Latest in cs.ni

total 10785took 0.14s
Occupancy Estimation Using Low-Cost Wi-Fi SniffersMay 16 2019Real-time measurements on the occupancy status of indoor and outdoor spaces can be exploited in many scenarios (HVAC and lighting system control, building energy optimization, allocation and reservation of spaces, etc.). Traditional systems for occupancy ... More
Efficient Attack Correlation and Identification of Attack Scenarios based on Network-MotifsMay 16 2019An Intrusion Detection System (IDS) to secure computer networks reports indicators for an attack as alerts. However, every attack can result in a multitude of IDS alerts that need to be correlated to see the full picture of the attack. In this paper, ... More
Reactive Video Caching via long-short-term fusion approachMay 16 2019Video caching has been a basic network functionality in today's network architectures. Although the abundance of caching replacement algorithms has been proposed recently, these methods all suffer from a key limitation: due to their immature rules, inaccurate ... More
Edge-Assisted Hierarchical Federated Learning with Non-IID DataMay 16 2019Federated Learning (FL) is capable of leveraging massively distributed private data, e.g., on mobile phones and IoT devices, to collaboratively train a shared machine learning model with the help of a cloud server. However, its iterative training process ... More
Massive MIMO for Internet of Things (IoT) ConnectivityMay 15 2019Massive MIMO is considered to be one of the key technologies in the emerging 5G systems, but also a concept applicable to other wireless systems. Exploiting the large number of degrees of freedom (DoFs) of massive MIMO essential for achieving high spectral ... More
Cooperative Relaying in LoRa Sensor NetworksMay 15 2019We propose a communication scheme with relays to improve the reliability of a Long Range (LoRa) sensor network with duty cycle limitations. The relays overhear the sensors' transmissions and forward them to a gateway. Simulations show that relaying is ... More
Statistical Learning Based Congestion Control for Real-time Video CommunicationMay 15 2019With the increasing demands on interactive video applications, how to adapt video bit rate to avoid network congestion has become critical, since congestion results in self-inflicted delay and packet loss which deteriorate the quality of real-time video ... More
Statistical Learning Based Congestion Control for Real-time Video CommunicationMay 15 2019May 16 2019With the increasing demands on interactive video applications, how to adapt video bit rate to avoid network congestion has become critical, since congestion results in self-inflicted delay and packet loss which deteriorate the quality of real-time video ... More
Connectivity-Aware UAV Path Planning with Aerial Coverage MapsMay 15 2019Cellular networks are promising to support effective wireless communications for unmanned aerial vehicles (UAVs), which will help to enable various long-range UAV applications. However, these networks are optimized for terrestrial users, and thus do not ... More
Using Bursty Announcements for Early Detection of BGP Routing AnomaliesMay 14 2019Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination. In this work, we propose a method for early detection of large-scale disruptions based on the ... More
Design and Experimental Validation of a Software-Defined Radio Access Network Testbed with Slicing SupportMay 14 2019Network slicing is a fundamental feature of 5G systems to partition a single network into a number of segregated logical networks, each optimized for a particular type of service, or dedicated to a particular customer or application. The realization of ... More
Using Delay Tolerant Networks as a Backbone for Low-cost Smart CitiesMay 14 2019Rapid urbanization burdens city infrastructure and creates the need for local governments to maximize the usage of resources to serve its citizens. Smart city projects aim to alleviate the urbanization problem by deploying a vast amount of Internet-of-things ... More
Multiservice UAVs for Emergency Tasks in Post-disaster ScenariosMay 14 2019UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication-support and other specific tasks. Their equipment and mission plan are carefully selected to minimize the carried load an overall resource consumption. Typically, ... More
Joint Power Control and Rate Allocation enabling Ultra-Reliability and Energy Efficiency in SIMO Wireless NetworksMay 14 2019Coming cellular systems are envisioned to open up to new services with stringent reliability and energy efficiency requirements. In this paper we focus on the joint power control and rate allocation problem in Single-Input Multiple-Output (SIMO) wireless ... More
A TDMA-like Access Scheme with Splitting Request and Transmission for Vehicular NetworksMay 14 2019In this paper, we consider safety message transmission in a dense vehicular network. With increasing vehicular network density, the collision rate increases when multiple vehicles transmit safety messages simultaneously. To address this issue, we propose ... More
Measuring and simulating latency in interactive remote rendering systemsMay 14 2019Background: The computationally intensive task of real-time rendering can be offloaded to remote cloud systems. However, due to network latency, interactive remote rendering (IRR) introduces the challenge of interaction latency (IL), which is the time ... More
Augmenting Cloud Connectivity with Opportunistic Networks for Rural Remote Patient MonitoringMay 14 2019Current remote patient monitoring (RPM) systems are fully reliant on the Internet. However, complete reliance on Internet connectivity is impractical in low resource and remote environments where modern infrastructure is often lacking, power outages are ... More
Wireless Edge Computing with Latency and Reliability GuaranteesMay 13 2019Edge computing is an emerging concept based on distributing computing, storage, and control services closer to end network nodes. Edge computing lies at the heart of the fifth generation (5G) wireless systems and beyond. While current state-of-the-art ... More
Enabling Mobility in LTE-Compatible Mobile-edge Computing with Programmable SwitchesMay 13 2019Network softwarization triggered a new wave of innovation in modern network design. The next generation of mobile networks embraces this trend. Mobile-edge computing (MEC) is a key part of emerging mobile networks that enables ultra-low latency mission-critical ... More
On Optimal Neighbor DiscoveryMay 13 2019Mobile devices apply neighbor discovery (ND) protocols to wirelessly initiate a first contact within the shortest possible amount of time and with minimal energy consumption. For this purpose, over the last decade, a vast number of ND protocols have been ... More
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT NetworksMay 13 2019Adversarial attacks have been widely studied in the field of computer vision but their impact on network security applications remains an area of open research. As IoT, 5G and AI continue to converge to realize the promise of the fourth industrial revolution ... More
RFocus: Practical Beamforming for Small DevicesMay 13 2019To reduce transmit power, increase throughput, and improve communication range, radio systems---such as IoT sensor networks, Wi-Fi and cellular networks---benefit from the ability to direct their signals, to ensure that more of the transmitted power reaches ... More
Radio Map Based Path Planning for Cellular-Connected UAVMay 13 2019In this paper, we study the path planning for a cellular-connected unmanned aerial vehicle (UAV) to minimize its flying distance from given initial to final locations, while ensuring a target link quality in terms of the large-scale channel gain with ... More
A resource-based rule engine for energy savings recommendations in educational buildingsMay 13 2019Raising awareness among young people on the relevance of behaviour change for achieving energy savings is widely considered as a key approach towards long-term and cost-effective energy efficiency policies. The GAIA Project aims to deliver a comprehensive ... More
The Softwarised Network Data ZooMay 13 2019More and more management and orchestration approaches for (software) networks are based on machine learning paradigms and solutions. These approaches depend not only on their program code to operate properly, but also require enough input data to train ... More
Improved Delay Bound for a Service Curve Element with Known Transmission RateMay 13 2019In deterministic and time-sensitive networking, it is important to bound delays of network elements in the worst case. Network calculus is often used to formally prove such delay bounds, based on arrival and service curves characterizations. In this letter, ... More
The Order of Things: Position-Aware Network-friendly Recommendations in Long Viewing SessionsMay 13 2019Caching has recently attracted a lot of attention in the wireless communications community, as a means to cope with the increasing number of users consuming web content from mobile devices. Caching offers an opportunity for a win-win scenario: nearby ... More
Identifying Security-Critical Cyber-Physical Components in Industrial Control SystemsMay 12 2019In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks, having massive destructive consequences. Security metrics are therefore essential to assess their security posture. In this paper, we present a novel ... More
Learning-based Resource Optimization in Ultra Reliable Low Latency HetNetsMay 12 2019In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and ... More
Interoperator fixed-mobile network sharingMay 12 2019We propose the novel idea of interoperator fixed-mobile network sharing, which can be software-defined and readily-deployed. We study the benefits which the sharing brings in terms of resiliency, and show that, with the appropriate placement of a few ... More
Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate SourcesMay 12 2019When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer. A critical stumbling block is a dearth of tools that accurately map routers traversed ... More
A Survey of Controller Placement Problem in Software Defined NetworksMay 12 2019Software Defined Network (SDN) is an emerging network paradigm which provides a centralized view of the network by decoupling the network control plane from the data plane. This strategy of maintaining a global view of the network optimizes resource management. ... More
The efficient and optimal algorithm for the dynamic dedicated path protectionMay 11 2019We present the efficient and optimal algorithm for dynamic routing with dedicated path protection in optical networks; efficient, because it can solve large problems, and optimal, because its results are optimal. The proposed algorithm uses our generic ... More
RDMA Performance Isolation With JustitiaMay 11 2019Despite its increasing popularity, most of RDMA's benefits such as ultra-low latency can be achieved only when running an application in isolation. Using microbenchmarks and real open-source RDMA applications, we identify a series of performance anomalies ... More
Subpacketization-Rate Trade-off in Multi-Antenna Coded CachingMay 10 2019Coded caching can be applied in wireless multi-antenna communications by multicast beamforming coded data chunks to carefully selected user groups and using the existing file fragments in user caches to decode the desired files at each user. However, ... More
Massive Autonomous UAV Path Planning: A Neural Network Based Mean-Field Game Theoretic ApproachMay 10 2019This paper investigates the autonomous control of massive unmanned aerial vehicles (UAVs) for mission-critical applications (e.g., dispatching many UAVs from a source to a destination for firefighting). Achieving their fast travel and low motion energy ... More
Inferring Catchment in Internet RoutingMay 10 2019BGP is the de-facto Internet routing protocol for exchanging prefix reachability information between Autonomous Systems (AS). It is a dynamic, distributed, path-vector protocol that enables rich expressions of network policies (typically treated as secrets). ... More
P4BFT: Hardware-Accelerated Byzantine-Resilient Network Control PlaneMay 10 2019Byzantine Fault Tolerance (BFT) enables correct operation of distributed, i.e., replicated applications in the face of malicious take-over and faulty/buggy individual instances. Recently, BFT designs have gained traction in the context of Software Defined ... More
Optimizing Sensing, Computing, and Communication for Energy Harvesting IoTs: A SurveyMay 10 2019With businesses deploying a growing number of Internet of Things (IoTs), battery maintenance has become a limiting factor for realizing a sustainable IoT infrastructure. To overcome battery limitations, industry is now considering energy harvesting as ... More
RetroFlow: Maintaining Control Resiliency and Flow Programmability for Software-Defined WANsMay 10 2019Providing resilient network control is a critical concern for deploying Software-Defined Networking (SDN) into Wide-Area Networks (WANs). For performance reasons, a Software-Defined WAN is divided into multiple domains controlled by multiple controllers ... More
GAN-based Deep Distributional Reinforcement Learning for Resource Management in Network SlicingMay 10 2019Network slicing is a key technology in 5G communications system, which aims to dynamically and efficiently allocate resources for diversified services with distinct requirements over a common underlying physical infrastructure. Therein, demand-aware allocation ... More
Open-source RANs in practice: an over-the-air deployment for 5G MECMay 09 2019Edge computing that leverages cloud resources to the proximity of user devices is seen as the future infrastructure for distributed applications. However, developing and deploying edge applications, that rely on cellular networks, is burdensome. Such ... More
DSAF: Dynamic Slice Allocation Framework for 5G Core NetworkMay 09 2019Network slicing is a key to supporting different quality-of-service requirements for users and application in the 5G network. However, allocating network slices efficiently while providing a minimum guaranteed level of service in a mobile core is challenging. ... More
Intelligent Scheduling and Power Control for Multimedia Transmission in 5G CoMP Systems: A Dynamic Bargaining GameMay 09 2019Intelligent terminals support a large number of multimedia, such as picture, audio, video, and so on. The coexistence of various multimedia makes it necessary to provide service for different requests. In this work, we consider interference-aware coordinated ... More
Detecting Sybil Attacks in Vehicular Ad Hoc NetworksMay 09 2019Ad hoc networks is vulnerable to numerous number of attacks due to its infrastructure-less nature, one of these attacks is the Sybil attack. Sybil attack is a severe attack on vehicular ad hoc networks (VANET) in which the intruder maliciously claims ... More
Toward Packet Routing with Fully-distributed Multi-agent Deep Reinforcement LearningMay 09 2019Packet routing is one of the fundamental problems in computer networks in which a router determines the next-hop of each packet in the queue to get it as quickly as possible to its destination. Reinforcement learning has been introduced to design the ... More
Path Design for Cellular-Connected UAV with Reinforcement LearningMay 09 2019This paper studies the path design problem for cellular-connected unmanned aerial vehicle (UAV), which aims to minimize its mission completion time while maintaining good connectivity with the cellular network. We first argue that the conventional path ... More
ABC: A Simple Explicit Congestion Control Protocol for Wireless NetworksMay 09 2019We propose Accel-Brake Control (ABC), a simple and deployable explicit congestion control protocol for network paths with time-varying wireless links. ABC routers mark each packet with an "accelerate" or "brake", which causes senders to slightly increase ... More
On Timely Channel Coding with Hybrid ARQMay 08 2019A status updating communication system is examined, in which a transmitter communicates with a receiver over a noisy channel. The goal is to realize timely delivery of fresh data over time, which is assessed by an age-of-information (AoI) metric. Channel ... More
Blockchain-enabled Authentication Handover with Efficient Privacy Protection in SDN-based 5G NetworksMay 08 20195G mobile networks provide additional benefits in terms of lower latency, higher data rates, and more coverage, in comparison to 4G networks, and they are also coming close to standardization. For example, 5G has a new level of data transfer and processing ... More
Blitz-starting QUIC ConnectionsMay 08 2019In this paper, we revisit the idea to remove Slow Start from congestion control. To do so, we build upon the newly gained freedom of transport protocol extendability offered by QUIC to hint bandwidth estimates from a typical web client to a server. Using ... More
Locality-Sensitive Sketching for Resilient Network Flow MonitoringMay 08 2019Network monitoring is vital in modern clouds and data center networks for traffic engineering, network diagnosis, network intrusion detection, which need diverse traffic statistics ranging from flow size distributions to heavy hitters. To cope with increasing ... More
Energy Efficient Power and Channel Allocation in Underlay Device to Multi Device CommunicationsMay 08 2019In this paper, we optimize the energy efficiency (bits/s/Hz/J) of device-to-multi-device (D2MD) wireless communications. While the device-to-device scenario has been extensively studied to improve the spectral efficiency in cellular networks, the use ... More
Deep Reinforcement Learning for Minimizing Age-of-Information in UAV-assisted NetworksMay 08 2019Unmanned aerial vehicles (UAVs) are expected to be a key component of the next-generation wireless systems. Due to their deployment flexibility, UAVs are being considered as an efficient solution for collecting information data from ground nodes and transmitting ... More
Adaptive Causal Network Coding with Feedback for Delay and Throughput GuaranteesMay 08 2019We propose a novel causal coding scheme with forward error correction (FEC) for a point-to-point communication link with delayed feedback. The proposed model can learn the erasure pattern in the channel, and adaptively adjust its transmission and FEC ... More
Network Coding Gaps for Completion Times of Multiple UnicastsMay 07 2019Arguably the most common network communication problem is multiple-unicasts: Distinct packets at different nodes in a network need to be delivered to a destination specific to each packet as fast as possible. The famous multiple-unicast conjecture posits ... More
Reduction of Monitoring Register on Software Defined NetworksMay 07 2019Characterization of data network monitoring registers allows for reductions in the number of data, which is essential when the information flow is high, and implementation of processes with short response times, such as interchange of control information ... More
An Interpretable Neural Network for Configuring Programmable Wireless EnvironmentsMay 07 2019Software-defined metasurfaces (SDMs) comprise a dense topology of basic elements called meta-atoms, exerting the highest degree of control over surface currents among intelligent panel technologies. As such, they can transform impinging electromagnetic ... More
Self-Adjusting Linear NetworksMay 07 2019Emerging networked systems become increasingly flexible and reconfigurable. This introduces an opportunity to adjust networked systems in a demand-aware manner, leveraging spatial and temporal locality in the workload for online optimizations. However, ... More
A Controller for Network-Assisted CACC based PlatooningMay 07 2019Platooning involves a set of vehicles moving in a cooperative fashion at equal inter-vehicular distances. Taking advantage of wireless communication technology, this paper aims to show the impact of network protocols on a platoon using a controller, based ... More
PARI: A Probabilistic Approach to AS Relationships InferenceMay 07 2019Over the last two decades, several algorithms have been proposed to infer the type of relationship between Autonomous Systems (ASes). While the recent works have achieved increasingly higher accuracy, there has not been a systematic study on the uncertainty ... More
On Clustering and Channel Disparity in Non-Orthogonal Multiple Access (NOMA)May 07 2019Non-orthogonal multiple access (NOMA) allows multiple users to share a time-frequency resource block by using different power levels. An important challenge associated with NOMA is the selection of users that share a resource block. This is referred to ... More
Internet Speed Measurement: Current Challenges and Future RecommendationsMay 07 2019Government organizations, regulators, consumers, Internet service providers, and application providers alike all have an interest in measuring user Internet "speed". A decade ago, speed measurement was more straightforward. Today, as access speeds have ... More
Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift KeyingMay 06 2019Undetectable wireless transmissions are fundamental to avoid eavesdroppers. To address this issue, wireless steganography hides covert information inside primary information by slightly modifying the transmitted waveform such that primary information ... More
DeepRMSA: A Deep Reinforcement Learning Framework for Routing, Modulation and Spectrum Assignment in Elastic Optical NetworksMay 06 2019This paper proposes DeepRMSA, a deep reinforcement learning framework for routing, modulation and spectrum assignment (RMSA) in elastic optical networks (EONs). DeepRMSA learns the correct online RMSA policies by parameterizing the policies with deep ... More
DeepRMSA: A Deep Reinforcement Learning Framework for Routing, Modulation and Spectrum Assignment in Elastic Optical NetworksMay 06 2019May 15 2019This paper proposes DeepRMSA, a deep reinforcement learning framework for routing, modulation and spectrum assignment (RMSA) in elastic optical networks (EONs). DeepRMSA learns the correct online RMSA policies by parameterizing the policies with deep ... More
Age of Information Scaling in Large Networks with Hierarchical CooperationMay 06 2019Given $n$ randomly located source-destination (S-D) pairs on a fixed area network that want to communicate with each other, we study the age of information with a particular focus on its scaling as the network size $n$ grows. We propose a three-phase ... More
Network Slice Instantiation for 5G Micro-Operator Deployment ScenarioMay 06 2019The concept of network slicing is considered as a key part in the development of 5G. Network slicing is the means to logically isolate network capabilities in order to make each slice responsible for specific network requirement. In the same light, the ... More
Efficient Inter-Datacenter Bulk Transfers with Mixed Completion Time ObjectivesMay 05 2019Bulk transfers from one to multiple datacenters can have many different completion time objectives ranging from quickly replicating some $k$ copies to minimizing the time by which the last destination receives a full replica. We design an SDN-style wide-area ... More
Secure Data Timestamping in Synchronization-Free LoRaWANMay 05 2019Low-power wide-area network technologies such as LoRaWAN are important for achieving ubiquitous connectivity required by the Internet of Things. Due to limited bandwidth, LoRaWAN is primarily for applications of collecting low-rate monitoring data from ... More
Interledger Smart Contracts for Decentralized Authorization to Constrained ThingsMay 05 2019We present models that utilize smart contracts and interledger mechanisms to provide decentralized authorization for constrained IoT devices. The models involve different tradeoffs in terms of cost, delay, complexity, and privacy, while exploiting key ... More
OAuth 2.0 meets Blockchain for Authorization in Constrained IoT EnvironmentsMay 05 2019We present models for utilizing blockchain and smart contract technology with the widely used OAuth 2.0 open authorization framework to provide delegated authorization for constrained IoT devices. The models involve different tradeoffs in terms of privacy, ... More
Towards Big data processing in IoT: network management for online edge data processingMay 05 2019Heavy data load and wide cover range have always been crucial problems for internet of things (IoT). However, in mobile-edge computing (MEC) network, the huge data can be partly processed at the edge. In this paper, a MEC-based big data analysis network ... More
Cost-Effective Hybrid Satellite-Terrestrial Networks: Optimal Beamforming with Nonlinear PA and Imperfect CSITMay 05 2019In hybrid satellite-terrestrial networks (HSTNs), spectrum sharing is crucial to alleviate the "spectrum scarcity" problem. Therein, the transmit beams should be carefully designed to mitigate the inter-satellite-terrestrial interference. Different from ... More
Performance evaluation of a NDN forwarder using statistical model checkingMay 05 2019Named Data Networking (NDN) is an emerging technology for a future internet architecture that addresses weaknesses of the Internet Protocol (IP). Since Internet users and applications have demonstrated an ever-increasing need for high speed packet forwarding, ... More
Learning to Cooperate in D2D Caching NetworksMay 04 2019We consider a wireless device-to-device (D2D) cooperative network where memory-endowed nodes store and exchange content. Each node generates random file requests following an unknown and possibly arbitrary spatio-temporal process, and a base station (BS) ... More
Job Edge-Fog Interconnection Network Creation Game in Internet of ThingsMay 04 2019This is the first paper to address the topology structure of Job Edge-Fog interconnection network in the perspective of network creation game. A two level network creation game model is given, in which the first level is similar to the traditional network ... More
When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum SensingMay 04 2019Defense strategies have been well studied to combat Byzantine attacks that aim to disrupt cooperative spectrum sensing by sending falsified sensing data. However, existing studies usually make network or attack assumptions biased towards the defense (e.g., ... More
Location Management in LTE Networks using Multi-Objective Particle Swarm OptimizationMay 03 2019May 10 2019Long-term evolution (LTE) and LTE-advance (LTE-A) are widely used efficient network technologies serving billions of users, since they are featured with high spectrum efficiency, less latency, and higher bandwidth. Despite remarkable advantages offered ... More
Location Management in LTE Networks using Multi-Objective Particle Swarm OptimizationMay 03 2019Long-term evolution (LTE) and LTE-advance (LTE-A) are widely used efficient network technologies serving billions of users, since they are featured with high spectrum efficiency, less latency, and higher bandwidth. Despite remarkable advantages offered ... More
Exploration of TCP Parameters for Enhanced Performance in a Datacenter EnvironmentMay 03 2019TCP parameters in most of the operating systems are optimized for generic home and office environments having low latencies in their internal networks. However, this arrangement invariably results in a compromized network performance when same parameters ... More
Task-triggered Online Proactive Network Association for Mobile Machines in IoTMay 03 2019Ultra-low latency communication for mobile machines emerges as a critical technology in Internet of Things (IoT). Proactive network association has been suggested to support ultra-low latency communication with the assistance of mobile edge computing. ... More
Event-triggered Online Proactive Network Association to Mobile Edge Computing for IoTMay 03 2019May 10 2019Ultra-low latency communication for mobile machines emerges as a critical technology in Internet of Things (IoT). Proactive network association has been suggested to support ultra-low latency communication with the assistance of mobile edge computing. ... More
Content Delivery Latency of Caching Strategies for Information-Centric IoTMay 03 2019In-network caching is a central aspect of Information-Centric Networking (ICN). It enables the rapid distribution of content across the network, alleviating strain on content producers and reducing content delivery latencies. ICN has emerged as a promising ... More
Generative Adversarial Network for Wireless Signal SpoofingMay 03 2019May 07 2019The paper presents a novel approach of spoofing wireless signals by using a general adversarial network (GAN) to generate and transmit synthetic signals that cannot be reliably distinguished from intended signals. It is of paramount importance to authenticate ... More
Generative Adversarial Network for Wireless Signal SpoofingMay 03 2019The paper presents a novel approach of spoofing wireless signals by using a general adversarial network (GAN) to generate and transmit synthetic signals that cannot be reliably distinguished from intended signals. It is of paramount importance to authenticate ... More
A Survey of Moving Target Defenses for Network SecurityMay 02 2019Network defense techniques based on traditional tools, techniques, and procedures fail to account for the attacker's inherent advantage present due to the static nature of network services and configurations. Moving Target Defense (MTD), on the other ... More
Engineering a QoS Provider Mechanism for Edge Computing with Deep Reinforcement LearningMay 02 2019With the development of new system solutions that integrate traditional cloud computing with the edge/fog computing paradigm, dynamic optimization of service execution has become a challenge due to the edge computing resources being more distributed and ... More
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf DevicesMay 02 2019Bluetooth is among the dominant standards for wireless short-range communication with multi-billion Bluetooth devices shipped each year. Basic Bluetooth analysis inside consumer hardware such as smartphones can be accomplished observing the Host Controller ... More
InternalBlue - Bluetooth Binary Patching and Experimentation FrameworkMay 02 2019Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol ... More
On the Practical Implementation of Propagation Delay and Clock Skew Compensated High-Precision Time Synchronization Schemes with Resource-Constrained Sensor Nodes in Multi-Hop Wireless Sensor NetworksMay 02 2019In wireless sensor networks (WSNs), implementing a high-precision time synchronization scheme on resource-constrained sensor nodes is a major challenge. Our investigation of the practical implementation on a real testbed of the state-of-the-art WSN time ... More
Machine Learning meets Stochastic Geometry: Determinantal Subset Selection for Wireless NetworksMay 01 2019In wireless networks, many problems can be formulated as subset selection problems where the goal is to select a subset from the ground set with the objective of maximizing some objective function. These problems are typically NP-hard and hence solved ... More
Demo Abstract: Pible: Battery-Free Mote for Perpetual Indoor BLE ApplicationsMay 01 2019As of today, large-scale wireless sensor networks are adopted for smart building applications as they are easy and flexible to deploy. Low-power wireless nodes can achieve multi-year lifetimes with an AA battery using Bluetooth Low Energy (BLE) and Zig-Bee. ... More
Shadowed FSO/mmWave Systems with InterferenceMay 01 2019We investigate the performance of mixed free space optical (FSO)/millimeter-wave (mmWave) relay networks with interference at the destination. The FSO/mmWave channels are assumed to follow Malaga-M/Generalized-K fading models with pointing errors in the ... More
Network Calculus-based Timing Analysis of AFDX networks incorporating multiple TSN/BLS traffic classesMay 01 2019We propose a formal timing analysis of an extension of the AFDX standard, incorporating the TSN/BLS shaper, to homogenize the avionics communication architecture, and enable the interconnection of different avionics domains with mixed-criticality levels, ... More
D2D Multicast in Underlay Cellular Networks with Exclusion ZonesMay 01 2019Underlay device-to-device (D2D) multicast communication has potential to improve performance of cellular networks. However, co-channel interference among cellular users (CUs) and D2D multicast groups (MGs) limits the gains of such communication. Allowing ... More
D2D Multicast in Underlay Cellular Networks with Exclusion ZonesMay 01 2019May 06 2019Underlay device-to-device (D2D) multicast communication has potential to improve performance of cellular networks. However, co-channel interference among cellular users (CUs) and D2D multicast groups (MGs) limits the gains of such communication. Allowing ... More
Profi-Load: An FPGA-Based Solution for Generating Network Load in Profinet CommunicationMay 01 2019Industrial automation has received a considerable attention for last few years with the rise of Internet of Things (IoT). Specifically, industrial communication network technology such as Profinet has played the role of a major game changer for such automation. ... More
An Efficient Requirement-Aware Attachment Policy for Future Millimeter Wave Vehicular NetworksMay 01 2019The automotive industry is rapidly evolving towards connected and autonomous vehicles, whose ever more stringent data traffic requirements might exceed the capacity of traditional technologies for vehicular networks. In this scenario, densely deploying ... More
On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating MalwareMay 01 2019In this paper, we investigate the importance of a defense system's learning rates to fight against the self-propagating class of malware such as worms and bots. To this end, we introduce a new propagation model based on the interactions between an adversary ... More