View: session overviewtalk overview
- Privacy / Anonymity
- Attacks and Defenses
- Authentication, Authorization and Accounting
- Hardware Security
- Intrusion Detection
- Moving Target Defense (MTD)
- Blockchain
09:00 | CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection PRESENTER: Yue Lu ABSTRACT. Confidential information firewalling with text classifiers is to recognize the text containing confidential information whose publication might pose a threat to national security, business trade, or personal life. Word embedding is a component of the detector and plays an important role. Existing word embeddings, e.g., Word2Vec, fail to learn a clear task classification boundary, i.e., the confidential polarities of words are opposite but the embedding vectors of the words are close to each other. We propose a confidentiality-oriented word embedding, CES2Vec, for confidential information detection. We embed confidentiality into semantics to catch both of them together, which can learn the word embedding with a clear task classification boundary. We use real-world data from WikiLeaks and conduct the comparison experiments of our CES2Vec and popular methods. The experimental results show that our proposed method is better than the previously reported methods in detecting confidential information. |
09:15 | PRESENTER: Renzo Navas ABSTRACT. The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the Internet. This networking capability allows for new beneficial services and applications. However, it is also the entry-point for a wide variety of cyber-attacks that target these devices. The security measures present in real IoT systems lag behind those of the standard Internet. Security is sometimes completely absent. Moving Target Defense (MTD) is a 10-year-old cyber-defense paradigm. It proposes to randomize components of a system. Reasonably, an attacker will have a higher cost attacking an MTD-version of a system compared with a static-version of it. Even if MTD has been successfully applied to standard systems, its deployment for IoT is still lacking. In this paper, we propose a generic MTD framework suitable for IoT systems: IANVS (pronounced Janus). Our framework has a modular design. Its components can be adapted according to the specific constraints and requirements of a particular IoT system. We use it to instantiate two concrete MTD strategies. One that targets the UDP port numbers (port-hopping), and another a CoAP resource URI. We implement our proposal on real hardware using Pycom LoPy4 nodes. We expose the nodes to a remote Denial-of-Service attack and evaluate the effectiveness of the IANVS-based port-hopping MTD proposal. Video of Talk: https://www.youtube.com/watch?v=XKW0GRU4VRc |
09:30 | Efficient Cloud-based Secret Shuffling via Homomorphic Encryption PRESENTER: Kilian Becher ABSTRACT. When working with joint collections of confidential data from multiple sources, e.g., in cloud-based multi-party computation scenarios, the ownership relation between data providers and their inputs itself is confidential information. Protecting data providers' privacy desires a function for secretly shuffling the data collection. We present the first efficient secure multi-party computation protocol for secret shuffling in scenarios with a central server. Based on a novel approach to random index distribution, our solution enables the randomization of the order of a sequence of encrypted data such that no observer can map between elements of the original sequence and the shuffled sequence with probability better than guessing. It allows for shuffling data encrypted under an additively homomorphic cryptosystem with constant round complexity and linear computational complexity. Being a general-purpose protocol, it is of relevance for a variety of practical use cases. |
09:45 | NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment PRESENTER: Wenzheng Liu ABSTRACT. In the communication environment of smart homes, personal data, control messages, and sensitive data are transmitted through wireless sensor networks (WSNs). Therefore, to prevent an invasion of privacy, communication has to be encrypted, and the data have to be stored securely. In this paper, we propose a new secure privacy-preserving authentication scheme for smart homes. we propose the concept of non-interactive chaotic zero-knowledge (NCZIP) and use it for our scheme to resist ephemeral secrets leakage (ESL) impersonation attack, which assures that the adversary can extract the sensitive information stored in gateway note, and use it to impersonate as a legal user. In addition, the formal security analysis Random-or-real is used to prove that our scheme is secure against different known attacks. In the end, according to the experiment, our scheme has low computation and communication costs compare with other related schemes. |
10:00 | 2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks ABSTRACT. In a website fingerprinting attack, an eavesdropper analyses the traffic between the Tor user and entry node of the Tor network to infer which websites the user has visited. Some recent work apply deep learning algorithms, however, most of them do not fully exploit the packet timing information. In this work, we propose a novel website fingerprinting attack based on a two-channel Temporal Convolutional Networks model that extracts features from both the packet sequences and packet timing information. Our attack is proved to perform better compared to the state-of-the-art attacks. Experiment results also show that the timing information is very useful for classification. Furthermore, we collect our own traffic traces between client and entry node, and transform them into three extraction layers: TCP, TLS and Tor cell layer, and meanwhile record Tor's cell log at the entry node. The experimental results show that the data of the cell layer is the most divisible among the three layers. Based on the experimental results, we conclude that the adversary at the entry node has an advantage over the one who just listens to traffic between client and entry node. |
- Rest API, CoAP, CBOR, OSCORE
- Smart Spaces
- Cyber Physical Systems
- Telecare Medical Information System
09:00 | Managing Consensus-Based Cooperative Task Allocation for IIoT Networks ABSTRACT. Current IoT services include industry-oriented services, which often require objects to run more than one task. However, the exponential growth of objects in IoT poses the challenge of distributing and managing task allocation among objects. One of the main goals of task allocation is to improve the quality of information and maximize the tasks to be performed. Although there are approaches that optimize and manage the dynamics of nodes, not all consider the quality of information and the distributed allocation over the cluster service. This paper proposes a mechanism called CONTASKI for task allocation in IoT networks in order to distribute task tasks among objects. It relies on collaborative consensus strategies to allocate tasks and similarity capabilities to determine which objects can play in accomplishing those tasks. CONSTAKI was evaluated on NS-3 and achieved 100% efficiency of allocated tasksand, on average, more than 80% clusters performed tasks. |
09:15 | Using DenseNet for IoT multivariate time series classification ABSTRACT. Nowadays, most Internet of Things (IoT) devices collect multiple features and produce multivariate time series. In an IoT application, the mining and classification of the collected data have become crucial tasks. Hybrid LSTM-fully convolutional networks (MLSTM-FCN) provide state-of-the-art classification results on multivariate time series benchmarks. This paper examines the use of the DenseNet architecture, originally proposed for computer vision applications, for the classification of multivariate time series. More precisely, this paper proposes a hybrid LSTM-DenseNet model that is able to achieve the performance of the state-of-the-art models and surpass them in many situations, based on the results obtained from various experiments on 15 benchmark datasets. Thus, this paper suggests the 1D DenseNet as a potential tool to be considered by machine learning engineers and data scientists for IoT time series classification task. |
09:30 | Performance of New Monitoring Architectures for Underwater Oil/Gas Pipeline using Hyper-Sensors ABSTRACT. In this paper we propose new real time architectures for monitoring underwater oil and gas pipelines by using Underwater Wireless Sensor Network (UWSN). These new monitoring architectures combine a real time UWSN with nondestructive In Line Inspection (ILI) technology. Having a communication between UWSN and In Line Inspection tools adds a meaningful feature that allows the Underwater Wireless Sensor Network delivers the crucial information regarding pipeline failures in up to minutes. Currently, there is not an established communication system between Underwater Wireless/Wired Sensor Network and In Line Inspection Tools. Nowadays, the ILI tool has proven invaluable for inspecting extensive pipelines to detect the location and size of distinct failures. Therefore, pipeline’s owner inserts the ILI or smart pigs and wait until it arrives to its destination (a control station) and then they analyze its data. The size of gathered data is considered as a big data which requires amount of time to study the status of the pipeline. However, these proposed architectures will help in reducing the time of detecting the pipeline’s defects such as cracks, corrosions, welds, and pipeline’s wall thickness by improving data transfer from the pipeline to the processor to extract useful information and deliver it to the onshore main station. Hence, decreasing delays in default detection. |
09:45 | Adaptive Sensing Algorithm for IoT Applications with Data and Temporal Accuracy Requirements ABSTRACT. This paper proposes an adaptive sensing algorithm for long-term IoT applications. The objective is to satisfy data and temporal accuracy requirements while prolonging the lifetime of battery-powered devices with energy-hungry transmission modules. The algorithm is based on the Send-on-Delta (SoD) technique combined with a GM(1,1) prediction and considers a moving temporal window and outliers removal. Numerical results show the superiority of our algorithm with respect to a linear approximation. The effectiveness of the proposal is demonstrated in terms of adaptability, accuracy, and reduction of data transfer. This is of particular relevance for applications requiring long sensing periods and high sampling rate. Talk in video |
10:00 | Improving charging performance for wireless rechargeable sensor networks based on charging UAVs: a joint optimization approach PRESENTER: Songyang Li ABSTRACT. Wireless power transfer based on charging unmanned aerial vehicles (CUAVs) is a promising method for enhancing the lifetime of wireless rechargeable sensor networks (WRSNs). However, how to deploy the CUAVs so that enhancing the charging efficiency is still a key issue. In this work, we formulate a CUAV deployment optimization problem (CUAVDOP) to jointly increase the number of the sensor nodes that within the charging scopes of CUAVs, improve the minimum charging efficiency in the network and reduce the motion energy consumptions of CUAVs. Moreover, the formulated CUAVDOP is analyzed and proofed as NP-hard. Then, we propose an improved firefly algorithm (IFA) to solve the formulated CUAVDOP. IFA introduces two improved items that are the attraction model and adaptive step size factor to enhance the performance of conventional firefly algorithm, so that making it more suitable for CUAVDOP. Simulation results demonstrate that the proposed algorithm is effective for the formulated joint optimization. Moreover, the performance of IFA is better than some other algorithms. |
10:15 | Task Distribution Based on Variable-Order Markov Position Estimation in Mobile Sensor Networks ABSTRACT. With the popularization of intelligent hardware, wireless sensor networks have led to mobile crowdsensing (MCS) systems, which provide solutions for large-scale and complex urban data collection. Task distribution is the most important part of intelligent hardware applications. MCS can improve the task distribution efficiency by accurately predicting the location of a perceived user for task distribution. This paper proposes a task location estimator based on a variable-order Markov time window sensing (TEMTWS) algorithm. This method is based on time window modeling, and the association between user tasks is established by sensing the historical track data of user execution tasks. First, the task execution frequency and task vector are calculated, and the organizer at each position is selected. To obtain more perceptual users, similarity estimation is performed on the users and organizers within the time window, and users with high relevance are grouped into the same cluster. An experiment is conducted with the Gowalla dataset to verify the algorithm. The results show that the proposed algorithm outperforms the standard Markov K-means algorithm and K means-GA algorithm in terms of the prediction accuracy. |
- Intelligent Transport Systems (ITS)
- IEEE 802.11p ITS-G5
- Millimeter Waves
- V2X, V2I, V2N, V2V, V2P, V2D, V2G
- Inter and intra vehicle communication and protocols
11:00 | DRIVE: A Digital Network Oracle for Cooperative Intelligent Transportation Systems PRESENTER: Ioannis Mavromatis ABSTRACT. In a world where Artificial Intelligence revolutionizes inference, prediction and decision-making tasks, Digital Twins emerge as game-changing tools. A case in point is the development and optimization of Cooperative Intelligent Transportation Systems (C-ITSs): a confluence of cyber-physical digital infrastructure and (semi)automated mobility. Herein we introduce Digital Twin for self-dRiving Intelligent VEhicles (DRIVE). The developed framework tackles shortcomings of traditional vehicular and network simulators. It provides a flexible, modular, and scalable implementation to ensure large-scale, city-wide experimentation with a moderate computational cost. The defining feature of our Digital Twin is a unique architecture allowing for submission of sequential queries, to which the Digital Twin provides instantaneous responses with the “state of the world”, and hence is an Oracle. With such bidirectional interaction with external intelligent agents and realistic mobility traces, DRIVE provides the environment for development, training and optimization of Machine Learning based C-ITS solutions. |
11:15 | MOP: A Novel Mobility-Aware Opportunistic Routing Protocol for Connected Vehicles ABSTRACT. In this paper, we address a fundamental problem in vehicular networks, which consists of sending messages from a source vehicle to a destination vehicle. This problem becomes even more complex in the absence of fixed infrastructure or any other controlling entity. Although there are some solutions in the literature to work around this problem, they can cause significant network overhead and generate an amount of redundant data. In this regard, we develop a routing protocol that considers individual vehicular mobility as a determining factor for routing decisions. Through simulations using realistic vehicular mobility trace, we have observed that our strategy considerably decreases network overhead and the number of hops between source and destination while maintaining similar values for delivery ratio and latency. |
11:30 | Telegram Scheduling for the Multifunction Vehicle Bus (MVB): Algorithms and Evaluation ABSTRACT. Multifunction Vehicle Bus (MVB) is a highly robust real-time field bus for rail vehicles. On MVB, periodic process data and sporadic message data are transmitted in the form of telegrams. The main focus of this paper is the development of heuristic scheduling algorithms for periodic telegrams on MVB. We first propose two heuristics that find the best location of individual telegrams in the MVB schedule based on different criteria. Then, we introduce a new swap operation that allows improving MVB schedules by exchanging the locations of telegrams. A comprehensive evaluation based on a large number of test cases shows that the proposed heuristics are able to find feasible and close-to-optimal MVB schedules with practical computation times. In particular, our heuristics clearly outperform an existing ILP formulation, that cannot find optimal or even feasible schedules in cases with large telegram sets. |
11:45 | Evaluation of Strategies for Emergency Message Dissemination in VANETs ABSTRACT. Emergency services play an important role in the intelligent transportation systems based on mobile communication networks in smart cities, but the characteristics of Vehicular Ad-hoc Networks (VANETs), such as high mobility, intermittent connectivity, scalability and constant changes in network topology make this type of message dissemination a challenge. To improve emergency message dissemination between vehicles, we are proposing strategies that take advantage of the location, direction, speed, number of vehicles' neighbors and characteristics of the region of the city, so that the message reaches all vehicles in the shortest time with the lowest network overhead. To show the effectiveness of our strategies, we have been deployed a platform composed by SUMO, a vehicular network emulator and a connectivity aggregation tool. Our results with this platform show a delivery rate between 92% and 100% at various densities and vehicle speeds, for various zone sizes of relevance and range of the communication technology. |
- Artificial Intelligent Systems applications in Computers and Communications
- AI Technologies
- Game Theory
- Machine and Deep Learning of Knowledge
- Bio-inspired Computing in Communications
- Data Science and Data Engineering
- Distributed Knowledge and Processing
- Cloud Computing (IaaS, PaaS, and SaaS)
- Mobile Cloud and Mobile Cloud Networking
- Fog Computing
- Distributed Systems Architecture and Management
- Advances in Internet Protocols
- Green Networking
- Real Time Communication Services
- Routing and Multicast
- Network Design, Optimization and Management
- Network Reliability, Quality of Service and Quality of Experience
- Fault-Tolerance and Error Recovery
- Web Services and Service Oriented Architectures
- Standards Evolution
- Digital Satellite Communications Service
- Localisation Protocols
- Communications Services and Management
- Crowdsourcing applications
- Crowdsensing
- Social Networks
- Peer-to-Peer Computing
- Computing applications
- Software Engineering
- Big Data, Data Mining and Database Applications
16:00 | Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery PRESENTER: Yutong Chen ABSTRACT. As an essential task for network management and security, network traffic classification has attracted increasing attention in recent years. Traditional traffic classification methods achieve certain success in identifying specific application traffic but fail with un-predefined unknown classes. Existing unknown traffic discovery methods commonly pick out some unlabeled testing data as part of training data to train the classification models, which is not in line with the real-world open environments. In this paper, we propose a novel scheme named SEEN to achieve unknown traffic detection in network traffic classification. There are three crucial phases in the SEEN: unknown discovery, unknown clustering, and system update. In the first step, using a metric-based approach with siamese network, SEEN identifies unknown traffic as well as accurately classifies the traffic generated by pre-defined application classes. After discovery, unknown traffic is automatically clustered into more fine-grained categories in the unknown clustering step. In the system update step, inspired by low-shot learning, SEEN allows new classes to be added or unnecessary known classes to be deleted quickly without retraining from the sketch, which can complement the system’s knowledge. Experimental results exhibit that SEEN can achieve outstanding performances both on known and unknown traffic identification on two open real-world datasets, and the proposed scheme can address the problem of unknown traffic effectively. |
16:15 | Experimental testing of the performance of packet dropping schemes ABSTRACT. To mitigate bufferbloat in the Internet, which is connected with frequent overfilling of large buffers in routers, IETF recommends application of active queue management methods for queues of packets. An important subclass of such methods exploits the dropping function. Namely, an arriving packet can be dropped randomly, with probability depending on the queue length upon its arrival. Several types of the dropping function have been proposed so far, including a linear one, doubly linear, exponential, quadratic, cubic, mixed and others. In most cases, however, the performance of the queue with a particular form of the dropping function was tested using a simulator, instead of real traffic and devices. Moreover, traffic scenarios were different in different studies. The purpose of this paper is to fill this gap. We present results of laboratory experiments with real traffic and devices. Firstly, all popular dropping function types were implemented in a device equipped with the DPDK technology for fast packet processing. Then, the performance of each dropping function was tested using a hardware traffic generator and a set of different traffic scenarios. In every run, several detailed performance characteristics were obtained. This allowed us to compare different aspects of the performance of different functions and single out their strong and weak points. |
16:30 | On the Computation of Integrals of Bivariate Gaussian Distribution ABSTRACT. This paper deals with the computation of integrals of centred bivariate Gaussian densities over any domain defined as an angular sector of $\mathbb{R}^2$. Based on an accessible geometrical approach of the problem, we suggest to transform the double integral into a single one, leading to a tractable closed-form expression only involving trigonometric functions. This solution can also be seen as the angular cumulative distribution of bivariate centered Gaussian variables $(X,Y)$. We aim to provide a didactic approach of our results, and we validate them by comparing with those of the literature. |
16:45 | Mapping Network Traffic Dynamics in the Complexity-Entropy Plane ABSTRACT. Network traffic plays a critical role in network planning and control. The researchers assume that traffic from Ethernet and other IP-related networks have a self-similar nature: high-variability and long-term correlations. Many studies try to model these characteristics for simulation and further optimization. One of the most straightforward approaches to model these characteristics is to consider ON/OFF sources (packet-train), where ON- and OFF-periods are i.i.d., generated with random heavy-tailed distributions. Using information theory quantifiers, in particular the Causality Complexity-Entropy Plane, we show that heavy-tailed distributions do not capture most of the network traffic dynamics. They only reproduce the stochastic dynamics of traffic, which accounts for one of the smallest parts of it. We conduct this study by observing the Abilene dataset, fitting the LogNormal and LogLogistic distributions, and evaluating them onto Causality Complexity-Entropy Plane in comparison with $1/f$-noise, which is one of the most observed long-term correlated noises in nature stochastic processes. Also, to enhance our illustrated results, we use the k-nearest-neighbors (kNN) to classify the real and generated traffic according to the results obtained. |
17:00 | Routing, Modulation, Spectrum and Core Allocation Based on Mapping Scheme PRESENTER: Eduardo Cerqueira ABSTRACT. The growing popularity of heterogeneous applications on the Internet, added to new information and communication technologies, has driven the exhaustion of the physical limitations of the Internet backbone. To overcome these limitations, emerged the Elastic optical networks with Space-Division Multiplexing is a promising solution to cope with the expected depletion of the capacity of single-core networks. This paper proposes an algorithm for routing, modulation, spectrum, and core allocation (RMSCA) problem. The proposed solution maps the links, slots, and cores on edge efficiently, improving resource allocation. Results show that the proposed algorithm decreases the blocking ratio by three orders of magnitude when compared with other RMSCA algorithms in the literature. |
17:15 | The Understanding and Forecast of AS-level Anycast Path Inflation PRESENTER: Yan Yang ABSTRACT. Anycast, as a network layer solution for providing faster and stabler services to end-users, is actively deployed on the Internet today. A common argument is that the underpinning routing system will automatically direct users to the closest site among the set of anycast sites. However, anycast path inflations are observed, where users are unexpectedly directed to a site farther away. In this paper, we study a specific kind of anycast path inflation called AS-level Anycast Path Inflation (AAPI). AAPI means, after the deployment of an anycast site in a different Autonomous System (AS), the number of ASes that traffic passes through is larger than that before, so that users may experience increased latencies or be exposed to higher inter-domain security risks. We discuss AAPI's causes, analyse its characteristics, and propose deployment guidance. In particular, we classify AAPI in two basic forms, i.e. Route Suppression (RS) and Route Promotion (RP), and present their various characteristics as well as their possible coupling. We propose Conflict Point (CP), a topological feature which represents the intrinsic conflict between routing policies and AS path length at these nodes, to further study the necessary and sufficient conditions for AAPI. And based on the properties of CP, we give some suggestions on anycast deployment strategy to avoid AAPI and verify them by simulation. |
- Privacy / Anonymity
- Attacks and Defenses
- Authentication, Authorization and Accounting
- Hardware Security
- Intrusion Detection
- Moving Target Defense (MTD)
- Blockchain