACT. To increase traffic safety and transportation efficiency, adopting intelligent transportation systems (ITS) has become a trend. As an important component of ITS, one essential task of autonomous vehicles is to detect pedestrians accurately, which is of great significance for improving traffic safety and building a smart city. In this paper, we propose an anchor-free pedestrian detection model named Bi-Center Network (BCNet) by fusing the full body center and visible part center for each pedestrian. Experimental results show that the performance of pedestrian detection can be improved with a strengthened heatmap, which combines the full body with the visible part semantic. We compare our BCNet with state-of-the-art models on the CityPersons dataset and the ETH dataset, which shows that our approach is effective and achieves a promising performance. |
11:30 | Service Migration for Connected Autonomous Vehicles ABSTRACT. In Connected Autonomous Vehicles scenarios or CAV, ubiquitous connectivity will play a significant role in the safety of the vehicles and passengers. The extensive amount of sensors in each car will generate vast amounts of data that cannot be processed promptly by onboard units. Edge and fog computing are emerging solutions for remote data processing for autonomous vehicles, offering higher computing power, as well as the low latency required by autonomous driving. However, due to the highly distributed nature of fog and edge computing servers, CAV mobility may pose a challenge to keep services close to end-users and maintaining QoS. In this paper, we propose MOSAIC, service migration, and resource management algorithm for intra-tier and inter-tier communication in edge and fog computing. The proposed solution performs proactive migration of services based on mobility information, server resources, QoS, and network conditions. Simulation results show the efficiency of the proposed algorithm in terms of latency, migration failures, and network throughput. |
11:45 | An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks PRESENTER: Djamel Eddine Kouicem ABSTRACT. Vehicular Ad Hoc networks (VANETs) is a new emerging technology that aims at connecting vehicles using wireless communication technologies. With the emergence of VANETs, new advanced applications have emerged away which aim at enhancing driving safety and traffic management. These applications exploit the huge amount of data, shared between vehicles and infrastructure, through advanced data analysis. Due to resources limitation of vehicles, this increasing volume of data is stored on powerful edge computing servers spread over the VANETs infrastructure. However, these edge servers are not fully trusted, which rise new serious security and privacy challenges regarding the shared data between vehicles. In this work, we propose a new data-sharing scheme that protects the privacy of vehicles and drivers. We base our construction on consortium blockchain, smart contracts and Zero-Knowledge Proofs (ZKP) to propose a decentralized and anonymous data-sharing scheme. In addition, we propose a fine-grained data storage scheme on the top of blockchain, based on publish-subscribe model to enhance the data management. We confirm the efficiency of our scheme through extensive simulations and experiments. The numerical results showed that our protocol achieves a reasonable efficiency while guaranteeing a high level of security. |
12:00 | A Vehicle-Centric Probabilistic Approach to Virtual Cell Management in Ultra Dense 5G Networks ABSTRACT. The fifth generation (5G) cellular networks tend to be ultra dense networks (UDN). Among the 5G UDN challenges, it is the creation and the management of virtual cells centered on the user. By the literature was not found any work that has directly associated a vehicle-centric probabilistic approach to virtual cell management in ultra dense 5G networks as proposed in this paper as contribution for the technological development on 5G networks use, what indicates its originality. Considering scenarios involving high mobility, such as Internet of Vehicles (IoV) or Vehicle-to-Network (V2N) communications, this challenge becomes even greater. For this purpose, this article presents a virtual cells selection probabilistic approach focused on the V2N communications. All the processing based on speed criteria and complex network metrics is performed inside a controller that is required to manage the virtual cells. The motivation to use different metrics of radio masts is that one has physical applications as algebras operator in purely mathematical contexts, while other finds wide application in network theory. Simulations were performed through the Network Simulator ns-3. The results show that the proposed approach allows more assertive virtual cells selection, improving the services offered by IoV through the 5G networks. |
- Resource Allocation
- Network Slicing
- Topology Management
- 5G Core Network and Service Based Architecture
- C-RAN and backhaul
- SDN and NFV for 5G
- Network Stability, Control and Optimization
- Standardization Activities by IEEE, 3GPP and ETSI
- Software Defined Networks and Network Function Virtualization
- Software Defined Smart Objects
- Software Defined Data Centers
- Software Defined Radio
- Overlay and Programmable Networks
11:00 | Incremental Deployment of Programmable Switches for Sketch-based Network Measurement ABSTRACT. The emergence of programmable switches has boosted lots of research around many network aspects: measurements, security, quality of services. To explore the advantages of programmable data planes while preserving the legacy networking systems, deploying programmable switches incrementally may be a more practical solution. In this paper, we deal with the programmable switch deploy problem for sketch-based network measurement, which has been overlooked before. We first analyze the desired properties of a good deployment for sketch-based network measurement with some examples. Based on summarized lessons, we then develop two Integer Linear Programming (ILP) models, namely TraceILP and TopoILP, to solve the deployment problem. If historical traffic traces are provided, TraceILP generates better deployment with historical information. Even if no traces are provided, TopoILP can still make a reasonable strategy according to the network topology. Evaluations on real ISP and datacenter topologies show that proposed models grantee a promising measurement performance with only about 40% devices upgraded to programmable ones. |
11:15 | Drift Correction for the Software-based Clock Synchronization on Controller Area Network PRESENTER: Murat Akpınar ABSTRACT. Synchronizing clocks is crucial for distributed safety-critical in-vehicle applications. Since Controller Area Network (CAN) is the predominant in-vehicle communication bus, it is highly relevant to realize clock synchronization (CS) on CAN. This paper proposes a new software-based CS (SW-CS) algorithm based on the periodic transmission of reference messages (RMs) by a Master node and discrete-time feedback control. Different from existing algorithms, that only update clocks after receiving a RM, our algorithm corrects the clock drift between RMs. Measurements on a hardware setup show a decrease of the clock differences by more than one order of magnitude. |
11:30 | Dynamic Routing with Online Traffic Estimation for Video Streaming over Software Defined Networks ABSTRACT. The traffic generated by video streaming applications constitutes a large portion of the Internet traffic carried over today's networks. Video streaming demands low latency and high bandwidth. In particular, the transmission of high-quality (high-resolution) streaming video may put the network under pressure. Therefore, high-quality video traffic requires network managers to implement smart and fast routing decisions. Software Defined Networking (SDN) provides a global view and centralized control for the whole network which gives opportunities to dynamically manage networks. In this paper, we use an OpenFlow-based SDN environment and propose a dynamic routing scheme with online traffic estimation to increase the quality of high-quality video streaming and the throughput of the network. The traffic is clustered using an unsupervised machine learning algorithm, high-quality video flows are identified and routed over less congested paths. The whole design is tested in the Mininet simulator. Simulation results show that the proposed scheme improves the link utilization and reduces the amount of dropped frames as a result of excessive delay. |
11:45 | SLA-Aware Routing Strategy for Multi-Tenant Software-Defined Networks ABSTRACT. A crucial requirement for the network service provider is to satisfy the Service Level Agreements (SLA) that it has made with its customers. Coexisting network tenants may have agreed different SLAs, and thus, the service provider must be able to provide QoS differentiation in order to meet his contractual commitments. Current one-size-fits-all routing models are not appropriate for all network tenants if their individual SLA requirements are to be efficiently met. We propose a SDN-based multi-cost routing approach which allocates network resources based on a portfolio of tenant SLA, which achieves the goal of accommodating multiple tenants, given their SLAs. This routing approach allocates routes based on both the hop count and the probability of link failure. Experimental evaluation demonstrates that the assignment of network paths to tenants is prioritised according to the SLA class of the tenant. Differentiation between tenants who have different SLAs is achieved. Finally, we demonstrate how the routing model operates and how it impacts upon the provision of different levels of service. |
12:00 | An Enhanced Scheduling Framework for Elephant Flows in SDN-Based Data Center Networks ABSTRACT. With more and more Internet services have migrated to data centers, traffic in data center networks has grown up rapidly in recent years. Previous studies have shown that elephant flows usually carry large amount of data and are critical to the performance of data centers. To avoid network congestion and balance load, many flow scheduling approaches leverage SDN technology to schedule elephant flows dynamically. However, in most existing approaches, the controller queries switches periodically with the static polling period, which cannot adapt to traffic dynamics. More importantly, the overhead of the controller caused by querying switches and handling flows can be further reduced. In this paper, we present EAshman, a low-cost elephant flow scheduling framework to reduce the overhead of the controller and improve network throughput. In EAshman, an adaptive polling period adjustment algorithm is proposed to dynamically adjust the polling period based on the real-time traffic, aiming to reduce the message overhead of the controller. To improve network throughput, we propose a Probability-based path selection algorithm, which considers the problem of bandwidth fragmentation and uses the transmission rate of elephant flows as the evaluation parameter when searching the new path for elephant flows. Simulation results show that EAshman can significantly save the overhead of the controller and achieve a higher throughput compared to Ashman |
- Artificial Intelligent Systems applications in Computers and Communications
- AI Technologies
- Game Theory
- Machine and Deep Learning of Knowledge
- Bio-inspired Computing in Communications
- Data Science and Data Engineering
- Distributed Knowledge and Processing
14:00 | Domain-Embeddings Based DGA Detection with Incremental Training Method ABSTRACT. DGA-based botnet, which uses Domain Generation Algorithms (DGAs) to evade supervision, has become a part of the most destructive threats to network security. Over the past decades, a wealth of defense mechanisms focusing on domain features have emerged to address the problem. Nonetheless, DGA detection remains a daunting and challenging task due to the big data nature of Internet traffic and the potential fact that the linguistic features extracted only from the domain names are insufficient and the enemies could easily forge them to disturb detection. In this paper, we propose a novel DGA detection system which employs an incremental word-embeddings method to capture the interactions between end hosts and domains, characterize time-series patterns of DNS queries for each IP address and therefore explore temporal similarities between domains. We carefully modify the Word2Vec algorithm and leverage it to automatically learn dynamic and discriminative feature representations for over 1.9 million domains, and develop an simple classifier for distinguishing malicious domains from the benign. Given the ability to identify temporal patterns of domains and update models incrementally, the proposed scheme makes the progress towards adapting to the changing and evolving strategies of DGA domains. Our system is evaluated and compared with the state-of-art system FANCI and two deep-learning methods CNN and LSTM, with data from a large university's network named TUNET. The results suggest that our system outperforms the strong competitors by a large margin on multiple metrics and meanwhile achieves a remarkable speed-up on model updating. |
14:15 | Game Theory Approach in Multi-agent Resources Sharing ABSTRACT. In multiple real life situations involving several agents, cooperation can be beneficial for all. For example, some telecommunication or electricity providers may cooperate in order to address occasional resources needs by giving to coopetitors some quantities of their own surplus while expecting in return a similar service. However, since agents are a priori egoist, the risk of being exploited is high. In this work, we propose to model this kind of situations as a social dilemma (a situation where Nash Equilibrium is non optimal) in which each agent knows only its own state. We design an algorithm modelling the agents whose goal is to make transactions in order to augment their own utility. The algorithm needs to be robust to defection and encourage cooperation. Our framework modelling each agent consists in iterations divided in four major steps: the communication of demands/needs, the detection of opponent cooperation, the cooperation response policy and finally the allocation of resources. In this paper, we focus on the cooperation response policy. We propose a new version of tit-for-tat and we evaluate it with metrics such as safety and incentive-compatibility. Several experiments are performed and confirm the relevance of our improvement. |
14:30 | On the Robustness of Deep Learning-predicted Contention Models for Network Calculus PRESENTER: Fabien Geyer ABSTRACT. The network calculus (NC) analysis takes a simple model consisting of a network of schedulers and data flows crossing them. A number of analysis "building blocks" can then be applied to capture the model without imposing pessimistic assumptions like self-contention on tandems of servers. Yet, adding pessimism cannot always be avoided. To compute the best bound on a single flow's end-to-end delay thus boils down to finding the least pessimistic contention models for all tandems of schedulers in the network - and an exhaustive search can easily become a very resource intensive task. The literature proposes a promising solution to this dilemma: a heuristic making use of machine learning (ML) predictions inside the NC analysis. While results of this work are promising in terms of delay bound quality and computational effort, there is little to no insight on when a prediction is made or if the trained machine can achieve similarly striking results in networks vastly differing from its training data. In this paper we address these pending questions. We evaluate the influence of the training data and its features on accuracy, impact and scalability. Additionally, we contribute an extension of the method by predicting the best n contention model alternatives in order to achieve increased robustness for its application outside the training data. Our numerical evaluation shows that good accuracy can still be achieved on large networks although we restrict the training to networks that are two orders of magnitude smaller. |
14:45 | PRESENTER: Xiren Ma ABSTRACT. With the increasing highlighted security concerns in Intelligent Transportation System (ITS), Vehicle Make and Model Recognition (VMMR) has attracted a lot of attention in recent years. The VMMR method can be widely used in suspicious vehicle recognition, urban traffic monitoring, and the automated driving system. With the development of the Vehicle-to-Everything (V2X) technology, the vehicle information recognized by the AI-based VMMR method can be shared among vehicles and other participants within the transportation system, which helps the police fast locate the suspicious vehicle. VMMR is complicated due to the subtle visual differences among vehicle models. In this paper, we propose a novel Recurrent Attention Unit (RAU) to expand the standard Convolutional Neural Network (CNN) architecture for VMMR. The proposed RAU learns to recognize the discriminative part of a vehicle from multiple scales and builds up a connection with the prominent information in a recurrent way. RAU is a modular unit. It can be easily applied to different layers of the vanilla CNN architectures to boost their performance on VMMR. The efficiency of our models is tested on three challenging VMMR benchmark datasets, i.e., Stanford Cars, CompCars, and CompCars Surveillance. The proposed ResNet101-RAU achieves the best performance 93.81% on the Stanford Cars dataset and 97.84% on the CompCars dataset. |
15:00 | Remote Speech Extraction from Speckle Image by Convolutional Neural Network PRESENTER: Long Yang ABSTRACT. In the field of remote surveillance, acquiring the high-quality voice of target has always been an exciting goal. In this paper, we propose a convolutional neural network based method to extract the target’s speech signals remotely. The method consists of two parts: the optical setup enables us to obtain speckle images conveniently and covertly, and the convolutional neural model is used to recovers speech signals from continuous speckle images. Correlation coefficient and root mean square error metrics show the effectiveness of our method for high-quality speech extraction. Compare to the traditional spatial image correlation, our convolutional neural model is more accurate and more efficient in speckle image processing. The model gets an average accuracy of 94% on real data and 98% on simulated data, which is far better than the spatial image correlation. Besides, by using GPU hardware, the model can process speckle images up to 237 frames per second, far more than 10 frames per second of the spatial image correlation. Experimental results show that the method is simple, efficient and accurate, which proves our significant progress in the field of remote sound extraction. |
15:15 | Automating Vulnerability Classification from Description using Machine Learning ABSTRACT. Vulnerability reports play an important role in cybersecurity. Mitigation of software vulnerabilities that can be exploited by attackers depends on the disclosure of vulnerabilities. Information regarding the vulnerability type or identifiers facilitates the automation of vulnerability management, statistical analysis of vulnerability trends, and secure software development. Labeling reports with vulnerability identifiers has been manually conducted and thus, has suffered from human errors and scalability issues owing to the shortage of security experts. In this paper, we proposed a scheme that automatically classifies each vulnerability description by type using machine learning. Through experiments, we demonstrated the performance of the proposed scheme in comparison with other algorithms, analyzed cases of misclassification, and showed the potential for numerous human errors. Furthermore, we tried to correct these errors. |
- Cloud Computing (IaaS, PaaS, and SaaS)
- Mobile Cloud and Mobile Cloud Networking
- Fog Computing
- Distributed Systems Architecture and Management
- Cognitive Radio Networking
- Wireless, Cellular, and Mobile Communications
- Modeling and Simulation
- Signal Processing for Communications
- Bioinformatics
- Smart Grid
- Smart City
- Industry 4.0
- Smart Building
- Advances in Internet Protocols
- Green Networking
- Real Time Communication Services
- Routing and Multicast
- Network Design, Optimization and Management
- Network Reliability, Quality of Service and Quality of Experience
- Fault-Tolerance and Error Recovery
- Web Services and Service Oriented Architectures
- Standards Evolution
- Digital Satellite Communications Service
- Localisation Protocols
- Communications Services and Management
- Crowdsourcing applications
- Crowdsensing
- Social Networks
- Peer-to-Peer Computing
- Computing applications
- Software Engineering
- Big Data, Data Mining and Database Applications
16:00 | Bandwidth Aggregation over Multihoming Links ABSTRACT. We introduce in this paper a bandwidth aggregation routing solution for multihoming sites. Our routing solution interconnects two distinct multihomed network sites (i.e. network sites that have two or more uplinks to the Internet) and routes local flows between these two network sites. It routes local flows dynamically through several outgoing network paths/links depending on the load (i.e. congestion level) on each path. If a network path/uplink becomes more congested, fewer local flows are routed through it. We detail two path load estimation strategies: one based on RTT measurements and the other based on throughput measurements, both implying passive network measurements. We performed a significant number of experiments in order to show that our multihoming solution performs better than an ECMP-based (i.e. Equal-Cost Multipath) solution in terms of total aggregated throughput and inter-flow fairness. |
16:15 | Distributed Time Slots Assignment Protocol in Dynamic Networks ABSTRACT. This paper addresses the problem of communication in resource-limited broadcast/receive wireless networks. In large scale and resource-limited wireless networks, as the Internet of Things (IoT), a massive amount of data is becoming increasingly available, and consequently implementing protocols achieving error-free communication channels presents an important challenge. Indeed, in this new kind of network, the prevention of message conflicts and message collisions is a crucial issue. In terms of graph theory, solving this issue amounts to solve the distance-2 coloring problem on the network. This paper presents a first study on dynamic management in distance-2 coloring in resource-limited wireless networks. We propose a distributed distance-2 coloring in a dynamic network where a new node can join the network. Thanks to the proposed protocol, we assign a time slot to the new node without re-running the whole algorithm of time slot assigning. Our protocol is time-efficient and uses only local information with a high probability. |
16:30 | Routing and Flexible Ethernet (FlexE) Assignment in Multi-layer Multi-domain Networks ABSTRACT. Optimized routing in multi-layer multi-domain networks is challenging due to different technologies and different policies in different domains. In this paper, we investigate the problem of using a hierarchical path computation engine to leverage the performance of FlexE - the new flexible Ethernet technology which couldn't be fully achieved from local resource allocation in a single domain. We present a path computation engine for multi-layer multi-domain orchestration that optimizes the network utilization through a hierarchical path computation. We formulate an optimization problem of traffic routing for both FlexE-Aware and FlexE-Unaware modes regarding QoS requirements, intra-domain information privacy and FlexE constraints. To solve the problem, we propose a routing and FlexE assignment algorithm that runs in the MLMD-PCE. Dealing with the issue of poor intra-domain information, we use a novel implicit routing strategy to collect the intra-domain information from the child PCE at each domain. Simulation results show the proposed MLMD-PCE carries 77% more traffic than the current H-PCE. |
16:45 | ABSTRACT. Nowadays, Internet became a crucial tool for service delivery, enhancing network requirements. In this new scenario, through Internet Service Providers (ISPs) tend to evolve to Modern Internet Service Providers (MISPs), addressing situations such as elastic network resource demand that may cause problems of slowness, service interruption and constant disconnections. A promising approach to deal with elastic services is the usage of a network traffic prediction model, but traditional models do have all the necessary features to it. Within this context, this paper presents an adaptive network prediction model for MISPs that adjusts seasonality and trend and removes time series error cycles according to the behavior observed in network traffic. The results, using a real bandwidth data set, suggest that the proposed model improves the existing prediction models. |
17:00 | NDM: Network Driving IP Mobility Support in Large Scale LEO Satellite Network ABSTRACT. This paper provides a new perspective for IP mobility support in LEO satellite network, that the network mobility should be solved via network driving rather than terminal driving methods. Terminal driving methods comes from terrestrial network which ones are typically reactive to the moving of users and improve the predictability of the terminals’ motion behaviors to enhance the performance. However, the mobility in LEO satellite network most comes from network(satellites) rather than terminals. It is inefficient to solve the continuous, high-speed, global and regular network mobility via terminal driving solutions who are designed for intermittent, low-speed, local and irregular user mobility. After modeling the satellite mobility behavior for single and multiple orbit plane, a network driving mobility management solution, namely NDM, is proposed in this paper, including 1) trigger and selection 2) proxy group handover 3) silent and explicit resource release. NDM utilizes the benefit of network driving and cooperate with terminal driving methods for robust consideration. Evaluations are conducted to proof the feasibility of mechanism to improve performance and apportion cost. |
17:15 | Improving Survivability of LEO Satellite Network with Guaranteed Based Approaches PRESENTER: Shaoqing Wang ABSTRACT. Low Earth Orbit (LEO) satellite network is experiencing renewed interest due to its potential to revolutionize wide area communications. However, it may suffer different failure modes than many traditional networks given its location in the complex space environment. In this paper, we address this problem by focusing on the survivability of LEO satellite network under link failures. Specifically, we investigate two kinds of guaranteed based approaches to solve this problem and combine them in a uniform framework using optimization method, e.g., linear programming: 1) protects against any combination of up to k concurrent link failures, for a configurable value k; 2) enables guarantees such as “user i is guaranteed bi network bandwidth at least B% of the time”. Simulation on up-to-date mega-constellation show that our proposed framework can protect delay-sensitive traffic from suffering long delay or data loss. In addition, they can support more traffic demands for the specified level of availability (e.g., 90%) under link failures. |