![]() Tawakuli, Amal ![]() ![]() ![]() Poster (2019, October 08) The automotive industry generates large datasets of various formats, uncertainties and frequencies. To exploit Automotive Big Data, the data needs to be connected, fused and preprocessed to quality ... [more ▼] The automotive industry generates large datasets of various formats, uncertainties and frequencies. To exploit Automotive Big Data, the data needs to be connected, fused and preprocessed to quality datasets before being used for production and business processes. Data preprocessing tasks are typically expensive, tightly coupled with their intended AI algorithms and are done manually by domain experts. Hence there is a need to automate data preprocessing to seamlessly generate cleaner data. We intend to introduce a generic data preprocessing framework that handles vehicle-to-everything (V2X) data streams and dynamic updates. We intend to decentralize and automate data preprocessing by leveraging edge computing with the objective of progressively improving the quality of the dataflow within edge components (vehicles) and onto the cloud. [less ▲] Detailed reference viewed: 237 (9 UL)![]() Rinaldi, Giulia ![]() ![]() ![]() in 10th International Conference on Networks of the Future (NoF) (2019, October 04) The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼] The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲] Detailed reference viewed: 214 (15 UL)![]() Boualouache, Abdelwahab ![]() ![]() ![]() in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October) The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼] The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲] Detailed reference viewed: 284 (74 UL)![]() Di Maio, Antonio ![]() ![]() ![]() in Lecture Notes in Computer Science (volume 11803) (2019, September 25) Infrastructure-less communications between moving vehicles present emblematic challenges because of high node mobility and link volatility, which may harm the performances of different categories of ... [more ▼] Infrastructure-less communications between moving vehicles present emblematic challenges because of high node mobility and link volatility, which may harm the performances of different categories of emerging vehicular applications. In order to move data between vehicles that are not in direct communication range, several distributed routing protocols have been proposed and tested in vehicular networks, highlighting their strengths and weaknesses. Some previous works report disagreeing claims about routing protocol performances in similar vehicular scenarios. Therefore, in this work, we evaluate the performances in terms of Packet Delivery Ratio (PDR), packet delay, frame collision rate, and signaling rate of three well-known routing protocols (AODV, DSDV, and GPSR), simulating them in a realistic Manhattan scenario. Furthermore, we evaluate the impact of typical urban obstacles (e.g. buildings) on the considered performance metrics. We observed that, in the proposed urban scenario, AODV provided the best PDR, GPSR the best packet delay, and DSDV failed to provide satisfactory performances due to signaling-induced congestion. Simulations showed that considering the shadowing effects induced by the buildings in an urban scenario drastically changes the observed performances, i.e. reduces the frame collisions, decreases the PDR, and increases the packet delay. [less ▲] Detailed reference viewed: 136 (5 UL)![]() Di Maio, Antonio ![]() ![]() ![]() in 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) Proceedings (2019, September 22) 5G-enabled vehicular networks will soon allow their users to exchange safety and non-safety related information over heterogeneous communication interfaces. Routing vehicular data flows over multi-hop ... [more ▼] 5G-enabled vehicular networks will soon allow their users to exchange safety and non-safety related information over heterogeneous communication interfaces. Routing vehicular data flows over multi-hop Vehicle-to-Vehicle (V2V) communications is one of the hardest challenges in vehicular networking, and it has been tackled in literature by using distributed algorithms. The distributed approach has shown significant inefficiencies in such dynamic vehicular scenarios, mainly due to poor network congestion control. To overcome the complexity of the envisioned architecture, and the inefficiency of distributed routing algorithms, we hereby propose to leverage the coordination capabilities of Software-Defined Networking (SDN) to determine optimal V2V multi-hop paths and to offload traffic from the Vehicle-to-Infrastructure-to-Vehicle (V2I2V) to the V2V communications, using both cellular and Wi-Fi technologies. In order to achieve this goal, we propose Multi-Flow Congestion-Aware Routing (MFCAR), a centralized routing algorithm that relies on graph theory to choose short and uncongested V2V paths. Realistic simulations prove that MFCAR outperforms well- established centralized routing algorithms (e.g. Dijkstra's) in terms of Packet Delivery Ratio (PDR), goodput and average packet delay, up to a five-fold performance gain. [less ▲] Detailed reference viewed: 87 (2 UL)![]() de La Cadena Ramos, Augusto Wladimir ![]() ![]() ![]() in Data and Applications Security and Privacy XXXIII, 2019 (2019, July 15) Detailed reference viewed: 232 (18 UL)![]() Msadek, Mohamed Nizar ![]() ![]() ![]() in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19) Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼] Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲] Detailed reference viewed: 644 (14 UL)![]() Palattella, Maria Rita ![]() ![]() in The 34th ACM Symposium On Applied Computing (SAC (2019, April) Detailed reference viewed: 269 (19 UL)![]() ; Frank, Raphaël ![]() ![]() in IEEE Transactions on Intelligent Transportation Systems (2019) We propose a novel way of linking mobile network signaling data to the state of the underlying urban road network. We show how a predictive model of traffic flows can be created from mobile network ... [more ▼] We propose a novel way of linking mobile network signaling data to the state of the underlying urban road network. We show how a predictive model of traffic flows can be created from mobile network signaling data. To achieve this, we estimate the vehicular density inside specific areas using a polynomial function of the inner and exiting mobile phone handovers performed by the base stations covering those areas. We can then use the aggregated handovers as flow proxies alongside the density proxy to directly estimate an average velocity within an area. We evaluate the model in a simulation study of Luxembourg city and generalize our findings using a real-world data set extracted from the LTE network of a Luxembourg operator. By predicting the real traffic states as measured through floating car data, we achieve a mean absolute percentage error of 11.12%. Furthermore, in our study case, the approximations of the network macroscopic fundamental diagrams (MFD) of road network partitions can be generated. The analyzed data exhibit low variance with respect to a quadratic concave flow-density function, which is inline with the previous theoretical results on MFDs and are similar when estimated from simulation and real data. These results indicate that mobile signaling data can potentially be used to approximate MFDs of the underlying road network and contribute to better estimate road traffic states in urban congested networks. [less ▲] Detailed reference viewed: 242 (16 UL)![]() ; Adamsky, Florian ![]() ![]() in EAI Endorsed Transactions on Security and Safety (2019) Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances,Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and to send ... [more ▼] Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances,Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and to send commands remotely. For a long time, operator of CIs applied the air gap principle, a security strategy that physically isolates the control network from other communication channels. True isolation, however,is difficult nowadays due to the massive spread of connectivity: using open protocols and more connectivity opens new network attacks against CIs. To cope with this dilemma, sophisticated security measures are needed to address malicious intrusions, which are steadily increasing in number and variety. However, traditional Intrusion Detection Systems (IDSs) cannot detect attacks that are not already present in their databases. To this end, we assess in this paper Machine Learning (ML) techniques for anomaly detection in SCADA systems using a real data set collected from a gas pipeline system and provided by the Mississippi State University (MSU).The contribution of this paper is two-fold: 1) The evaluation of four techniques for missing data estimation and two techniques for data normalization, 2) The performances of Support Vector Machine (SVM), Random Forest (RF), Bidirectional Long Short Term Memory (BLSTM) are assessed in terms of accuracy, precision,recall and F1 score for intrusion detection. Two cases are differentiated: binary and categorical classifications.Our experiments reveal that RF and BLSTM detect intrusions effectively, with an F1 score of respectively>99% and>96% [less ▲] Detailed reference viewed: 142 (10 UL)![]() Palattella, Maria Rita ![]() ![]() ![]() in ACM SIGMETRICS Performance Evaluation Review (2019, January) The MQTT application protocol was originally designed for monitoring a oil pipeline through the desert by collecting sensor data via satellite link. Thus, by design MQTT is very suitable for data ... [more ▼] The MQTT application protocol was originally designed for monitoring a oil pipeline through the desert by collecting sensor data via satellite link. Thus, by design MQTT is very suitable for data collection over integrated satellite-terrestrial networks. Leveraging on the MQTT Bridge functionality, in this work we propose a novel architecture with two MQTT Brokers located at the satellite terminal and the satellite gateway. By using the topic pattern option, supported by the bridge, a subscriber can request several topics within a single request. To reduce the amount of traffic ex-changed over the satellite return channel, we introduce in the architecture a new entity, namely MQTT message aggregation filter, which aggregates all the MQTT topics matching the topic pattern in the same response. [less ▲] Detailed reference viewed: 124 (6 UL)![]() Turcanu, Ion ![]() ![]() in IEEE 90th Vehicular Technology Conference (VTC2019-Fall) (2019) The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision ... [more ▼] The main objectives of the Intelligent Transportation Systems (ITS) vision is to improve road safety, traffic management, and mobility by enabling cooperative communication among participants. This vision requires the knowledge of the current state of the road traffic, which can be obtained by collecting Floating Car Data (FCD) information using Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p standard. Most of the existing FCD collection protocols have been evaluated via simulations and mathematical models, while the real-world implications have not been thoroughly investigated. This paper presents an open-source implementation of two state-of-the-art FCD collection algorithms, namely BASELINE and DISCOVER. These algorithms are implemented in an open-source vehicular prototyping platform and validated in a real-world experimental setup. [less ▲] Detailed reference viewed: 167 (31 UL)![]() ; ; et al Poster (2019) Detailed reference viewed: 224 (29 UL)![]() Turcanu, Ion ![]() ![]() in 11th IEEE Vehicular Networking Conference (VNC 2019) (2019) Content downloading of mobile broadband users today routinely causes network load to exceed what the Radio Access Network (RAN) can sustain without degrading user experience. Many works are therefore ... [more ▼] Content downloading of mobile broadband users today routinely causes network load to exceed what the Radio Access Network (RAN) can sustain without degrading user experience. Many works are therefore considering edge or fog computing paradigms and Device to Device (D2D) communication using 4G/5G C-V2X or IEEE 802.11p/bd links to obtain content. When content originates (or is maintained) at a central location, however, this requires expensive seeding of the content into the mobile network. We thus advocate basing the decision of when and where to perform fog seeding on a network graph that respects connectivity metrics while performing community detection and exploiting node centrality. We present different seeding strategies and investigate their respective benefits compared to traditional information-centric networking. Using simulations, we demonstrate that choosing a suitable strategy can yield substantial benefits - and vice versa. [less ▲] Detailed reference viewed: 527 (14 UL)![]() Msadek, Mohamed Nizar ![]() ![]() ![]() in International Conference on Smart Applications, Communications and Networking (SmartNets) (2018, November) The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a ... [more ▼] The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. [less ▲] Detailed reference viewed: 325 (21 UL)![]() Soua, Ridha ![]() ![]() ![]() in IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks (2018, October) Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the ... [more ▼] Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for IoT are well recognised, to allow a smooth integration of M2M and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for MQTT and CoAP, identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2M-Satellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links. [less ▲] Detailed reference viewed: 248 (6 UL)![]() Jafarnejad, Sasan ![]() ![]() ![]() in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (2018, September) The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼] The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲] Detailed reference viewed: 149 (13 UL)![]() Adamsky, Florian ![]() ![]() ![]() in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June) Detailed reference viewed: 332 (14 UL)![]() Giotti, Domenico ![]() ![]() ![]() in Performance Analysis of CoAP under Satellite Link Disruption (2018, June) Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to ... [more ▼] Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to support well IoT applications, when terrestrial networks are no longer available (e.g., in remote not habitable areas, in the occurrence of calamities). Subsequently, the only way forward is to transmit IoT data over satellite. The integrated satellite-terrestrial networks are emerging as a promising solution to ensure ubiquitous IoT connectivity, higher throughput and reliability. Being different by design, IoT protocols’ tuning is needed to integrate terrestrial and satellite segments. In the current paper, we evaluate the performances of CoAP, the well-known lightweight application protocol for IoT in an integrated scenario, taking into account the satellite link disruption. The key findings of our study, conducted using the OpenSAND simulator, show that decreasing the value of congestion control parameters proposed by the standard [1], mainly ACK_TIMEOUT and ACK_RANDOM_FACTOR, is crucial to achieve lower end-to-end delays and higher packet delivery ratio. [less ▲] Detailed reference viewed: 336 (20 UL)![]() ; Frank, Raphaël ![]() ![]() Scientific Conference (2018, June) Detailed reference viewed: 121 (4 UL) |
||