![]() Rida, Ahmad ![]() ![]() ![]() in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) proceedings (2021, September 27) Detailed reference viewed: 41 (0 UL)![]() Rida, Ahmad ![]() ![]() ![]() in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) proceedings (2021, September 27) Detailed reference viewed: 55 (1 UL)![]() Rida, Ahmad ![]() ![]() ![]() in 2021 IEEE 94th Vehicular Technology Conference - Final Program (2021, September) Detailed reference viewed: 56 (2 UL)![]() Boualouache, Abdelwahab ![]() ![]() in Boualouache, Abdelwahab; Soua, Ridha; Qiang, Tang (Eds.) et al Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (2021) While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose ... [more ▼] While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs). However, ETSI has recently published a technical report which highlights the absence of standardized and efficient PCSs [1]. This alarming situation mandates an innovative shift in the way that the privacy of end-users is protected during their journey. Software Defined Networking (SDN) is emerging as a key 5G enabler to manage the network in a dynamic manner. SDN-enabled wireless networks are opening up new programmable and highly-flexible privacy-aware solutions. We exploit this paradigm to propose an innovative software-defined location privacy architecture for vehicular networks. The proposed architecture is context-aware, programmable, extensible, and able to encompass all existing and future pseudonym-changing strategies. To demonstrate the merit of our architecture, we consider a case study that involves four pseudonym-changing strategies, which we deploy over our architecture and compare with their static implementations. We also detail how the SDN controller dynamically switches between the strategies according to the context. [less ▲] Detailed reference viewed: 129 (36 UL)![]() Boualouache, Abdelwahab ![]() ![]() ![]() in IEEE International Conference on Communications ICC'2020 (2020, June 07) With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during ... [more ▼] With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during journeys. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a fully-programmable, self-configurable, and context-aware data collection scheme for VFC. This scheme leverages a stochastic model to dynamically estimate the number of fog stations to be deployed. Our simulation results demonstrate that our proposed scheme provides lower latency and higher resiliency compared to classical data collection schemes. [less ▲] Detailed reference viewed: 209 (47 UL)![]() Soua, Ridha ![]() ![]() ![]() in IEEE International Conference on Communications (ICC) (2020, June) Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served ... [more ▼] Massive MTC (mMTC) is one of the application scenarios that upcoming 5G networks are expected to support. Satellites come into play in mMTC to complement and extend terrestrial networks in under-served areas, where several services can benefit from the adoption of a group communication model. The IETF has specifically standardized the usage of CoAP group communication. However, CoAP responses are still sent in unicast from each single CoAP server to the CoAP client, which results in a substantial traffic load. Such problem becomes more severe in integrated IoT-Satellite networks given the limited bandwidth of the satellite return channel and the large number of IoT devices in a mMTC scenario. To reduce network traffic overhead in group communication and improve the network responsiveness, this paper proposes an aggregation scheme for the CoAP group communication in combination with Observer pattern and proxying. Results obtained by using the openSAND emulator and CoAPthon library corroborate the merit of our optimization in terms of overhead reduction and delay. [less ▲] Detailed reference viewed: 238 (11 UL)![]() Boualouache, Abdelwahab ![]() ![]() ![]() in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May) Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing ... [more ▼] Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing misbehavior detection systems are static and do not adapt to the context of vehicles. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a context-aware MDS. Based on the context, our proposed system can tune security parameters to provide accurate detection with low false positives. Our system is Sybil attack-resistant and compliant with vehicular privacy standards. The simulation results show that, under different contexts, our system provides a high detection ratio and low false positives compared to a static MDS. [less ▲] Detailed reference viewed: 222 (27 UL)![]() Boualouache, Abdelwahab ![]() ![]() ![]() in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29) Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼] Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲] Detailed reference viewed: 239 (49 UL)![]() Rinaldi, Giulia ![]() ![]() ![]() in 10th International Conference on Networks of the Future (NoF) (2019, October 04) The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼] The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲] Detailed reference viewed: 219 (15 UL)![]() Boualouache, Abdelwahab ![]() ![]() ![]() in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October) The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼] The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲] Detailed reference viewed: 287 (74 UL)![]() Msadek, Mohamed Nizar ![]() ![]() ![]() in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19) Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼] Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲] Detailed reference viewed: 648 (14 UL)![]() Palattella, Maria Rita ![]() ![]() in The 34th ACM Symposium On Applied Computing (SAC (2019, April) Detailed reference viewed: 274 (19 UL)![]() ; Adamsky, Florian ![]() ![]() in EAI Endorsed Transactions on Security and Safety (2019) Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances,Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and to send ... [more ▼] Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances,Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and to send commands remotely. For a long time, operator of CIs applied the air gap principle, a security strategy that physically isolates the control network from other communication channels. True isolation, however,is difficult nowadays due to the massive spread of connectivity: using open protocols and more connectivity opens new network attacks against CIs. To cope with this dilemma, sophisticated security measures are needed to address malicious intrusions, which are steadily increasing in number and variety. However, traditional Intrusion Detection Systems (IDSs) cannot detect attacks that are not already present in their databases. To this end, we assess in this paper Machine Learning (ML) techniques for anomaly detection in SCADA systems using a real data set collected from a gas pipeline system and provided by the Mississippi State University (MSU).The contribution of this paper is two-fold: 1) The evaluation of four techniques for missing data estimation and two techniques for data normalization, 2) The performances of Support Vector Machine (SVM), Random Forest (RF), Bidirectional Long Short Term Memory (BLSTM) are assessed in terms of accuracy, precision,recall and F1 score for intrusion detection. Two cases are differentiated: binary and categorical classifications.Our experiments reveal that RF and BLSTM detect intrusions effectively, with an F1 score of respectively>99% and>96% [less ▲] Detailed reference viewed: 147 (10 UL)![]() Palattella, Maria Rita ![]() ![]() ![]() in ACM SIGMETRICS Performance Evaluation Review (2019, January) The MQTT application protocol was originally designed for monitoring a oil pipeline through the desert by collecting sensor data via satellite link. Thus, by design MQTT is very suitable for data ... [more ▼] The MQTT application protocol was originally designed for monitoring a oil pipeline through the desert by collecting sensor data via satellite link. Thus, by design MQTT is very suitable for data collection over integrated satellite-terrestrial networks. Leveraging on the MQTT Bridge functionality, in this work we propose a novel architecture with two MQTT Brokers located at the satellite terminal and the satellite gateway. By using the topic pattern option, supported by the bridge, a subscriber can request several topics within a single request. To reduce the amount of traffic ex-changed over the satellite return channel, we introduce in the architecture a new entity, namely MQTT message aggregation filter, which aggregates all the MQTT topics matching the topic pattern in the same response. [less ▲] Detailed reference viewed: 130 (7 UL)![]() Msadek, Mohamed Nizar ![]() ![]() ![]() in International Conference on Smart Applications, Communications and Networking (SmartNets) (2018, November) The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a ... [more ▼] The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. [less ▲] Detailed reference viewed: 330 (21 UL)![]() Soua, Ridha ![]() ![]() ![]() in IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks (2018, October) Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the ... [more ▼] Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for IoT are well recognised, to allow a smooth integration of M2M and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for MQTT and CoAP, identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2M-Satellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links. [less ▲] Detailed reference viewed: 251 (6 UL)![]() Giotti, Domenico ![]() ![]() ![]() in Performance Analysis of CoAP under Satellite Link Disruption (2018, June) Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to ... [more ▼] Internet of Things (IoT) devices connectivity is steadily increasing in both heterogeneity and sophistication. However, classical and emerging technology (Wi-Fi, Zigbee, LoRa, etc.) are not able to support well IoT applications, when terrestrial networks are no longer available (e.g., in remote not habitable areas, in the occurrence of calamities). Subsequently, the only way forward is to transmit IoT data over satellite. The integrated satellite-terrestrial networks are emerging as a promising solution to ensure ubiquitous IoT connectivity, higher throughput and reliability. Being different by design, IoT protocols’ tuning is needed to integrate terrestrial and satellite segments. In the current paper, we evaluate the performances of CoAP, the well-known lightweight application protocol for IoT in an integrated scenario, taking into account the satellite link disruption. The key findings of our study, conducted using the OpenSAND simulator, show that decreasing the value of congestion control parameters proposed by the standard [1], mainly ACK_TIMEOUT and ACK_RANDOM_FACTOR, is crucial to achieve lower end-to-end delays and higher packet delivery ratio. [less ▲] Detailed reference viewed: 339 (20 UL)![]() Di Maio, Antonio ![]() ![]() ![]() in ROADNET: Fairness- and Throughput-Enhanced Scheduling for Content Dissemination in VANETs (2018, May 23) The increasing demand for bandwidth by applications in Vehicular Ad-Hoc Networks (VANETs), combined with the increasing number of their users, stresses the importance of data dissemination schemes that ... [more ▼] The increasing demand for bandwidth by applications in Vehicular Ad-Hoc Networks (VANETs), combined with the increasing number of their users, stresses the importance of data dissemination schemes that strike a balance between network throughput and user fairness. Ensuring this balance is challenging in vehicular networks, which are characterized by a high dynamism of the network topology, volatility of intervehicular links, and heterogeneity of the exchanged content. For these reasons, we hereby introduce ROADNET, a cooperative content dissemination scheme for VANETs. Leveraging on the Software Defined Networking (SDN) paradigm, ROADNET provides a trade-off between network throughput and user fairness by exploiting the logical centralized control of SDN and the multichannel operation of the IEEE 1609.4 standard. Realistic simulation results show that our scheme outperforms prior works in terms of both throughput (≈ 36%) and fairness (≈ 6%), providing high channel load balance (σ ≈ 1%). [less ▲] Detailed reference viewed: 193 (22 UL)![]() Soua, Ridha ![]() ![]() ![]() in 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems (2018) Detailed reference viewed: 255 (16 UL)![]() Adamsky, Florian ![]() in International Journal of Critical Infrastructure Protection (2018) Detailed reference viewed: 252 (5 UL) |
||