May 29, 2018

Identification of connected objects based on network protocol data

  • Ammar N.
  • Noirie L.
  • Sebastien Tixeuil

The increasing number of connected objects and their growing variety make it necessary to have a system to recommend IoT services for end-users, so that they can make better use of the connected objects at their disposal. In this context, we would like to propose autonomous mechanisms communicating with the recommendation system and aiming to facilitate the management of services and objects. In this article, we deal in particular with the problem of identifying connected objects in a home network. For this, we propose different approaches to solve this problem. The first type of approach is based on network protocols such as discovery protocols. The results show that thanks to the extracted information such as the model of the object, the vendor, the operating system, we manage to identify the type of the object. A second approach is based on traffic analysis using machine learning techniques that will be addressed in future work.

View Original Article

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...