The proceedings contain 100 papers. The topics discussed include: CSUM: a novel mechanism for updating CubeSat while preserving authenticity and integrity;single-anchor indoor localization using multi-frequency RSSI f...
ISBN:
(纸本)9798350388008
The proceedings contain 100 papers. The topics discussed include: CSUM: a novel mechanism for updating CubeSat while preserving authenticity and integrity;single-anchor indoor localization using multi-frequency RSSI fingerprinting;detecting network anomalies in NetFlow traffic with machine learning algorithms;ShieldDINC: privacy-preserving distributed in-network computations with efficient homomorphic encryption;scheduling of multiple UAVs in BVLoS operations along unidirectional and bidirectional paths;science DMZ networks: how different are they really?;evaluating drill-down DDoS destination detection;failure resilient green traffic engineering;and CardSketch: shift attention for network-wide cardinality telemetry.
The proceedings contain 83 papers. The topics discussed include: coverage analysis for multi-hop communication in intelligent-surface-assisted mmWave WLANs;humidity estimation using Wi-Fi channel state information;dem...
ISBN:
(纸本)9798350300734
The proceedings contain 83 papers. The topics discussed include: coverage analysis for multi-hop communication in intelligent-surface-assisted mmWave WLANs;humidity estimation using Wi-Fi channel state information;demo: a reproducible link emulation environment for the evaluation of network-coded video streaming;green segment routing for improved sustainability of backbone networks;demo: modular test frameworks for PolyVerif autonomous vehicle validation environment;trusted sharing of data under cloud-edge-end collaboration and its formal verification;lightweight quantum-safe cryptography in underwater scenarios;improving bitswap privacy with forwarding and source obfuscation;cyber insurance in the maritime transportation system;and fault-adaptive scheduling for data acquisition networks.
The proceedings contain 82 papers. The topics discussed include: a robust Monte-Carlo-based deep learning strategy for virtual network embedding;research on the derivation of AS hidden links and the discovery of criti...
ISBN:
(纸本)9781665480017
The proceedings contain 82 papers. The topics discussed include: a robust Monte-Carlo-based deep learning strategy for virtual network embedding;research on the derivation of AS hidden links and the discovery of critical AS;robust intra-slice migration in fog computing;deficit round-robin: network calculus based worst-case traversal time analysis revisited;deep sequence models for packet stream analysis and early decisions;improving proximity classification for contact tracing using a multi-channel approach;an agent-based approach to disintegrate and modularize software defined networks controller;cross-regional friendship inference via category-aware multi-bipartite graph embedding;service-based identification of highly coupled mobile applications;how to build socio-organizational information from remote IP addresses to enrich security analysis?;and accurate real-time labeling of application traffic.
The proceedings contain 72 papers. The topics discussed include: strict judgment of successful transfer of multiple data and ACK frames in interfering wireless LAN environments;SPONGE: software-defined traffic enginee...
ISBN:
(纸本)9781728110288
The proceedings contain 72 papers. The topics discussed include: strict judgment of successful transfer of multiple data and ACK frames in interfering wireless LAN environments;SPONGE: software-defined traffic engineering to absorb influx of network traffic;exploring the usefulness of machine learning in the context of WebRTC performance estimation;towards a realistic path planning evaluation model for micro aerial vehicle-assisted localization of Wi-Fi nodes;association and reliability in 802.11ad networks: an experimental study;packet-preserving network coding schemes for padding overhead reduction;network web traffic generator for cyber range exercises;and a neural attention model for real-time network intrusion detection.
The proceedings contain 18 papers. The topics discussed include: EpiFi: an in-home IoT architecture for epidemiological deployments;an android wear OS framework for sensor data and network interfaces;supporting seamle...
ISBN:
(纸本)9781538650974
The proceedings contain 18 papers. The topics discussed include: EpiFi: an in-home IoT architecture for epidemiological deployments;an android wear OS framework for sensor data and network interfaces;supporting seamless connectivity in drone-assisted intelligent transportation systems;YetiOS: an adaptive operating system for wireless sensor networks;the role of 5G networks in the field of medical sciences education;and packet dropping and decoding statistics for linear network coded broadcast with feedback.
The proceedings contain 97 papers. The topics discussed include: graph based visualization techniques for analysis of blockchain transactions;DEMONS: extended manufacturer usage description to restrain malicious smart...
ISBN:
(纸本)9780738124766
The proceedings contain 97 papers. The topics discussed include: graph based visualization techniques for analysis of blockchain transactions;DEMONS: extended manufacturer usage description to restrain malicious smartphone apps;MonGNN: a neuroevolutionary-based solution for 5G network slices monitoring;a minimal delay violation downlink LTE scheduler;a deep reinforcement learning approach for service migration in MEC-enabled vehicular networks;EADAS: edge assisted adaptation scheme for HTTP adaptive streaming;characterizing human mobility patterns during COVID-19 using cellular network data;alternative authentication with smart contracts for online games;hop-by-hop: advancing cooperative congestion control for cyber-physical systems;less is more: choosing fair network coding parameters;and a distributed delivery architecture for user generated content live streaming over HTTP.
Bitswap is the data exchange protocol for the content-addressed peer-to-peer overlay network IPFS. During content discovery, Bitswap reveals the interest of a peer in content to all neighbors, enabling the tracking of...
详细信息
ISBN:
(纸本)9798350388015;9798350388008
Bitswap is the data exchange protocol for the content-addressed peer-to-peer overlay network IPFS. During content discovery, Bitswap reveals the interest of a peer in content to all neighbors, enabling the tracking of user interests. In our paper, we propose a modification of the Bitswap protocol, which enables source obfuscation using proxies for content discovery. The proxies are selected via a random-walk. Enabling content discovery through proxies introduces plausible deniability. We evaluate the protocol modification with a simulation. The protocol modification demonstrates enhanced privacy, while maintaining acceptable performance levels.
There has been a lot of effort in improving coupled congestion control in multipath scenarios by locating shared bottlenecks. However, without transparency and control in the network, these approaches come with high c...
详细信息
ISBN:
(纸本)9798350388015;9798350388008
There has been a lot of effort in improving coupled congestion control in multipath scenarios by locating shared bottlenecks. However, without transparency and control in the network, these approaches come with high complexity potentially impacting performance in uncongested conditions. At the same time, Path-Aware Networking provides new opportunities to applications and protocols to identify shared bottlenecks more effectively. In this work, we propose UMCC, an uncoupled multipath congestion control algorithm based on SCION that identifies and locates shared bottlenecks. We demonstrate the fairness of UMCC by comparing it with MPTCP at a shared bottleneck. Our results show that UMCC can precisely locate the exact bottleneck up to 70% of the time and increases throughput by 35% by avoiding shared bottlenecks.
When implementing multi-hop mesh network protocols, efficient direct communication, route discovery, and route repair are crucial to achieve high network throughput. To our knowledge, there is no open mesh routing pro...
详细信息
ISBN:
(纸本)9798350388015;9798350388008
When implementing multi-hop mesh network protocols, efficient direct communication, route discovery, and route repair are crucial to achieve high network throughput. To our knowledge, there is no open mesh routing protocol available for ultra low power ieee 802.11 modules. Previous work relied on single board computers like Raspberry Pi. We implemented the B.A.T.M.A.N. mesh protocol on the popular Espressif ESP32 along with a novel hybrid rate adaptation for the selection of efficient routes. In this demo we showcase challenges and solutions related to the implementation on ESP32 and how the hybrid rate adaptation improves end-to-end throughput.
暂无评论