Welcome to the IKCEST
Journal
IEEE/ACM Transactions on Networking

IEEE/ACM Transactions on Networking

Archives Papers: 903
IEEE Xplore
Please choose volume & issue:
Robust App Fingerprinting Over the Air
Jianfeng LiZheng LinJian QuShuohan WuHao ZhouYangyang LiuXiaobo MaTing WangXiapu LuoXiaohong Guan
Keywords:Wireless communicationCryptographyMultiplexingFeature extractionAttenuationTrainingPacket lossWirelessMobile AppActive UsersApp UseUser PrivacyPacket LossAverage F1-scoreTime ScaleTraining DatasetPositive SamplesTest DatasetDecision TreeNegative SamplesFeature RepresentationBaseline MethodsNetwork FlowTerm Frequency-inverse Document FrequencyTraffic PatternsThreat ModelTarget SegmentPacket SizePacket ArrivalPacket Loss RateAuxiliary ModelPattern DistortionRecognition StageNetwork AdministratorsData AugmentationTraining DataIncremental LearningApp fingerprintingwireless traffic analysistraffic classification
Abstracts:Mobile apps have significantly transformed various aspects of modern life, leading to growing concerns about privacy risks. Despite widespread encrypted communication, app fingerprinting (AF) attacks threaten user privacy substantially. However, existing AF attacks, when targeted at wireless traffic, face four fundamental challenges, namely 1) sample inseparability; 2) app multiplexing; 3) signal attenuation; and 4) open-world recognition. In this paper, we advance a novel AF attack, dubbed PacketPrint, to recognize app user activities over the air in an open-world setting. We introduce two novel models, i.e., sequential XGBoost and hierarchical bag-of-words model, to tackle sample inseparability and enhance robustness against noise packets arising from app multiplexing. We also propose the environment-aware model enhancement to bolster PacketPrint’s robustness in handling packet loss at the sniffer caused by signal attenuation. We conduct extensive experiments to evaluate the proposed attack in a series of challenging scenarios, including 1) open-world setting; 2) simultaneous use of different apps; 3) severe packet loss at the sniffer; and 4) cross-dataset recognition. The experimental results show that PacketPrint can accurately recognize app user activities. It achieves the average F1-score 0.947 for open-world app recognition and the average F1-score 0.959 for in-app user action recognition.
FENDI: Toward High-Fidelity Entanglement Distribution in the Quantum Internet
Huayue GuZhouyu LiRuozhou YuXiaojian WangFangtong ZhouJianqing LiuGuoliang Xue
Keywords:Quantum networksQuantum entanglementProtocolsPhotonicsRoutingQubitTopologyQuantum NetworkEntanglement DistributionHigh-fidelity EntanglementPair Of NodesPareto FrontEntangled StateQuantum MemoryQuantum ApplicationsRemote NodesBuilding BlocksPath LengthTime SlotLength ValuesQuantum InformationPure StateSpecific LengthPolynomial-time AlgorithmOptimal Trade-offRouting AlgorithmQuantum Key DistributionQuantum OperationsQuantum Error CorrectionDecomposition TheoremSize Of The Search SpaceHighest FidelityBell StatesSpontaneous Parametric Down-conversionConstraint MethodTrade-off CurveQuantification Of FactorsQuantum networkentanglement routingentanglement fidelitynetwork optimizationapproximation algorithm
Abstracts:A quantum network distributes quantum entanglements between remote nodes, and is key to many applications in secure communication, quantum sensing and distributed quantum computing. This paper explores the fundamental trade-off between the throughput and the quality of entanglement distribution in a multi-hop quantum repeater network. Compared to existing work which aims to heuristically maximize the entanglement distribution rate (EDR) and/or entanglement fidelity, our goal is to characterize the maximum achievable worst-case fidelity, while satisfying a bound on the maximum achievable expected EDR between an arbitrary pair of quantum nodes. This characterization will provide fundamental bounds on the achievable performance region of a quantum network, which can assist with the design of quantum network topology, protocols and applications. However, the task is highly non-trivial and is NP-hard as we shall prove. Our main contribution is a fully polynomial-time approximation scheme to approximate the achievable worst-case fidelity subject to a strict expected EDR bound, combining an optimal fidelity-agnostic EDR-maximizing formulation and a worst-case isotropic noise model. The EDR and fidelity guarantees can be implemented by a post-selection-and-storage protocol with quantum memories. By developing a discrete-time quantum network simulator, we conduct simulations to show the characterized performance region (the approximate Pareto frontier) of a network, and demonstrate that the designed protocol can achieve the performance region while existing protocols exhibit a substantial gap.
Towards Programmable Backscatter Radio Design for Heterogeneous Wireless Networks
Xiuzhen GuoYuan HeJiacheng ZhangYunhao LiuLongfei Shangguan
Keywords:BackscatterWireless fidelityLoRaInternet of ThingsZigbeeWireless networksReceiversHeterogeneous NetworkHeterogeneous Wireless NetworksBackscatter RadioThroughputFrequency BandInternet Of ThingsTypes Of SignalsCarrier FrequencyPrinted Circuit BoardInternet Of Things DevicesHarmonic FrequenciesNegative Differential ResistanceBackscattered SignalsDifferent Types Of SignalsWiFi SignalsPower ConsumptionFundamental FrequencyFrequency ShiftReflection CoefficientExcitation SourceTunnel DiodeIntelligent Reflecting SurfaceSmith ChartIncident SignalBias VoltageQuadrature ComponentsRF Front-endGHz Frequency BandWireless DevicesHarmonic SignalWireless communicationInternet of Things (IoT)backscatter technologyPHY layer design
Abstracts:This paper presents RF-Transformer, a unified backscatter radio hardware abstraction that allows a low-power IoT device to directly communicate with heterogeneous wireless receivers. Unlike existing backscatter systems that are tailored to a specific wireless communication protocol, RF-Transformer provides a programmable interface to the micro-controller, allowing IoT devices to synthesize different types of protocol-compliant backscatter signals in the PHY layer. By leveraging the nonlinear characteristics of the negative impedance, RF-Transformer also achieves a cross-frequency backscatter design that enables IoT devices in harmonic frequency bands to communicate with each other. We implement a PCB prototype of RF-Transformer on 2.4 GHz ISM band and conduct extensive experiments. We leverage the software defined platform USRP to transmit the carrier signal and receive the backscatter signal to verify the efficacy of our design. Our extensive field studies show that RF-Transformer achieves 23.8 Mbps, 247.1 Kbps, 986.5 Kbps, and 27.3 Kbps throughput when generating standard Wi-Fi, ZigBee, Bluetooth, and LoRa signals.
Risk-Averse Learning for Reliable mmWave Self-Backhauling
Amir Ashtari GargariAndrea OrtizMatteo PaginWanja de SombreMichele ZorziArash Asadi
Keywords:Millimeter wave communicationBase stationsReliabilityBackhaul networksWireless communicationTailOptical fiber networksRisk AversionAverage PerformanceBase StationBeamformingKey Performance IndicatorsPath SelectionTime SlotAverage MaximumPhysical LayerAverage LatencyOptimization GoalUser EquipmentScheduling AlgorithmControl ChannelMulti-armed BanditConditional Value At RiskFinite Time HorizonMobile Network OperatorsBackhaul LinksLink FailureSmall Base StationsMacro Base StationSystem LatencyBandit ProblemCloud Radio Access NetworkPacket DropWireless LinkRadio Access NetworkNetwork SizeProtocol StackMillimeter-wave communicationintegrated access and backhaul (IAB)self-backhaulingwireless backhaul
Abstracts:Wireless backhauling at millimeter-wave frequencies (mmWave) in static scenarios is a well-established practice in cellular networks. However, highly directional and adaptive beamforming in today’s mmWave systems have opened new possibilities for self-backhauling. Tapping into this potential, 3GPP has standardized Integrated Access and Backhaul (IAB) allowing the same base station to serve both access and backhaul traffic. Although much more cost-effective and flexible, resource allocation and path selection in IAB mmWave networks is a formidable task. To date, prior works have addressed this challenge through a plethora of classic optimization and learning methods, generally optimizing Key Performance Indicators (KPIs) such as throughput, latency, and fairness, and little attention has been paid to the reliability of the KPI. We propose Safehaul, a risk-averse learning-based solution for IAB mmWave networks. In addition to optimizing the average performance, Safehaul ensures reliability by minimizing the losses in the tail of the performance distribution. We develop a novel simulator and show via extensive simulations that Safehaul not only reduces the latency by up to 43.2% compared to the benchmarks, but also exhibits significantly more reliable performance, e.g., 71.4% less variance in latency.
OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates
Chuwen ZhangYong FengHaoyu SongYing WanWenquan XuBin Liu
Keywords:ThroughputSoftware algorithmsMemory managementData structuresCostsIP networksGraphics processing unitsFiltering algorithmsInstruction setsFiltering theoryFast UpdateEfficient StorageSingle ThreadMemory FootprintUpdate ProcessMultiple ThreadsSingle CPUIncremental UpdateData StructureGraphics Processing UnitLookup TableHash FunctionCodewordCompression RatioUpdate FrequencyMemory EfficiencyCluster IndexLinearizableBinary IndexRouting TableGraph IsomorphismPermutation GroupL2 CacheCache HitIP lookupbitmapparallel techniques
Abstracts:Software-based IP route lookup is a key component for packet forwarding in Software Defined Networks. Running lookup algorithms on commodity CPUs is flexible and scalable, which shows advantages on cost and power consumption over the hardware-based forwarding engines. However, dynamic network functions and services make route updates more frequent than ever. Existing algorithms often fall short of the incremental update requirements. In this paper, we propose the Overlay BitMap Algorithm (OBMA), which contains several variations, to support extraordinary update performance while maintaining the highest-in-class lookup speed and storage efficiency. Starting from the basic OBMA_B, we develop two variations with different tradeoffs for different application scenarios. OBMA_L supports faster lookups than OBMA_B at a small cost of update speed. OBMA_S achieves better storage efficiency than OBMA_B at a small cost of lookup throughput. We run our algorithms on a commodity CPU and evaluate them with real-world route tables and traces. The experiments show that OBMA achieves the lowest memory footprint, the highest update speed, and over 200 Mpps lookup throughput. Specifically, OBMA_S reduces the memory footprint to 3.98 bytes/prefix which is 25.33% smaller that of the state-of-the-art Poptrie; OBMA_L supports 252.02 Mpps lookup throughput with a single thread, and more than 600 Mpps with multiple parallel threads in a single CPU, significantly outperforming the state-of-the-art Poptrie and SAIL; OBMA_B supports updates at a rate of 14.58M updates/s which is 15 times faster than Poptrie. The tests show that the update process has little interference with the lookup process for OBMA, and achieves zero-interrupt to lookups with multiple threads.
FPCA: Parasitic Coding Authentication for UAVs by FM Signals
Shaopeng ZhuXiaolong ZhengLiang LiuHuadong Ma
Keywords:AuthenticationAutonomous aerial vehiclesEncodingFrequency modulationReliabilityReceiversSecurityBroadcastingWireless communicationVectorsParasiteUnmanned Aerial VehiclesFM SignalDecodingCommunication ChannelsExhaustive SearchChannel SignalCommunication LinksAdditional ChannelsHost SignalingReplay AttacksSecure ChannelUnmanned Aerial Vehicles CommunicationBroadcast ChannelCode VectorWaveformCodebookNormal ParametersVector Of LengthFilter ParametersMessage AuthenticationFrequency PointsPhysical Unclonable FunctionsQuantization LevelsLegitimate UsersAuthentication MethodAlignment MethodVideo CompressionUnmanned Aerial Vehicle FlightCode ParametersUAVde-authentication attackauthenticationFM signalvector coding
Abstracts:De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV) communication, in which the attacker continuously sends de-authentication frames to disconnect the UAV communication link. Existing defense methods are based on authentication by digital passwords or physical channel features. But they suffer from replay attacks or cannot adapt to the UAV mobility. In this paper, instead of enhancing the in-channel authentication, we leverage the ambient broadcasting signal to establish a low-cost additional channel for authentication. Different from methods using another dedicated secure communication channel to perform an independent authentication, we use the ambient FM radio broadcasting channel and couple the two channels by encoding parasitic bits on the host signals of the broadcasting channel, which is called parasitic coding. To further enhance the security, we propose the FM-based Parasitic Coding Authentication (FPCA) that leverages elaborate host signal processing and vector coding to ensure that the attacker cannot decode our authentication even knowing the FM receiving frequency. We implement FPCA on the embedded UAV platform. The extensive experiments show that FPCA can resist replay attacks and brute force searching, achieving reliable continuous authentication for UAVs.
Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression
Rong GuShulin WangHaipeng DaiXiaofei ChenZhaokang WangWenjie BaoJiaqi ZhengYaofeng TuYihua HuangLianyong QiXiaolong XuWanchun DouGuihai Chen
Keywords:Data communicationCostsBandwidthData modelsServerless computingData compressionWritingOptimizationConcurrent computingComputational modelingData TransmissionTransmission EfficiencyServerless ComputingMachine LearningMachine Learning TechniquesParameter SpaceTime CostDynamic ProgrammingTransmission TimeSearch EfficiencyDivide-and-conquerCompression RatioMonetary CostTransmission BandwidthSequential Quadratic ProgrammingTransmission CostCompression SpeedData Transmission TimeCylindricalTime ConstraintsCachingFunction Of The Total NumberChunk SizeCompression MethodBlack Box AlgorithmsVirtual MachinesMemory SizeMean Absolute Percentage ErrorMultiple TasksSource CodeData transmissionserverless compressioncloud function configuration
Abstracts:Nowadays, there exists a lot of cross-region data transmission demand on the cloud. It is promising to use serverless computing for data compressing to save the total data size. However, it is challenging to estimate the data transmission time and monetary cost with serverless compression. In addition, minimizing the data transmission cost is non-trivial due to the enormous parameter space. This paper focuses on this problem and makes the following contributions: 1) We propose empirical data transmission time and monetary cost models based on serverless compression. It can also predict compression information, e.g., ratio and speed using chunk sampling and machine learning techniques. 2) For single-task cloud data transmission, we propose two efficient parameter search methods based on Sequential Quadratic Programming (SQP) and Eliminate then Divide and Conquer (EDC) with proven error upper bounds. Besides, we propose a parameter fine-tuning strategy to deal with transmission bandwidth variance. 3) Furthermore, for multi-task scenarios, a parameter search method based on dynamic programming and numerical computation is proposed. We have implemented the system called Fluid-Shuttle, which includes straggler optimization, cache optimization, and the autoscaling decompression mechanism. Finally, we evaluate the performance of Fluid-Shuttle with various workloads and applications on the real-world AWS serverless computing platform. Experimental results show that the proposed approach can improve the parameter search efficiency by over $3\times $ compared with the state-of-art methods and achieves better parameter quality. In addition, our approach achieves higher time efficiency and lower monetary cost compared with competing cloud data transmission approaches.
PMap: Reinforcement Learning-Based Internet-Wide Port Scanning
Guanglei SongLin HeTao ChenJinlei LinLinna FanKun WenZhiliang WangJiahai Yang
Keywords:InternetCorrelationReinforcement learningSurveysHTTPSecurityProbesMemory managementKnowledge engineeringFansGB MemoryReal NetworksDiscovery ResearchParallel NetworkHigh ParallelismCorrelation GraphCurrent ScanNetwork SurveyScan OrderScanning ToolHigh CoverageScan RateParallelizationConditional ProbabilityNetwork PerformanceScanning SpeedHighest ProbabilityPublic SpeakingKey ObservationHash FunctionOpen ProbabilityParallel CapabilitiesTarget NetworkMultiple PortsNumber Of ProbesAddress SpaceMemory ConsumptionHigh Hit RatePremature ConvergenceTarget HostInternet-wide port scanningnetwork measurementIPv4IPv6reinforcement learning
Abstracts:Internet-wide scanning is a commonly used research technique in various network surveys, such as measuring service deployment and security vulnerabilities. However, these network surveys are limited to the given port set, not comprehensively obtaining the real network landscape, and even misleading survey conclusions. In this work, we introduce PMap, a port scanning tool that efficiently discovers the most open ports from all 65K ports in the whole network. PMap uses the correlation of ports to build an open port correlation graph of each network, using a reinforcement learning framework to update the correlation graph based on feedback results and dynamically adjust the order of port scanning. Compared to current port scanning methods, PMap performs better on hit rate, coverage, and intrusiveness. Our experiments over real networks show that PMap can find 90% open ports by only scanning 125 ports (90%@125) to each address, which is 99.3% less than the state-of-the-art port scanning methods. It reduces the number of scanned ports to decrease the intrusive nature of port scanning. In addition, PMap is highly parallel and lightweight. It scans 500 networks in parallel, achieving a port recommendation rate of up to 18 million per second, consuming only 7GB of memory. PMap is the first effective practice for scanning open ports using reinforcement learning. It bridges the gap of existing scanning tools and effectively supports subsequent service discovery and security research.
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers
Ruixiang LiXiaoyun YuanMeijuan YinXiangyang Luo
Keywords:IP networksGeologyDatabasesUrban areasReliabilityProbesMobile handsetsClustering algorithmsDelaysData miningGeolocatedInternet Service ProvidersUser CooperationMobile IPGeographical LocationMobile DevicesClustering AlgorithmMinimum ErrorTime DelayData MiningCentral AreaCellular NetworksActive UsersCenters For ServicesDistance ValuesService AreaCluster CentersMethod In This PaperMobile UsersUsers In AreaMarked AreaNetwork EntitiesConvex AreaDomain NameDetailed SchemeLandmark LocalizationWeb CameraMinimum UnitActive CenterDistrict anchormobile IP geolocationtwo-stages clusteringcellular network
Abstracts:Mobile IP geolocation aims to obtain a mobile device’s geographic location by IP. This technology is widely used in preventing financial risk, investigating cybercrime, and delivering targeted information. Currently, there are three types of IP geolocation: based on cooperation, querying in database, or network measurement. However, since restricted cooperation, low-reliability databases, and unresponsive mobile IPs, existing technologies are hard to geolocate fine-grained location of mobile IP. In this paper, we propose the concept of district anchor, and propose a non-cooperative mobile IP geolocation scheme, including three parts: acquiring district anchors by clustering, evaluating the reliability of district anchors, and geolocating mobile IPs. We also give implemented approach of this scheme. Instead of using existing clustering algorithms treating IPs and geolocations in no particular order, we propose two-stages clustering algorithm (IPG2C) to acquire district anchors, and establish reliability evaluation mechanism by IP distribution and spatial distribution of cluster. Eventually, using obtained reliable district anchors, we use “subnet geolocation” strategy to geolocate mobile IPs. The experimental results in 10 cities show that: 1) our scheme can be used to geolocate mobile IPs without cooperation; 2) the mean geolocation error is 12.47km, where precision of 56.67% of mobile IPs is street-level and minimum error is only 13m; 3) that the mean geolocation error of the anchor-based method is smaller than that of the landmark-based method; 4) compared with 13 clustering algorithms (e.g., K-Means++, Mean Shift, DBSCAN, and GMM), mean geolocation error using IPG2C’s district anchors is reduced by 26.62%~50.77%.
Scout Sketch+: Finding Both Promising and Damping Items Simultaneously in Data Streams
Guoju GaoTianyu MaHe HuangYu-E SunHaibo WangYang DuShigang Chen
Keywords:StreamsDampingTime-frequency analysisLawMarket researchReal-time systemsMemory managementSocial networking (online)Information filtersFrequency estimationData StreamsThroughputTime WindowF1 ScoreContinuous-timeDigital NetworksReal-world DatasetsLimited MemoryEnd Of WindowMultiple WindowsBandwidth AllocationBloom FilterFrequency ValuesConstant LevelPrecision RateRecent PeriodHash FunctionCurrent PeriodRecall RateEmpty CellsFrequent ItemsCurrent WindowInsertion OperatorMemory AllocationReplacement SurgeryLot Of ApplicationsSingle InstructionGrowth SpeedTime Window SizeData streamspromising itemsdamping itemssketchfilterlimited memory overload
Abstracts:Data stream processing holds great potential value in lots of practical application scenarios. This paper studies two new but important patterns for items in data streams, called promising and damping items. The promising items mean that the frequencies of an item in multiple continuous time windows show an upward trend overall, while a slight decrease in some of these windows is allowed. In contrast to promising items exhibiting an increasing trend, the definition of damping items indicates a decreasing trend. Many applications can benefit from the property of promising or damping items, e.g., monitoring latent attacks in computer networks, pre-adjusting bandwidth allocation in communication channels, detecting potential hot events/news, or finding topics that gradually lose momentum in social networks. We first introduce how to accurately find promising items in data streams in real-time under limited memory space. To this end, we propose a novel structure named Scout Sketch, which consists of Filter and Finder. Filter is devised based on the Bloom filter to eliminate the ungratified items with less memory overload; Finder records some necessary information about the potential items and detects the promising items at the end of each time window, where we propose some tailor-made detection operations. We then enhance Scout Sketch (called Scout Sketch+) to adaptively detect both types of promising and damping items simultaneously. Finally, we conducted extensive experiments on four real-world datasets, which show that the F1 Score and throughput of Scout Sketch(+) are about 2.02 and 5.61 times that of the compared solutions. All source codes are available at Github (https://github.com/Aoohhh/ScoutSketch).
Hot Journals