The 42nd IEEE Conference on Local Computer Networks (LCN), October 9-12, 2017, Singapore

Demonstrations


Accepted Demos


Blockchain Signaling System (BloSS): Enabling a Cooperative and Multi-domain DDoS Defense
Authors: Bruno Rodrigues, Thomas Bocek, Burkhard Stiller
Abstract: Distributed Denial-of-Service (DDoS) defense systems are not capable of withstanding by themselves against large-scale attacks. Thus, coordinated protection efforts have become an attractive alternative to extend the defense capabilities of a single system. However, existing DDoS signaling protocols are a bottleneck to make a coordinated and distributed defense fully operational. Blockchain technology offers an out-of-the-box solution that not only reduces the complexity of signaling DDoS attack information but could also provide means of establishing financial incentives for cooperation at a reduced operational cost. This work presents the Blockchain Signaling System (BloSS), a novel approach deployed hardware for signaling DDoS attacks in a cooperative network defense system.

Demo: Indoor Location for Smart Environments
Authors: Zhongliang Zhao, Stéphane Kündig, Jose Carrera, Blaise Carron, Torsten Ingo Braun, Jose Rolim.
Abstract: The rapid growth of ubiquitous applications and location-based services has made indoor localization and navigation an interesting topic. Some indoor localization solutions exploit radio information and Inertial Measurement Units (IMUs), which are embedded in most of the modern smartphones. In this demo, we will present Smart Syndesi, a system for creating indoor location-aware smart building environments using wireless sensor and actuator networks (WSANs). Smart Syndesi includes an indoor tracking system, a WSAN for indoor environmental monitoring and activation automation, and a gateway interconnecting WSAN, tracking system with mobile users. The indoor positioning system tracks the real-time location of occupants with high accuracy, which works as a basis for indoor location-based sensor actuation automation.

Creating a Distributed Malware Analysis Toolchain with MASS
Authors: Fabian Rump and Timm Behner
Abstract: In this demonstration, we present the Malware Analysis and Storage System (MASS), a novel framework for malware analysis. MASS is designed as a distributed and scalable system and aims to empower cooperation between malware researchers. We will show the central aspects of the framework and explain the malware analysis process flow. An attendee can see how to submit and query malware samples from the MASS server and further how to use its REST API and the MASS Python client to incorporate analysis methods into the MASS infrastructure.

Demonstration of "IDN-Toolbox": A Software to Visualize and Analyze IDN (ILDA Digital Network) Streams
Authors: Matthias Frank
Abstract: This demo proposal presents continued work of the Laser & Light Lab at the Institute of Computer Science 4 of the University of Bonn based on earlier demo presentations and on standardization work of the International Laser Display Association (ILDA). The ILDA Digital Network (IDN) Stream Specification [7] has been published in 2015 as the first of a "family" of ILDA technical standards dealing with digital transmission of laser projection/picture data over local networks. The demo presents our "IDN-Toolbox", a software that is able to receive IDN streams with laser projection data and visualize the laser stream/frame data on a computer monitor. Two modes are possible: In the live mode, the software visualizes the incoming IDN stream's laser data in real time. In addition, the incoming stream can be recorded in memory for offline analysis to be done after and independently of the original show playback. The LCN demo presents all modes of the IDN-Toolbox where the IDN stream data is coming from both IDN-capable laser show software and non-IDN-capable laser software using an analogue ILDA to IDN converter.

Decentralized Resource Allocation in Mobile Networks
Authors: Patrick Lieser, Nils Richerzhagen, Tim Feuerbach, The An Binh Nguyen, Björn Richerzhagen, Doreen Böhnstedt, and Ralf Steinmetz
Abstract: Mobile devices are powerful tools for maintaining communication following disasters that affect critical infrastructure. In those post-disaster conditions, ubiquitous mobile devices can be used to establish basic ad-hoc communication in order to aid first responders or to organize volunteers. However, the energy of mobile devices is limited, and therefore the runtime of such networks is often insufficient to support the communication demand following a disaster. In this demonstration, we showcase the concept of the decentralized resource allocation in postdisaster mobile ad-hoc networks. Considering energy resources (e.g. car batteries, solar panels etc.) to prolong functioning of basic post disaster communication services, several cooperative resource allocation strategies are proposed as detailed in our accompanying conference paper. Attendees can observe the behavior of mobile nodes competing for resources in an interactive simulation-based demonstration. By selecting allocation strategies and influencing the placement of resources and mobility of nodes, attendees can observe the effect of the different allocation strategies. In the demonstration the status of the mobile nodes and their actions to allocate resources are shown through live plots of relevant metrics.

Demo: Coexistence of Low Delay and Loss-based Congestion Controls in SDN-based Networks
Authors: Mario Hock, Michael König, Roland Bless, Martina Zitterbart
Abstract: Congestion controls that focus on achieving a low queuing delay, such as the novel TCP LoLa, can significantly improve the quality-of-experience for delay-sensitive applications. The gradual deployment of such congestion controls, however, is challenging because their data flows get suppressed by flows that use a legacy loss-based congestion control (e.g. CUBIC TCP). This demo shows the advantages of TCP LoLa for interactive applications at the example of a network-enabled version of the well-known PONG game. In addition to that, the demo shows how SDN technology can be used to facilitate the coexistence between low delay and loss-based congestion controls.

Prototyping and Evaluating SDN-based Multicast Architectures for Live Video Streaming
Authors: Ahmed Khalid, Ahmed H. Zahran, Cormac J. Sreenan
Abstract: Software Defined Networking (SDN) is an emerging approach for network programmability, with the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. The rise of SDN presents an opportunity to overcome the limitations of rigid and static traditional Internet architecture and provide services like inter-domain network layer multicast for live video streaming. In this demonstration we present a platform to evaluate and compare SDN-based multicast architectures for live streaming and benchmark their performance against standard IP unicast. The platform is equipped with two graphical user interfaces (GUI). A Panoramic UI provides a mechanism to modify various evaluation parameters and monitor the effect on output in form of graphs and live statistics. An Animator UI displays traffic flows over the chosen network topology and offers packet level information for the ongoing video streams. We also present a prototype of mCast implemented on our platform. mCast is a novel SDN-based multicast architecture for live video streaming over the Internet. The feedback from our platform and its GUIs showcases how mCast can save network and system resources while improving the video quality for clients.

A Demo of Viscous: An End-to-end Transport Protocol for Ubiquitous Communication
Authors: Abhijit Mondal, Sandip Chakraborty
Abstract: The existing transport protocols designed for the TCP/IP protocol stack lack three major requirements for ubiquitous communication -- support for short-lived parallel flows, mobility and multi-homing. In this demo, we discuss the fundamental design goals and architecture for a new end-to-end communication protocol, called Viscous, that supports the above three requirements. We use a small scale prototype testbed to demonstrate the working principles, implementation details and performance parameters of Viscous for supporting end-to-end communication over Internet of Things (IoT). The complete protocol details for Viscous has been accepted for publication at IEEE LCN 2017.

Adaptive Wireless Sensor Network and Cloud-based Approaches for Emergency Navigation
Authors: Najla Abdulrahman Al-Nabhan, Nadia Al-Aboody and Hamed Rawishidy
Abstract: Emergencies can happen at anytime and anywhere. Governments around the world try to ensure public and private organizations' preparedness for all types of potential emergencies. They usually rely on implementing autonomous systems to deal with unpredictable emergency scenarios. This research proposes and simulates an adaptive emergency evacuation approach based on wireless sensor networks (WSNs) and cloud computing. The proposed approach maximizes the safety of the obtained paths by adapting to the characteristics of the hazard, evacuees' behavior, and environmental conditions. It also extends the WSN-based approach by employing an on-demand cloudification algorithm that improves the evacuation accuracy and efficiency for critical cases. It mainly handles an important evacuation issue when people are blocked in a safe, dead-end area of a building. The demo shows how evacuation is performed in both WSN-based and cloud-integrated approach. Simulation results show an improved safety and evacuation efficiency by an average of 98% over the existing time-based and single-metric emergency evacuation approaches.

LITE: Light-based Intrusion deTection systEm Using an Optical-Camera and a Single Board Computer
Authors: Tarun Choubisa, Sampad Mohanty, Mohan Kashyap, Kodur Krishna Chaitanya, Sridhar A, P Vijay Kumar.
Abstract: This demonstration shows the working of an optical-camera- based system designed to distinguish between human and animal intrusion while rejecting clutter arising from wind-blown vegetation in an outdoor environment. The aim of the research was to use optical-camera system as a complementary sensing modality to a PIR sensor-based intrusion detection system. There are three important features to demonstrate: (a) the optical-camera based intrusion classification system using a Single Board Computer (SBC), (b) the algorithm which exploits the spatial resolution capability to help in classification, and (c) real-time demo of the visualization of features calculated and classification decisions.


Demo Board

Demonstration chair: Adel Ben Mnaouer, Canadian University of Dubai, UAE

  • Kemal Akkaya, Florida International University, USA
  • Karl Andersson, Luleå University of Technology, Sweden
  • Stefan Aust, NEC Communication Systems Ltd., Japan
  • Ons Bouachir, Canadian University Dubai, UAE
  • Amine Dhraief, University of Manouba, Tunisia
  • Simone Ferlin, IBM Security, Norway
  • Matthias Hollick Technische Universität Darmstadt, Germany
  • Nicolas Kuhn, CNES, France
  • Emmanuel Lochin, University of Toulouse - ISAE, France
  • Aref Meddeb, University of Sousse, Tunisia
  • Olivier Mehani, Learnosity, Australia
  • Emad Mohamed, Canadian University Dubai, UAE
  • Katrin Reitsma, Motorola Solutions, USA
  • Tim Strayer, BBN Technologies, USA
  • Manabu Tsukada, the University of Tokyo, Japan
  • Anis Yazidi, Oslo and Akershus University College, Norway