WINSYS 2020 Abstracts


Area 1 - Ciber-Physical Systems

Full Papers
Paper Nr: 6
Title:

Autonomous Sensor Node Powered over WiFi: A Use Case Study

Authors:

Florian Grante, Ghalid Abib, Muriel Muller and Nel Samama

Abstract: This paper presents a new approach to the sizing of a radio frequency energy harvesting system. Starting from a sensor node to define our system constraints such as its energy requirement or its supply voltage, an energy budget analysis protocol is developed to validate whether it is possible to power such a system with a Radio Frequency to Direct Current (RF/DC) converter. We study a converter capable of harvesting RF signals in the Industrial, Scientific and Medical (ISM) band at 2.45 GHz whose ambient power has been previously characterized. Finally, the duty cycle is determined, i.e., how long would it take the converter to recover the required energy in order to power the sensor node.
Download

Paper Nr: 11
Title:

Efficient and Secure Cipher Scheme for Limited IoT Devices

Authors:

Hassan N. Noura, Ola Salman and Ali Chehab

Abstract: In this paper, an effective and robust cipher scheme is proposed to cater for the resource-constrained nature of IoT devices. The proposed cipher scheme is a combination of static and dynamic cryptographic structures, towards ensuring better resistance and resilience against existing security attacks. More precisely, the proposed solution is designed to be a lightweight cipher scheme, iterating a round function just twice, along with a dynamic key-dependent block permutation. The proposed round function satisfies the required confusion and diffusion properties, and consequently, it guarantees the desired cryptographic aspects such as message and key avalanche effects. Finally, the security and performance tests confirm the effectiveness and the robustness of the proposed cipher solution in terms of security level, the associated delay and required resources.
Download

Short Papers
Paper Nr: 12
Title:

Efficient and Secure Statistical DDoS Detection Scheme

Authors:

Hussein Majed, Hassan N. Noura, Ola Salman, Mohammad Malli and Ali Chehab

Abstract: One of the hardest challenges in cybersecurity is the detection and prevention of Distributed Denial of Service (DDoS) attacks. In this paper, a lightweight statistical approach for DDoS detection is presented, in addition to preventive and corrective countermeasures. The proposed solution is designed to be applied at the Internet Service Provider (ISP) level. Based on aggregated NetFlow statistics, the proposed solution relies on the Z-score and co-variance measures to detect DDoS traffic as a deviation from normal traffic. The implementation results show a high detection rate (up to 100%) for 30 seconds time slot.
Download

Area 2 - Wireless and Mobile Technologies

Full Papers
Paper Nr: 9
Title:

An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems

Authors:

Reem Melki, Hassan Noura and Ali Chehab

Abstract: Future mobile systems support heterogeneous devices with diverse requirements and hence require flexible and efficient allocation of available time-frequency resources. A promising multi-carrier modulation scheme considered for 5G systems is the filter bank multi-carrier (FBMC) scheme. FBMC offers better spectral characteristics compared to conventional orthogonal frequency division multiplexing (OFDM) by combining individual or groups of sub-carriers and applying a shaping filter to achieve better spectral containment. While current research on FBMC has mainly focused on reducing the signal processing complexity associated with FBMC as well as coping with the issue of the increased symbol period, analysis of the security aspects of FBMC systems remains largely unattempted. In this paper, we take the first step in this direction and propose a new cipher scheme to guard against adversaries, while preserving the promised performance of FBMC. The proposed cipher scheme is based on dynamic permutation of time-domain symbols, and a dynamic key approach that generates session keys by exploiting the randomness of the underlying physical communication channel. The randomness of the channel-dependent dynamic key ensures robustness of the cipher solution. The cipher scheme is shown to be highly efficient since it requires only one iteration with one simple operation. Experimental simulations demonstrate that the proposed scheme strikes a good balance between performance and security.
Download

Short Papers
Paper Nr: 13
Title:

Multiple Service Class TDMA Protocol for Healthcare Applications

Authors:

Sophia Athanasiadou, Georgios Papadimitriou and Petros Nicopolitidis

Abstract: A novel medium access control (MAC) protocol designed for healthcare environments is proposed. The protocol is aimed to support different Classes of Service (CoS) with diverse needs, each including different kinds of medical applications. The highest priority class includes Tactile Internet applications, that require an end-to-end latency of less than 1 msec, while the rest of the classes are assigned graded priorities.The proposed protocol provides the highest priority class with the required bandwidth and guaranteed low delay while the other classes, which also include critical applications, do not starve. Two protocol versions are introduced with the second version exhibiting very good performance in terms of average delay and throughput.
Download