3D objects are becoming ubiquitous while being used by many mobile and social network applications. Meanwhile, such objects are also becoming a channel being used for covert communication. Steganalysis aims to identif...
详细信息
ISBN:
(纸本)9783030000219;9783030000202
3D objects are becoming ubiquitous while being used by many mobile and social network applications. Meanwhile, such objects are also becoming a channel being used for covert communication. Steganalysis aims to identify when information is transferred in such ways. This research study analyses the influence of the 3D object smoothing, which is an essential step before extracting the features used for 3D steganalysis. During the experimental results, the efficiency when employing various degrees of 3D smoothing, is assessed in the context of steganalysis.
Distributed controller architectures in software defined networks raise the issue of switch-controller mapping. In a mapping approach where a switch distributes flow setup requests (traffic) to multiple controllers, a...
详细信息
ISBN:
(纸本)9781509065226
Distributed controller architectures in software defined networks raise the issue of switch-controller mapping. In a mapping approach where a switch distributes flow setup requests (traffic) to multiple controllers, a solution that finds the optimal switch-controller mapping and traffic distribution among the controllers for long term performance and responds effectively to network events such as short term traffic variation and controller failure is necessary. We develop a Multi-Controller Traffic Engineering (MCTE) scheme that: i) finds the long term switch-controller mapping and traffic distribution that minimizes flow setup time, ii) manages traffic distribution during short term variation, and iii) pre-computes backup controllers and traffic distribution upon controller failure. We formulate optimization problems for MCTE components and develop heuristic algorithms to obtain solutions in reasonable time. Numerical simulations show that the proposed algorithms achieve flow setup time within 2% of the lower bound and effectively manage traffic upon traffic variations and controller failures.
An algorithm, Travelling Salesperson Problem for Data Collection (TSP-DC), is presented which can plan tours for collected data from sensor nodes using a mobile sink. This is the first work which can deal with multipl...
详细信息
ISBN:
(纸本)9781509065837
An algorithm, Travelling Salesperson Problem for Data Collection (TSP-DC), is presented which can plan tours for collected data from sensor nodes using a mobile sink. This is the first work which can deal with multiple different data ranges and data loads for each sensor node. Linear programming is used to schedule data transmissions to different nodes to reduce the overall tour time. Simulation results show that the algorithm reduces tour time by up to 70% compared to previous approaches. A further enhancement, TSP-DA (TSP with Dynamic Adjustment) is able to dynamically recalculate tours when the actual data loads at nodes become known, and in some cases, it can outperform tours with prior knowledge of data loads.
Vehicular communication plays a key role in nearfuture automotive transport, promising features like increased traffic safety or wireless software updates. However, vehicular communication can expose driver locations ...
详细信息
ISBN:
(纸本)9781509065226
Vehicular communication plays a key role in nearfuture automotive transport, promising features like increased traffic safety or wireless software updates. However, vehicular communication can expose driver locations and thus poses important privacy risks. Many schemes have been proposed to protect privacy in vehicular communication, and their effectiveness is usually shown using privacy metrics. However, to the best of our knowledge, (1) different privacy metrics have never been compared to each other, and (2) it is unknown how strong the metrics are. In this paper, we argue that privacy metrics should be monotonic, i.e. that they indicate decreasing privacy for increasing adversary strength, and we evaluate the monotonicity of 32 privacy metrics on real and synthetic traffic with state-of-the-art adversary models. Our results indicate that most privacy metrics are weak at least in some situations. We therefore recommend to use metrics suites, i.e. combinations of privacy metrics, when evaluating new privacy-enhancing technologies.
Software Defined Networking (SDN) enables a centralised entity - the controller - to monitor the network's status by collecting traffic statistics such as packets, bytes, etc. Each statistic is associated with a f...
详细信息
ISBN:
(纸本)9781509065226
Software Defined Networking (SDN) enables a centralised entity - the controller - to monitor the network's status by collecting traffic statistics such as packets, bytes, etc. Each statistic is associated with a forwarding table entry (FTE) in a switch whose structure and format is specified by the OpenFlow standard (de-facto SDN standard). For a flow with a FTE, its statistic is easily acquired by an inquiry from a controller to the switch on this flow's corresponding FTE. If a flow has no matching FTE, its statistic is not known until a new FTE is installed for the purpose of monitoring it. However, the time to install these FTEs and the potential conflicts between them and the existing FTEs jeopardise the feasibility of this approach. To avoid these drawbacks, this paper proposes a traffic estimation approach based on the existing FTE's statistics. With the help of boolean algebra, the deterministic confidence interval of any given flowset can be estimated. This approach avoids the FTE installation time and also saves the FTE storage space.
Emerging protocols for low-power wireless networks increasingly exploit constructive interference and the capture effect. The basic idea is that the synchronous transmission of identical packets by neighboring nodes l...
详细信息
ISBN:
(纸本)9781509065226
Emerging protocols for low-power wireless networks increasingly exploit constructive interference and the capture effect. The basic idea is that the synchronous transmission of identical packets by neighboring nodes leads to constructive interference - or at least do not cause destructive interference. This requires that the temporal displacement of packets at receiving nodes is lower than 0.5 mu s when employing ieee 802.15.4 radios. However, commonly used sensor nodes are equipped with cheap and imprecise clocks that show high frequency deviations across nodes, making constructive interference difficult to achieve. Such deviations further increase when individual nodes are exposed to different temperatures. In this paper we introduce Flock, a novel approach to compensate for differences in clock frequency across synchronously transmitting nodes. We implemented Flock in Contiki on the example of Glossy, a flooding protocol based on synchronous transmissions. Our results confirm that Flock can achieve constructive interference on real sensor nodes in over 98% of the cases. Overall, Flock makes protocols that exploit synchronous transmissions more robust to operate even in challenging environments.
The ieee 802.11 MAC protocol uses Distributed Coordinated Function (DCF) as the main element to determine the efficiency in sharing the limited resources of the wireless channels in wireless local area networks (WLANs...
详细信息
ISBN:
(纸本)9781509065837
The ieee 802.11 MAC protocol uses Distributed Coordinated Function (DCF) as the main element to determine the efficiency in sharing the limited resources of the wireless channels in wireless local area networks (WLANs). For analyzing 802.11 DCF networks, one of the key assumptions commonly used is that every station always has a packet to transmit (saturated state). However, in practice it may not be valid. In this paper, we assess the accuracy of the non-saturated traffic condition by integrating the traditional M/G/1 queueing model into Discrete Time Markov Chain (DTMC) model. The proposed I-DTMC enables us to analyze the performance of per-station in terms of average MAC system delay observed by each packet for successful transmission over the medium. The comparative results show enhanced performance evaluation of 802.11 DCF against other models.
A Content Delivery Network (CDN) is a distributed system composed of a large number of nodes that allows users to request objects from nearby nodes. CDN not only reduces the end-to-end latency on the user side but als...
详细信息
ISBN:
(纸本)9781509065226
A Content Delivery Network (CDN) is a distributed system composed of a large number of nodes that allows users to request objects from nearby nodes. CDN not only reduces the end-to-end latency on the user side but also offloads Content Providers (CPs) providing resilience against Distributed Denial of Service (DDoS) attacks. However, by caching objects and processing users' requests, CDN service providers could infer user preferences and the popularity of objects, thus resulting in information leakage. Unfortunately, such information leakage may result in compromising users' privacy and reveal businessspecific information to untrusted or potentially malicious CDN providers. State-of-the-art Searchable Encryption (SE) schemes can protect the content of sensitive objects but cannot prevent the CDN providers from inferring users' preferences and the popularity of objects. In this work, we present a privacy-preserving encrypted CDN system not only to hide the content of objects and users' requests, but also to protect users' preferences and the popularity of objects from curious CDN providers. We encrypt the objects and user requests in a way that both the CDNs and CPs can perform the search operations without accessing those objects and requests in cleartext. Our proposed system is based on a scalable key management approach for multi-user access, where no key regeneration and data re-encryption are needed for user revocation.
Cross Technology Interference (CTI) is a prevalent phenomenon in the 2.4 GHz unlicensed spectrum causing packet losses and increased channel contention. In particular, WiFi interference is a severe problem for low-pow...
详细信息
ISBN:
(纸本)9781509065226
Cross Technology Interference (CTI) is a prevalent phenomenon in the 2.4 GHz unlicensed spectrum causing packet losses and increased channel contention. In particular, WiFi interference is a severe problem for low-power wireless networks causing a significant degradation of the overall performance. We propose here a proactive approach based on WiFi interference modeling for accurately predicting transmission opportunities for low-power wireless networks. We leverage statistical analysis of real-world WiFi traces to learn aggregated traffic characteristics in terms of Inter-Arrival Time (IAT) that, once captured into a specific 2nd order Markov Modulated Poisson Process (MMPP(2)) model, enable accurate estimation of interference. We further use a hidden Markov model (HMM) for channel occupancy prediction. We evaluated the performance of: i) the MMPP(2) traffic model w.r.t. real-world traces and an existing Pareto model for accurately characterizing the WiFi traffic and, ii) compared the HMM based white space prediction to random channel access. We report encouraging results for using interference modeling for white space prediction.
We propose local binary convolution (LBC), an efficient alternative to convolutional layers in standard convolutional neural networks (CNN). The design principles of LBC are motivated by local binary patterns (LBP). T...
详细信息
ISBN:
(纸本)9781538604571
We propose local binary convolution (LBC), an efficient alternative to convolutional layers in standard convolutional neural networks (CNN). The design principles of LBC are motivated by local binary patterns (LBP). The LBC layer comprises of a set of fixed sparse pre-defined binary convolutional filters that are not updated during the training process, a non-linear activation function and a set of learnable linear weights. The linear weights combine the activated filter responses to approximate the corresponding activated filter responses of a standard convolutional layer. The LBC layer affords significant parameter savings, 9x to 169x in the number of learnable parameters compared to a standard convolutional layer. Furthermore, the sparse and binary nature of the weights also results in up to 9x to 169x savings in model size compared to a standard convolutional layer. We demonstrate both theoretically and experimentally that our local binary convolution layer is a good approximation of a standard convolutional layer. Empirically, CNNs with LBC layers, called local binary convolutional neural networks (LBCNN), achieves performance parity with regular CNNs on a range of visual datasets (MNIST, SVHN, CIFAR-10, and ImageNet) while enjoying significant computational savings.
暂无评论