Results 101-120 of 195.
Bookmark and Share    
Full Text
Peer Reviewed
See detailNetwork troubleshooting with SDN-RADAR (demo paper)
Avanesov, Tigran; Gheorghe, Gabriela UL; Palattella, Maria Rita UL et al

in Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015, May)

Detailed reference viewed: 160 (7 UL)
Full Text
Peer Reviewed
See detailDetection of Population Mobility Anomalies in Senegal from Base Station Profiles
Melakessou, Foued UL; Derrmann, Thierry UL; Frank, Raphaël UL et al

Scientific Conference (2015, April 08)

The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order ... [more ▼]

The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order to extract realistic human mobility models adapted to the Senegal use case. In this paper, we describe our analysis of the available D4D datasets. The first contribution is the modeling of the daily traffic demand profile of each antenna, by considering voice and short message services. The evaluation of mobility models will help to better design and develop future infrastructures in order to better support the actual demand. A classification has been performed into urban, suburban and rural modes. An algorithm has been developed to detect traffic anomalies in 2013, based on the daily profiles. The second contribution corresponds to the generation of inter-antennas and inter-arrondissements mobility graphs for each month of 2013. [less ▲]

Detailed reference viewed: 152 (5 UL)
Peer Reviewed
See detailA Cell Dwell Time Model for Synthetic Population Generation from Call Detail Records
Derrmann, Thierry UL; Frank, Raphaël UL; Melakessou, Foued UL et al

Scientific Conference (2015, April 08)

In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and ... [more ▼]

In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and individual parameters obtained via the analysis of the Data For Development (D4D) Call Detail Records (CDR). We rely on the shortest path road network to interconnect two distant cell sites. The resulting dwell time model can be used to compute accurate user trajectories even with partial information. This work represents a first step towards the generation of a synthetic population that can be used to perform a wide range of simulative studies to evaluate and optimize transportation networks. [less ▲]

Detailed reference viewed: 234 (33 UL)
Full Text
Peer Reviewed
See detailEnabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers
Mouton, Maximilien; Castignani, German; Frank, Raphaël UL et al

in Vehicular Communications (2015), 2(2), 59-69

Detailed reference viewed: 140 (2 UL)
Full Text
Peer Reviewed
See detailSDN-RADAR: Network troubleshooting combining user experience and SDN capabilities
Gheorghe, Gabriela UL; Avanesov, Tigran; Palattella, Maria Rita UL et al

in Proc. of IEEE Conf. on Network Softwarization (NetSoft) (2015, April)

Detailed reference viewed: 234 (11 UL)
Full Text
Peer Reviewed
See detailDriver Behavior Profiling Using Smartphones: A Low-Cost Platform for Driver Monitoring
Castignani, German UL; Derrmann, Thierry UL; Frank, Raphaël UL et al

in IEEE Intelligent Transportation Systems Magazine (2015), 7(1), 91-102

Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In ... [more ▼]

Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In particular, over the last few years there has been an increasing interest in monitoring vehicles and driving data, aiming to identify risky driving maneuvers and to improve driver efficiency. Such a driver profiling system can be useful in fleet management, insurance premium adjustment, fuel consumption optimization or CO2 emission reduction. In this paper, we analyze how smartphone sensors can be used to identify driving maneuvers and propose SenseFleet, a driver profile platform that is able to detect risky driving events independently from the mobile device and vehicle. A fuzzy system is used to compute a score for the different drivers using real-time context information like route topology or weather conditions. To validate our platform, we present an evaluation study considering multiple drivers along a predefined path. The results show that our platform is able to accurately detect risky driving events and provide a representative score for each individual driver. [less ▲]

Detailed reference viewed: 588 (50 UL)
Full Text
Peer Reviewed
See detailTowards Reinventing Online Privacy
Gheorghe, Gabriela UL; Engel, Thomas UL

in Berendt, Bettina; Engel, Thomas; Ikonomou, Demosthenes (Eds.) et al LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy (2015)

Detailed reference viewed: 200 (3 UL)
Full Text
Peer Reviewed
See detail6TiSCH Centralized Scheduling: when SDN Meet IoT
Thubert, Pascal; Palattella, Maria Rita UL; Engel, Thomas UL

in Proc. of IEEE Conf. on Standards for Communications & Networking (CSCN’15) (2015)

Detailed reference viewed: 276 (5 UL)
Full Text
Peer Reviewed
See detailHacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points
Lanze, Fabian UL; Panchenko, Andriy UL; Ponce-Alcaide, Ignacio et al

in Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015) (2015)

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are ... [more ▼]

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are exposed to a severe security threat: since 802.11 identifiers (SSID, BSSID) can be easily faked, an attacker can setup an evil twin, i.e., an access point (AP) that users are unable to distinguish from a legitimate one. Once a user connects to the evil twin, he inadvertently creates a playground for various attacks such as collection of sensitive data (e.g., credit card information, passwords) or man-in-the-middle attacks even on encrypted traffic. It is particularly alarming that this security flaw has led to the development of several tools that are freely available, easy to use and allow mounting the attack from commodity client devices such as laptops, smartphones or tablets without attracting attention. In this paper we provide a detailed overview of tools that have been developed (or can be misused) to set up evil twin APs. We inspect them thoroughly in order to identify characteristics that allow them to be distinguished from legitimate hardware-based access points. Our analysis has discovered three methods for detecting software-based APs. These exploit accuracy flaws due to emulation of hardware behavior or peculiarities of the client Wi-Fi hardware they operate on. Our evaluation with 60 hardware APs and a variety of tools on different platforms reveals enormous potential for reliable detection. Furthermore, our methods can be performed on typical client hardware within a short period of time without even connecting to a potentially untrustworthy access point. [less ▲]

Detailed reference viewed: 294 (4 UL)
Full Text
Peer Reviewed
See detailOn-the-Fly Bandwidth Reservation for 6TiSCH Wireless Industrial Networks
Palattella, Maria Rita UL; Watteyne, Thomas; Wang, Qin et al

in IEEE Sensors Journal (2015)

Detailed reference viewed: 193 (12 UL)
Full Text
Peer Reviewed
See detailPhishStorm: Detecting Phishing With Streaming Analytics
Marchal, Samuel UL; François, Jérôme UL; State, Radu UL et al

in IEEE Transactions on Network and Service Management (2014), 11(December), 458-471

Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due ... [more ▼]

Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URL detection techniques more appropriate. In this paper, we introduce PhishStorm, an automated phishing detection system that can analyze in real time any URL in order to identify potential phishing sites. PhishStorm can interface with any email server or HTTP proxy. We argue that phishing URLs usually have few relationships between the part of the URL that must be registered (low-level domain) and the remaining part of the URL (upper-level domain, path, query). We show in this paper that experimental evidence supports this observation and can be used to detect phishing sites. For this purpose, we define the new concept of intra-URL relatedness and evaluate it using features extracted from words that compose a URL based on query data from Google and Yahoo search engines. These features are then used in machine-learning-based classification to detect phishing URLs from a real dataset. Our technique is assessed on 96 018 phishing and legitimate URLs that result in a correct classification rate of 94.91% with only 1.44% false positives. An extension for a URL phishingness rating system exhibiting high confidence rate ( $>$ 99%) is proposed. We discuss in this paper efficient implementation patterns that allow real-time analytics using Big Data architectures such as STORM and advanced data structures based on the Bloom filter. [less ▲]

Detailed reference viewed: 629 (5 UL)
Full Text
Peer Reviewed
See detailBluetooth Low Energy for Inter-Vehicular Communications
Bronzi, Walter UL; Frank, Raphaël UL; Castignani, German UL et al

in 2014 IEEE Vehicular Networking Conference (VNC) (2014, December)

Bluetooth Low Energy (BLE) is quickly and steadily gaining importance for a wide range of applications. In this paper we investigate the potential of BLE in a vehicular context. By means of experiments ... [more ▼]

Bluetooth Low Energy (BLE) is quickly and steadily gaining importance for a wide range of applications. In this paper we investigate the potential of BLE in a vehicular context. By means of experiments, we first evaluate the characteristics of the wireless channel, then we define a set of driving scenarios to analyze how BLE is affected by varying speed, distance and traffic conditions. We that found the maximum communication range between two devices can go beyond 100 meters and that a robust connection can be achieved up to a distance of 50 meters even for varying traffic and driving conditions. Next, we present a proof-of-concept mobile application for off-the-shelf smartphones that can be used to transmit data over multiple hops. Finally we discuss the advantages and limitations of BLE for Inter-Vehicular Communications (IVC) and propose potential applications. [less ▲]

Detailed reference viewed: 209 (11 UL)
Full Text
Peer Reviewed
See detailAn Event-Driven Inter-Vehicle Communication Protocol to Attenuate Vehicular Shock Waves
Forster, Markus UL; Frank, Raphaël UL; Engel, Thomas UL

in International Conference on Connected Vehicles and Expo (2014, November)

In this paper we investigate an event-driven Inter-Vehicle Communication protocol to mitigate shock waves in dense traffic situation. From previous work we know that flooding or frequent beaconing require ... [more ▼]

In this paper we investigate an event-driven Inter-Vehicle Communication protocol to mitigate shock waves in dense traffic situation. From previous work we know that flooding or frequent beaconing require excessive network resources. To overcome this limitation we focus on an efficient message exchange mechanism requiring as few network resources as possible, while still providing timely and accurate traffic information. We designed Density Redistribution through Intelligent Velocity Estimation (DRIVE), an event-driven Inter-Vehicle Communication protocol that learns about traffic conditions ahead and recommends optimal velocities in order to prevent the formation of vehicular shock waves. We demonstrate that our approach of reacting in case of traffic fluctuations leads to significant improvements in overall traffic flow. Furthermore we show that even a low number of equipped vehicles is sufficient to achieve this target. [less ▲]

Detailed reference viewed: 190 (3 UL)
Full Text
Peer Reviewed
See detailPhishScore: Hacking Phishers' Minds
Marchal, Samuel UL; François, Jérôme UL; State, Radu UL et al

in Proceedings of the 10th International Conference on Network and Service Management (2014, November)

Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due ... [more ▼]

Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URLs detection techniques more appropriate. In this paper we introduce PhishScore, an automated real-time phishing detection system. We observed that phishing URLs usually have few relationships between the part of the URL that must be registered (upper level domain) and the remaining part of the URL (low level domain, path, query). Hence, we define this concept as intra-URL relatedness and evaluate it using features extracted from words that compose a URL based on query data from Google and Yahoo search engines. These features are then used in machine learning based classification to detect phishing URLs from a real dataset. [less ▲]

Detailed reference viewed: 298 (10 UL)
Full Text
See detailScilab Modelling and Simulation of Communication Networks: Car Traffic Analysis in Luxembourg
Melakessou, Foued UL; Engel, Thomas UL

in Abstract book of 30th International CAE Conference, CAE'14 (2014)

Network Analysis and Routing eVALuation, referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre ... [more ▼]

Network Analysis and Routing eVALuation, referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre for Security, Reliability and Trust (SnT). The Centre carries out interdisciplinary research and graduate education in secure, reliable, and trustworthy ICT systems and services. This Scilab External Module is focusing on the analysis of network protocols and algorithms. Each network of communicating devices such as computers, phones or sensors, needs to follows specific rules in order to organize and control the data exchange between source and destination nodes. Communication protocols enable to discover the network topology, and to propagate the data traffic between network entities. The main goal of our toolbox is to provide a complete software environment enabling the understanding of available communication algorithms, but also the design of new schemes in order to evaluate and improve the traffic behavior and distribution on network topologies defined by the user. NARVAL permits to generate random topologies according to various algorithms such as Locality, Waxman, Barabasi-Albert and hierarchical models. The user can also design his own topology by providing nodes' coordinates, visualization parameters, and also links' information that are necessary for path calculation. The combination of these functions enables to build a large range of topologies with distinct routing properties. The NARVAL module permits to study the impact of routing algorithms on the effectiveness of transmission protocols used by data communications on a defined network topology. We provide a set of basic functions in order to create network graphs, compute routing algorithms (AODV, BFS, DFS, Bellman-Ford, Dijkstra, Flood, Floyd-Warshall, Multiple Paths, RPL, ARC, etc.) on them and finally make statistical analysis on the efficiency of data communications. The mobility of nodes (Mobile/Vehicular Ad hoc NETwork MANET/ VANET) is also supported according to models such as Random Direction, Random Walk, Random Way Point, etc. The target audience of this external module includes academics, students, engineers and scientists. We put some efforts to build detailed help files. The description of each function has been carefully done in order to facilitate the end users' comprehension. It is often accompanied with explicit diagrams. Our simulations and results obtained with NARVAL have been published in several IEEE international conferences and journals. This research contribution was partially supported by the following European FP7 projects: U2010 (http://www.u2010.eu), EFIPSANS (http://www.efipsans.org), IoT6 (http://www.iot6.eu) and BUTLER (http://www.iot-butler.eu). [less ▲]

Detailed reference viewed: 428 (4 UL)
Full Text
Peer Reviewed
See detailMagnetic Interaction with Devices: A Pilot Study on Mobile Gaming
Afshari, Saeed UL; Popleteev, Andrei UL; McCall, Roderick UL et al

in Proceedings of NordiCHI '14, October 26 - 30 2014, Helsinki, Finland (2014, October 26)

This work-in-progress paper presents a study of interaction techniques for mobile devices, with a focus on gaming scenarios. We introduce and explore usability and performance aspects of a novel compass ... [more ▼]

This work-in-progress paper presents a study of interaction techniques for mobile devices, with a focus on gaming scenarios. We introduce and explore usability and performance aspects of a novel compass based control for tangible around-device interaction, and compare it with traditional mobile gaming controls, such as touchscreen thumbstick, swiping and tilt-based approaches. [less ▲]

Detailed reference viewed: 407 (27 UL)
Full Text
Peer Reviewed
See detailTraffic Routing in Urban Environments: the Impact of Partial Information
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of 17th Internatonal IEEE Conference on Intelligent Transportation Systems (2014, October)

There are many studies concerning the problem of traffic congestion in cities. One of the best accepted solutions to relieving congestion involves optimization of resources already available, by means of ... [more ▼]

There are many studies concerning the problem of traffic congestion in cities. One of the best accepted solutions to relieving congestion involves optimization of resources already available, by means of balancing traffic flows to minimize travel delays. To achieve this optimization, it is necessary to collect and process Floating Car Data (FCD) from vehicles. In this paper we evaluate the repercussions of partial information on the overall traffic view, and consequently on the outcome of the optimization. Our study focuses on the role of the user participation rate and the availability of Road Side Units to collect the FCD. By means of simulation we quantify the impact of partially-available information on the computation of route optimization, and how it impedes traffic flows. Our results show that even minor uncertainties can significantly impact routing strategies and lead to deterioration in the overall traffic situation. [less ▲]

Detailed reference viewed: 182 (14 UL)
Full Text
Peer Reviewed
See detailIncentives and gaming environments for changing commuter behaviour
Kracheel, Martin UL; McCall, Roderick UL; Koenig, Vincent UL et al

Scientific Conference (2014, September 30)

The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will ... [more ▼]

The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will reduce traffic, emissions and, in the end, save money. The alternatives, for example, such as taking different modes of transport, are incentivised through gamification. In order to develop this pervasive system, we analysed existing mobility patterns of commuters in Luxembourg. The methodology that we developed consists of a questionnaire, a smartphone application and focus group interviews. This paper presents the findings of the questionnaire and how they influence the design of the gamified pervasive application. [less ▲]

Detailed reference viewed: 236 (15 UL)
Full Text
Peer Reviewed
See detailTowards a New Way of Reliable Routing: Multiple Paths over ARCs
Melakessou, Foued UL; Palattella, Maria Rita UL; Engel, Thomas UL

in Towards a New Way of Reliable Routing: Multiple Paths over ARCs (2014, September 24)

The Available Routing Construct (ARC), recently proposed at IETF, provides a promising model for achieving highly reliable routing in large-scale networks. Among its features, ARC offers multi-path ... [more ▼]

The Available Routing Construct (ARC), recently proposed at IETF, provides a promising model for achieving highly reliable routing in large-scale networks. Among its features, ARC offers multi-path routing by design. In the present work, we introduced ARC for the first time to the research community. Then, we showed, by means of simulation results, how ARC over-performs classical multi-path routing algorithms, by building disjoint multiple paths without extra-cost due to new route computation. [less ▲]

Detailed reference viewed: 171 (0 UL)
Full Text
Peer Reviewed
See detailUndesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11
Lanze, Fabian UL; Panchenko, Andriy UL; Ponce-Alcaide, Ignacio et al

in Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (2014, September)

Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their ... [more ▼]

Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their traffic is referred to in the literature as the evil twin attack. It allows an attacker with little effort and expenditure to fake a genuine AP and intercept, collect, or alter (potentially even encrypted) data. Due to its severity, the topic has gained remarkable research interest in the past decade. In this paper, we introduce a differentiated attacker model to express the attack in all its facets. We propose a taxonomy for classifying and struc- turing countermeasures and apply it to existing approaches. We are the first to conduct a comprehensive survey in this domain to reveal the potential and the limits of state-of- the-art solutions. Our study discloses an important attack scenario which has not been addressed so far, i.e., the usage of specialized software to mount the attack. We propose and experimentally validate a novel method to detect evil twin APs operated by software within a few seconds. [less ▲]

Detailed reference viewed: 278 (7 UL)