DCNET 2010 Abstracts


Full Papers
Paper Nr: 2
Title:

SECURITY ANALYSIS OF TCP/IP NETWORKS - An Approach to Automatic Analysis of Network Security Properties

Authors:

Miroslav Sveda, Ondrej Rysavy, Petr Matousek, Jaroslav Rab and Rudolf Cejka

Abstract: This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.

Paper Nr: 9
Title:

ENHANCED HANDOVER MECHANISM FOR MULTICAST AND BROADCAST SERVICES IN IEEE 802.16E SYSTEMS

Authors:

Min-Gon Kim, Yazan M. Allawi, Jung-Sook Jang, Jin-Kyu Kang, SangCheol Lee and Minho Kang

Abstract: The handover delay time spent in the service connections running at a Mobile Station (MS) in IEEE 802.16e systems can have a negative impact on real-time applications; especially, a connection for Multicast and Broadcast Service (MBS) could suffer additional handover delays due to multicast session update (the process of updating its associated MBS zone), where its MS moves out of its associated MBS zone. Taking this issue into account, this paper proposes an Enhanced Handover Mechanism (EHM) that can create the reduction of both the required time to scan neighbor Base Stations (BSs) and the number of the MBS session update by firstly selecting a neighbor BS guaranteeing a satisfactory level of Received Signal Strength (RSS) value in the current associated MBS zone as the target BS as many as possible. Simulation results show that the EHM can create the reduction of the handover delay time of both multicast and unicast connections while maintaining a satisfactory RSS value of an MS. As a consequence, enhancement of mobility support for real-time MBS can be achieved while keeping compatibility to IEEE 802.16e systems.

Paper Nr: 16
Title:

SUPPORTING MULTIMEDIA APPLICATIONS IN HOME NETWORKS USING SIP AND SLP

Authors:

Min-Xiou Chen, Bing-Yang Lin and Wen-Yen Weng

Abstract: With increased communication bandwidth the demand for home network multimedia services is increasing. A ubiquitous environment has been proposed to greatly facilitate human daily life. Service Location Protocol (SLP) provides a dynamic way to search for the location of available services and service information in the environment. Session Initiation Protocol (SIP) is an application layer signaling protocol. SIP is used to create, modify and terminate multimedia sessions. We improved SIP to support streaming service, and discover the streaming service using SLP. A prototype implementation is built to show the implementation results of our prototype.

Paper Nr: 24
Title:

A NOVEL SECURE AND MULTIPATH ROUTING ALGORITHM IN WIRELESS SENSOR NETWORKS

Authors:

Bayrem Triki, Slim Rekhis and Noureddine Boudriga

Abstract: Multipath routing inWireless Sensors Networks (WSNs) is used in order to tolerate node failures and improve the reliability of data routing. To make a multipath routing algorithm adaptive to the sensitivity of the used application, communicating nodes in the network should be able to specify to which extent the established paths are disjoint. In this paper, we propose a novel routing algorithm for Wireless Sensor Networks (WSN) entitled Secure Multipath Routing Algorithm (SeMuRa). We extend the concept of k-connectivity to k-xconnectivity where x is the value of threshold representing the maximal number of nodes shared between any two paths in the set of the k established paths. The proposed algorithm: a) is based on on-demand routing; b) uses labels in the datagrams exchanged during the route discovery to carry the threshold x; and c) is secure thanks to the use of threshold signature. A simulation is conducted to prove the efficiency of the algorithm and estimate the additional overhead.d.

Paper Nr: 25
Title:

PERFORMANCE EVALUATION OF THE TLS HANDSHAKE IN THE CONTEXT OF EMBEDDED DEVICES

Authors:

Manuel Koschuch, Matthias Hudler and Michael Krüger

Abstract: With the strong advent of mobile and embedded devices communicating in a wireless way using the air interface, the need for secure connections, efficient en- and decryption and strong authentication becomes more and more pronounced. The Transport Layer Security (TLS) protocol provides a convenient and well researched way to establish a secure authenticated connection between 2 communicating parties. By utilizing Elliptic Curve Cryptography (ECC) instead of the more common RSA algorithms, asymmetric cryptography is feasible even for tiny integrated devices. However, when dealing with heavily resource constrained appliances, it does not suffice to speed up just the cryptography related computations, but to also keep the communication necessary to establish a secure connection to a minimum, in order not to drain the scarce energy resources of the small devices. In this work we give a thorough investigation of the communication overhead the TLS handshake requires when used in conjunction with elliptic curve cryptography, together with experimental results using our own library handcrafted to support ECC on embedded systems. The results give implementers a useful guide for weighing security versus performance and also justifies the need for new authentication methods, requiring less communication overhead.

Paper Nr: 30
Title:

ADAPTIVE FILE TRANSFER MIDDLEWARE FOR MOBILE APPLICATIONS

Authors:

Mario A. Gomez-Rodriguez, Victor Sosa-Sosa and Ivan Lopez-Arevalo

Abstract: Current mobile devices such as mobile phones and PDAs are able to run applications that can demand a considerable storage space. When these devices run out of local memory, they require backing up their files in an external storage device, which could restrict the user mobility. This paper presents an Adaptive File Transfer Middleware (AFTM) for mobile applications. This middleware eases the transfer of files between a mobile device and an external storage server by accessing the best wireless connection (WiFi, GPRS/UMTS) available, considering quality and cost of the service. AFTM is also able to use the Multimedia Messaging Service (MMS) as another option for transferring files. A File Backup Service (FBS) was built on top of the AFTM. The FBS will detect when the device ran out of local memory and will automatically send selected files from the mobile device to an external storage server, freeing the mobile storage memory. To decide which files should be backed up, FBS implements several file replacement policies. Results showed that the selection of one replacement policy will be a trade-off between the efficiency of the algorithm and the cost of the wireless service available when a file needs to be backed up.

Short Papers
Paper Nr: 7
Title:

NETWORK IN A BOX

Authors:

François Gagnon, Babak Esfandiari and Tomas Dej

Abstract: VNEC (Virtual Network Experiment Controller) is an open source tool for specifying and executing network experiments in a virtual environment. The user first describes the network topology, and then provides the tasks that should be performed by the hosts, together with their execution order. Next, VNEC initializes the environment by configuring and powering on the corresponding virtual machines to match the desired network topology. Finally, commands are dispatched to the proper virtual machines in the specified order. VNEC can hence be used for many types of network experiments. This paper presents the architecture of VNEC and discusses its implementation.

Paper Nr: 18
Title:

NEMO - A Network Monitoring Framework for High-performance Computing

Authors:

Elio Pérez Calle

Abstract: The volume of data generated by the Large Hadron Collider (LHC), several PetaBytes (PB) per year, requires a distributed tier-organised structure of computing resources for mass storage and analysis. The complexity and diversity of the components of this structure (hardware, software and networks) require a control mechanism to guarantee high-throughput high-reliability computing services. NEMO is a monitoring framework that has been developed in one of the computing clusters that receive data from LHC and has been designed to measure and publish the state of a cluster resources, maximize performance and efficiency and guarantee the integrity of the cluster.

Paper Nr: 21
Title:

DENOISING NETWORK TOMOGRAPHY ESTIMATIONS

Authors:

Muhammad H. Raza, Bill Robertson, William J. Phillips and Jacek Ilow

Abstract: In this paper, we apply the technique of sparse shrinkage coding (SCS) to denoise the network tomography model with errors. SCS is used in the field of image recognition for denoising of the image data and we are the first one to apply this technique for estimating error free link delays from erroneous link delay data. To make SCS properly adoptable in network tomography, we have made some changes in the SCS technique such as the use of Non Negative Matrix Factorization (NNMF)instead of ICA for the purpose of estimating sparsifying transformation. Our technique does not need the knowledge of the routing matrix which is assumed known in conventional tomography. The estimated error free link delays are compared with the original error free link delays based on the data obtained from a laboratory test bed. The simulation results reveal that denoising of the tomography data has been carried out successfully by applying SCS.

Paper Nr: 22
Title:

PERFORMANCE EVALUATION OF TCP ALGORITHMS ON HYBRID WIRED/WIRELESS LAN TEST-BED

Authors:

Apostolos Kotsiolis, Christos Antonopoulos and Stavros Koubias

Abstract: This paper aims to provide comparative performance evaluation of various available TCP algorithms over a hybrid local area network comprising by, both wired and wireless sections. Although TCP originally was designed aiming to control internet traffic, LAN networks increasingly depend on new TCP protocol versions to provide congestion control, fairness and optimum resource utilization. Additionally wireless LANs’ popularity increase exponentially. Based on the aforementioned observations, the objective of this paper is two-fold. Firstly, to present an adequate test-bed enabling, through a significant number of experiments, an accurate performance evaluation of five different TCP versions available by a typical Linux distribution. Secondly based on the conclusions extracted, propose efficient, yet low complexity modifications, able to improve network performance of the considered scenarios.

Paper Nr: 23
Title:

MULTIMETRIC NETWORK TOMOGRAPHY

Authors:

Muhammad H. Raza, Bill Robertson, William J. Phillips and Jacek Ilow

Abstract: We introduce a novel concept of multiple metric network tomography in this paper. The conventional network tomography observes a single parameter directly and infers another parameter indirectly from the the directly measured parameter. We consider observing two parameters (packet loss rate (PLR) and path delays) directly and use both of these parameters to infer a single parameter indirectly. We applied a variation of NTF1 model of non negative tensor factorization (NTF) for this purpose and estimated link delay. Simulation results should show a better correlation between the estimated and measured link delays when duplex of metrics is used as compared to using only the path level link delays for estimating the link delays on a test bed.

Paper Nr: 27
Title:

SECURE WEARABLE AND IMPLANTABLE BODY SENSOR NETWORKS IN HAZARDOUS ENVIRONMENTS

Authors:

Mohamed Hamdi, Noureddine Boudriga, Habtamu Abje and Mieso Denko

Abstract: The aim of Wearable and implantable monitoring devices is to collect relevant data from the application-related environment, and transmit this information to the outside world. Modern microelectronics create ever increasing opportunities, but it is still true that sensors form the weakest elements in the entire chain of data collection and processing. The difficulty of deploying smart body sensor networks is exacerbated by the hostile environments in which they are typically installed. In this paper, we propose a novel architecture for wearable and implantable body sensor systems that guarantees both real-time responsiveness and security. We rely on the wavelet packet transform to develop an intelligent session management scheme where a customizable frame structure allows multiplexing the set of sessions between the elementary sensors and the analysis center. We introduce a lightweight identity-based encryption protocol suitable for body smart sensor systems. We also present performance results using simulation experiments.

Paper Nr: 28
Title:

A NOVEL MODULAR BLACK-BOX ARCHITECTURE FOR SECURE VEHICULAR NETWORKS

Authors:

M'hamed Chammem, Mohamed Hamdi and Noureddine Boudriga

Abstract: The emerging technology of vehicular communication systems (VCSs) raises a number of technical challenges that need to be addressed. Particularly, security ranks at the top of these challenges. In fact, the plethora of services that can be provided using VCSs introduces new communication scenarios that require special security services. This paper tackles the problems related to the storage of the evidences related to onboard security architectures. A special emphasis is made on the management of the events related to the features and history of the vehicle. In this context, a new black-box architecture is proposed. It consists in two basic modules: a main black-box and an auxiliary black-box. We show that this separation allows a better classification of the data records supported by the block-box. The interaction of the black-box with the other components of the VCS is also discussed. Due to the sensitivity of the event records, the input data flows pass necessarily through a security module which performs some key functions including event timestamping and security policy management. A specific public key infrastructure is also proposed to support our secure VCS architecture.

Paper Nr: 29
Title:

MOBILITY AND SECURITY MODELS FOR WIRELESS SENSOR NETWORKS USING VORONOI TESSELLATIONS

Authors:

Manel Abdelkader, Mohamed Hamdi and Noureddine Boudriga

Abstract: Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.

Paper Nr: 34
Title:

STATISTICAL TRAFFIC MULTIPLEXING WITH SERVICE GUARANTEES OVER OPTICAL CORE NETWORKS

Authors:

A. Drakos, T. Orphanoudakis, C. (T) Politi and A. Stavdas

Abstract: Statistical multiplexing at the optical layer has been considered a critical requirement in order to build the next generation of ultra-high capacity optical transport networks in a cost-efficient manner. However, even today, the state of the art of commercially available optical core networks is based on mature wavelength switching and routing technologies, which lack a transport and control plane architecture that can support statistical traffic multiplexing with guaranteed Quality of Service (QoS) across a wide range of QoS parameters even if they can support fast reconfiguration at msec time scales. For several years, most research efforts have focused on the concepts of Optical Burst Switching (OBS) and Optical Packet Switching (OPS), which are based on the hybrid use of electronic nodes and optical switches to exploit Time Division Multiplexing (TDM) in order to achieve statistical multiplexing and dynamic resource reservation over optical networks. While burst switching has been experimentally proven as a technically feasible technique, its performance suffers especially under strict requirements for QoS guarantees. In this paper we evaluate the performance gains that can be achieved exploiting statistical multiplexing over a large scale core optical network and we demonstrate the efficiency of the CANON architecture (Clustered Architecture for Nodes in an Optical Network) as a viable alternative to OBS, which can achieve both targets for statistical multiplexing gains and QoS guarantees at the same time.

Paper Nr: 38
Title:

BASE STATION APPLICATION OPTIMIZER

Authors:

Ronit Nossenson

Abstract: Expectation and requirements for future wireless communication systems continue to grow and evolve. Long-Term Evolution (LTE) is a recent effort taken by cellular providers and equipment vendors to step into wireless broadband market. The key enhancements target an introduction of new all-IP architecture, enhanced link layer and radio access. In LTE, one of the recurring problems is the bottlenecked backhaul links, connecting the cell sites with the core network. The basic idea behind the Base Station Application Optimizer is to replace the traditional base station with a smart entity, capable of analyzing and optimizing the user data in the application level. In particular, such unit can prevent unnecessary data from travelling though the bottlenecked backhaul network. The benefits of such entity are reduced latency, jitter and network deployment costs.

Paper Nr: 40
Title:

APPLICABILITY OF MULTIPARTY COMPUTATION SCHEMES FORWIRELESS SENSOR NETWORKS - Position Paper

Authors:

Manuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory and Jürgen Wenzl

Abstract: Wireless Sensor Networks pose special requirements to the deployed security algorithms, due to their unique properties: a single sensor node has great restrictions in terms of computing power, available memory and available energy. It is nevertheless desirable for the messages exchanged over the air interface to be secure against eavesdropping and forging. Since a single sensor node can be captured and removed very easily and almost undetectable, cryptographic schemes that do not rely on a single master secret present in every node, like those based on, for example, multiparty computations, seem to be a promising alternative in this setting. We are currently investigating the applicability of a modified implementation of the Gennaro-Rabin-Rabin multiparty multiplication protocol for sensor networks, with a special focus on the number of messages that have to be exchanged and the additional load put on every node by this protocol. This paper gives a short overview of our work and lists some preliminary results.

Posters
Paper Nr: 37
Title:

STUDYING MEDIA ACCESS AND CONTROL PROTOCOLS

Authors:

Alaelddin Fuad Yousif Mohammed

Abstract: The goal of this project is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The project fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) resources and the knowledge of undergraduate students. The project is targeted at (1) instructors of undergraduates who might use this work to develop their own lesson plans and course material and (2) students of physical and link layer protocols who want a practical tool for carrying out experiments in these layers.