scispace - formally typeset
Search or ask a question

Showing papers on "Communications protocol published in 2018"


Journal ArticleDOI
TL;DR: This work discusses the benefits of IoV along with recent industry standards developed to promote its implementation, and presents recently proposed communication protocols to enable the seamless integration and operation of the IoV.
Abstract: Today, vehicles are increasingly being connected to the Internet of Things which enable them to provide ubiquitous access to information to drivers and passengers while on the move. However, as the number of connected vehicles keeps increasing, new requirements (such as seamless, secure, robust, scalable information exchange among vehicles, humans, and roadside infrastructures) of vehicular networks are emerging. In this context, the original concept of vehicular ad-hoc networks is being transformed into a new concept called the Internet of Vehicles (IoV). We discuss the benefits of IoV along with recent industry standards developed to promote its implementation. We further present recently proposed communication protocols to enable the seamless integration and operation of the IoV. Finally, we present future research directions of IoV that require further consideration from the vehicular research community.

471 citations


Journal ArticleDOI
TL;DR: This survey presents the state-of-the-art wireless network design and optimization for WNCS, while highlighting the tradeoff between the achievable performance and complexity of various approaches.
Abstract: Wireless networked control systems (WNCSs) are composed of spatially distributed sensors, actuators, and controllers communicating through wireless networks instead of conventional point-to-point wired connections. Due to their main benefits in the reduction of deployment and maintenance costs, large flexibility and possible enhancement of safety, WNCS are becoming a fundamental infrastructure technology for critical control systems in automotive electrical systems, avionics control systems, building management systems, and industrial automation systems. The main challenge in WNCS is to jointly design the communication and control systems considering their tight interaction to improve the control performance and the network lifetime. In this survey, we make an exhaustive review of the literature on wireless network design and optimization for WNCS. First, we discuss what we call the critical interactive variables including sampling period, message delay, message dropout, and network energy consumption. The mutual effects of these communication and control variables motivate their joint tuning. We discuss the analysis and design of control systems taking into account the effect of the interactive variables on the control system performance. Moreover, we discuss the effect of controllable wireless network parameters at all layers of the communication protocols on the probability distribution of these interactive variables. We also review the current wireless network standardization for WNCS and their corresponding methodology for adapting the network parameters. Finally, we present the state-of-the-art wireless network design and optimization for WNCS, while highlighting the tradeoff between the achievable performance and complexity of various approaches. We conclude the survey by highlighting major research issues and identifying future research directions.

339 citations


Journal ArticleDOI
TL;DR: The proposed system demonstrated that it is possible to deploy a cost-effective and reliable real-time data collection, processing, and analysis from the shop floor and demonstrates that such collected data can be used in an adaptive decision making system, which includes a multi-criteria decision-making algorithm and a condition-based maintenance strategy aiming to improve factory performances when compared to traditional approaches.

205 citations


Journal ArticleDOI
TL;DR: This survey focuses on how the fifth generation of mobile networks will allow haptic applications to take life, in combination with the haptic data communication protocols, bilateral teleoperation control schemes and hapticData processing needed.
Abstract: Touch is currently seen as the modality that will complement audition and vision as a third media stream over the Internet in a variety of future haptic applications which will allow full immersion and that will, in many ways, impact society. Nevertheless, the high requirements of these applications demand networks which allow ultra-reliable and low-latency communication for the challenging task of applying the required quality of service for maintaining the user’s quality of experience at optimum levels. In this survey, we enlist, discuss, and evaluate methodologies and technologies of the necessary infrastructure for haptic communication. Furthermore, we focus on how the fifth generation of mobile networks will allow haptic applications to take life, in combination with the haptic data communication protocols, bilateral teleoperation control schemes and haptic data processing needed. Finally, we state the lessons learned throughout the surveyed research material along with the future challenges and infer our conclusions.

179 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a comparative analysis of the main characteristics of IoT communication protocols, including request-reply and publish-subscribe protocols, and review the main performance issues, including latency, energy consumption and network throughput.
Abstract: The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This paper surveys on the application layer communication protocols to fulfil the IoT communication requirements, and their potential for implementation in fog- and cloud-based IoT systems. To this end, the paper first presents a comparative analysis of the main characteristics of IoT communication protocols, including request-reply and publish-subscribe protocols. After that, the paper surveys the protocols that are widely adopted and implemented in each segment of the system (IoT, fog, cloud), and thus opens up the discussion on their interoperability and wider system integration. Finally, the paper reviews the main performance issues, including latency, energy consumption and network throughput. The survey is expected to be useful to system architects and protocol designers when choosing the communication protocols in an integrated IoT-to-fog-to-cloud system architecture.

168 citations


Journal ArticleDOI
TL;DR: The proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP) have the potential to provide an intelligent and highly autonomous communication solution for FANETs.
Abstract: The flying ad hoc network (FANET) is a new paradigm of wireless communication that governs the autonomous movement of UAVs and supports UAV-to-UAV communication. A FANET can provide an effective real-time communication solution for the multiple UAV systems considering each flying UAV as a router. However, existing mobile ad hoc protocols cannot meet the needs of FANETs due to high-speed mobility and frequent topology change. In addition, the complicated flight environment and varied flight tasks lead to the traditional built-in-rules protocols no longer meeting the demands of autonomy. Hence, we have proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP). The performance results show that the proposed PPMAC overcomes the directional deafness problem with directional antennas, and RLSRP provides an automatically evolving and more effective routing scheme. Our proposed hybrid adaptive communication protocols have the potential to provide an intelligent and highly autonomous communication solution for FANETs, and indicate the main research orientation of FANET protocols.

166 citations


Journal ArticleDOI
TL;DR: A potential architecture of STIN is introduced that integrates the extended space network, the Internet, and mobile wireless networks to provide comprehensive services and global anytime anywhere network access.
Abstract: With the technological advancement and convergence of satellite communications, the Internet, and mobile wireless networking, the STIN has been envisioned. In this article, we introduce a potential architecture of STIN that integrates the extended space network, the Internet, and mobile wireless networks to provide comprehensive services and global anytime anywhere network access. The extended space network, being the most complex component of STIN, consists of the space-backbone of several GEO satellites, the terrestrial backbone of data centers and ground access nodes, and the space access network comprised of various satellites at different orbits and other space objects. We present a number of key technical challenges associated with STIN, including physical-layer transmission technologies, network protocols, routing, resource management, security, and test-bed development.

153 citations


Journal ArticleDOI
TL;DR: In this article, the authors explore existing networking communication technologies for the Internet of Things (IoT), with emphasis on encapsulation and routing protocols, and the relation between the IoT network protocols and the emerging IoT applications is also examined.
Abstract: Internet of Things (IoT) constitutes the next step in the field of technology, bringing enormous changes in industry, medicine, environmental care, and urban development. Various challenges are to be met in forming this vision, such as technology interoperability issues, security and data confidentiality requirements, and, last but not least, the development of energy efficient management systems. In this paper, we explore existing networking communication technologies for the IoT, with emphasis on encapsulation and routing protocols. The relation between the IoT network protocols and the emerging IoT applications is also examined. A thorough layer-based protocol taxonomy is provided, while how the network protocols fit and operate for addressing the recent IoT requirements and applications is also illustrated. What is the most special feature of this paper, compared to other survey and tutorial works, is the thorough presentation of the inner schemes and mechanisms of the network protocols subject to IPv6. Compatibility, interoperability, and configuration issues of the existing and the emerging protocols and schemes are discussed based on the recent advanced of IPv6. Moreover, open networking challenges such as security, scalability, mobility, and energy management are presented in relation to their corresponding features. Lastly, the trends of the networking mechanisms in the IoT domain are discussed in detail, highlighting future challenges.

127 citations


Proceedings ArticleDOI
02 Jul 2018
TL;DR: A Machine Learning architecture for Predictive Maintenance, based on Random Forest approach was tested on a real industry example, and preliminary results show a proper behavior of the approach on predicting different machine states with high accuracy.
Abstract: Condition monitoring together with predictive maintenance of electric motors and other equipment used by the industry avoids severe economic losses resulting from unexpected motor failures and greatly improves the system reliability. This paper describes a Machine Learning architecture for Predictive Maintenance, based on Random Forest approach. The system was tested on a real industry example, by developing the data collection and data system analysis, applying the Machine Learning approach and comparing it to the simulation tool analysis. Data has been collected by various sensors, machine PLCs and communication protocols and made available to Data Analysis Tool on the Azure Cloud architecture. Preliminary results show a proper behavior of the approach on predicting different machine states with high accuracy.

118 citations


Journal ArticleDOI
TL;DR: In this article, a review of the most suitable communication network topologies, technologies and protocols for smart microgrids is presented, and a guideline for the transition from the current communication systems to the future generation of microgrid communications is provided.
Abstract: The concept of microgrid has emerged as a feasible answer to cope with the increasing number of distributed renewable energy sources which are being introduced into the electrical grid. The microgrid communication network should guarantee a complete and bidirectional connectivity among the microgrid resources, a high reliability and a feasible interoperability. This is in a contrast to the current electrical grid structure which is characterized by the lack of connectivity, being a centralized-unidirectional system. In this paper a review of the microgrids information and communication technologies (ICT) is shown. In addition, a guideline for the transition from the current communication systems to the future generation of microgrid communications is provided. This paper contains a systematic review of the most suitable communication network topologies, technologies and protocols for smart microgrids. It is concluded that a new generation of peer-to-peer communication systems is required towards a dynamic smart microgrid. Potential future research about communications of the next microgrid generation is also identified.

94 citations


Journal ArticleDOI
TL;DR: In this article, a survey of the state-of-the-art software-defined radio (SDR) platforms in the context of wireless communication protocols is presented, with a focus on programmability, flexibility, portability, and energy efficiency.

Journal ArticleDOI
01 Nov 2018-Sensors
TL;DR: This work combines the capabilities of short-range wake-up radios to achieve ultra-low power states and asynchronous communication together with the long-range connectivity of LoRa, and achieves a packet delivery ratio of 100% by eliminating the possibility of packet collisions.
Abstract: Energy efficiency is crucial in the design of battery-powered end devices, such as smart sensors for the Internet of Things applications. Wireless communication between these distributed smart devices consumes significant energy, and even more when data need to reach several kilometers in distance. Low-power and long-range communication technologies such as LoRaWAN are becoming popular in IoT applications. However, LoRaWAN has drawbacks in terms of (i) data latency; (ii) limited control over the end devices by the gateway; and (iii) high rate of packet collisions in a dense network. To overcome these drawbacks, we present an energy-efficient network architecture and a high-efficiency on-demand time-division multiple access (TDMA) communication protocol for IoT improving both the energy efficiency and the latency of standard LoRa networks. We combine the capabilities of short-range wake-up radios to achieve ultra-low power states and asynchronous communication together with the long-range connectivity of LoRa. The proposed approach still works with the standard LoRa protocol, but improves performance with an on-demand TDMA. Thanks to the proposed network and protocol, we achieve a packet delivery ratio of 100% by eliminating the possibility of packet collisions. The network also achieves a round-trip latency on the order of milliseconds with sensing devices dissipating less than 46 mJ when active and 1.83 μ W during periods of inactivity and can last up to three years on a 1200-mAh lithium polymer battery.

Journal ArticleDOI
TL;DR: This work focuses on the issue of the conflict between privacy protection and efficiency and proposes a new approach for providing higher-level security transmission using multi-channel communications.

Journal ArticleDOI
TL;DR: This work focuses on some relevant types of malicious threats that affect the platoon safety, i.e. application layer attacks (Spoofing and Message Falsification) and network layer attacks, and proposes a novel collaborative control strategy for enhancing the protection level of autonomous platoons.

Journal ArticleDOI
TL;DR: The current state of the art of IoT protocols, IPAs in general, and IPAs based on IoTs is surveyed, considering many different factors, such as the heterogeneity of objects and the diversity of communication protocols and enabling technologies.
Abstract: The Internet has emerged as a key network to make information accessible quickly and easily, revolutionizing how people communicate and interact with the world. The information available on the Internet about a given subject may be extensive, allowing the development of new solutions to solve people's day-to-day problems. One such solution is the proposal of intelligent personal assistants (IPAs), which are software agents that can assist people in many of their daily activities. IPAs are capable of accessing information from databases to guide people through different tasks, deploying a learning mechanism to acquire new information on user performance. IPAs can improve the assistance they offer to users by collecting information autonomously from objects that are available in the surrounding environment. To make this idea feasible, IPAs could be integrated into ubiquitous computing environments in an Internet of Things (IoT) context. Therefore, it is necessary to integrate wireless sensor networks with the Internet properly, considering many different factors, such as the heterogeneity of objects and the diversity of communication protocols and enabling technologies. This approach fulfills the IoT vision. This paper surveys the current state of the art of IoT protocols, IPAs in general, and IPAs based on IoTs.

Journal ArticleDOI
TL;DR: Simulation results suggest that the proposed protocol works better concerning the network throughput, end-to-end delay, packet delivery ratio and the remaining energy level of the nodes.

Journal ArticleDOI
TL;DR: This article presents a brief planar overview of a smart city system architecture by introducing the application, sensing, communication, data, and security/privacy planes and provides insights for open issues and opportunities in these planes.

Proceedings ArticleDOI
07 Aug 2018
TL;DR: This paper proposes an approach for applying graph-based deep learning on distributed routing protocols via a novel neural network architecture named Graph-Query Neural Network and shows that specific properties of network protocols, such as resilience to packet loss, can be explicitly included in the learned protocol.
Abstract: Automated network control and management has been a long standing target of network protocols. We address in this paper the question of automated protocol design, where distributed networked nodes have to cooperate to achieve a common goal without a priori knowledge on which information to exchange or the network topology. While reinforcement learning has often been proposed for this task, we propose here to apply recent methods from semi-supervised deep neural networks which are focused on graphs. Our main contribution is an approach for applying graph-based deep learning on distributed routing protocols via a novel neural network architecture named Graph-Query Neural Network. We apply our approach to the tasks of shortest path and max-min routing. We evaluate the learned protocols in cold-start and also in case of topology changes. Numerical results show that our approach is able to automatically develop efficient routing protocols for those two use-cases with accuracies larger than 95%. We also show that specific properties of network protocols, such as resilience to packet loss, can be explicitly included in the learned protocol.

Journal ArticleDOI
TL;DR: A WSN-based system capable of detecting and identifying events of interest and localization of miners and roof falls and a novel energy-efficient hybrid communication protocol using both periodic and aperiodic modes of communication while adhering to low latency requirement for emergency situations is proposed and implemented.
Abstract: Every year, mining industry sees huge losses in terms of human lives and valuable infrastructure due to accidents and disasters. Besides other measures, effective monitoring and control can greatly reduce the risks of such incidents. Wireless sensor networks (WSNs) are increasingly being used for such applications. This paper proposes a WSN-based system, which is capable of detecting and identifying events of interest (with 90% success rate) and localization of miners (2–4 m) and roof falls (10–12 m). A comprehensive integrated system covering a range of aspects from radio frequency propagation, communication protocol with latency, and energy–efficiency tradeoff and autonomous event detection is presented. The results show a lower path loss for 433 MHz operating frequency compared to 868 MHz. Moreover, a novel energy-efficient hybrid communication protocol using both periodic and aperiodic modes of communication while adhering to low latency requirement for emergency situations is proposed and implemented. Finally, for intelligent processing of gathered data, a spatio-temporal and attribute-correlated event detection mechanism suitable for the highly unreliable mine environment is described.

Journal ArticleDOI
TL;DR: By combining energy efficient micro-controllers, low-power radio transceivers, and sensors as well as actuators in so called smart objects, the digital cyber world with the physical world as in cyber physical systems is connected.

Proceedings ArticleDOI
24 May 2018
TL;DR: In this article, the performance evaluation and sustainability analysis of LoRa technology is presented, where the main contribution of this paper is a performance evaluation of the LoRaWAN communication protocol.
Abstract: The LoRaWAN communication protocol is more and more used in the Internet of Things (IoT) concept. Many research centers have addressed the problem of wireless sensor networks, thus making a sustained effort in increasing the performance of WSN networks. The IoT concept promises to revolutionize and change the way we do our daily business and allow us to overcome current challenges such as the energy crisis, resource depletion and environmental pollution. The potential of the IoT concept is immense and comes to solve the major challenges of the M2M (Machine-to-Machine) industry. LPWA (Low-Power Wide-Area) wireless networks come to complete the traditional wireless and short-range wireless communications technologies in order to fulfill the various requirements of IoT applications. LoRa modulation is using a chirp (Compressed High Intensity Radar Pulse) spread spectrum (CSS) technique which offer resilience to interference, great communication link budget, performance at low power while being resistant to multi-path propagation fading and Doppler effect. The main contribution of this paper is the performance evaluation and sustainability analysis of LoRa technology.

Proceedings ArticleDOI
01 Aug 2018
TL;DR: This paper presents CAN protocol and analyzes its security vulnerabilities, then surveys the implemented attacks and proposed solutions in the literature.
Abstract: The vehicles are equipped with electronic control units that control their functions. These units communicate with each other via in-vehicle communication protocols like CAN bus. Although CAN is the most common in-vehicle communication protocol, its lack of encryption and authentication can cause serious security shortcomings. In the literature, many attacks are reported related to CAN bus and the number increases with rising connectivity in the cars. In this paper, we present CAN protocol and analyze its security vulnerabilities. Then we survey the implemented attacks and proposed solutions in the literature.

Journal ArticleDOI
TL;DR: A high secure but low-power consumption communication scheme for the LoRaWAN, named the Secure Low Power Communication (SeLPC), is proposed to further reduce end-devices’ data encryption power by reducing encryption cycles of AES.
Abstract: Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something, aiming to improve our living environments. LoRaWAN, as a Long-Range Wide Area Network specification recommended by the LoRa Alliance, is a low power and long distance communication protocol suitable for IoT environments. This protocol adopts a widely used data encryption method, i.e., Advanced Encryption Standard (AES), developed based on powerful algebra operations and multiple encryption cycles to ensure its communication security. LoRaWAN reduces communication power by setting different transmission latencies for different end-devices; however, AES does not take into account its end device’s encryption power. In this paper, a high secure but low-power consumption communication scheme for the LoRaWAN, named the Secure Low Power Communication (SeLPC) method, is proposed to further reduce end-devices’ data encryption power by reducing encryption cycles of AES. In the SeLPC, encryption key and D-Box update procedure is presented to enhance security level and simplify the AES encryption process so that the power consumption can be further lowered. Comparing with the traditional AES, the analysis results show that the SeLPC can minimize the encryption power up to 26.2%. The SeLPC can also resist three attacks, including known-key, replay, and eavesdropping attacks and is practically helpful for use in LoRaWAN IoT environments.

Journal ArticleDOI
TL;DR: A potential H-STIN architecture based on the development trends of the Internet of Things, mobile networks, and satellite networks is proposed, and the promising technical challenge, including integrated route planning and large-scale resource allocation, is given.
Abstract: The number of IoT devices has been growing significantly, and mobile network traffic is also increasing explosively. In order to meet the human desire to explore unknown areas, edgeless communications have always been one of the directions for the development of wireless networks. H-STIN is a promising solution to face the problem of large bandwidth requirement, massive machine type communication, and edgeless communication requirements. However, it is difficult to integrate communication protocols, routing problems, and resource allocation in the large-scale and heterogeneous network architecture. Therefore, this article proposes a potential H-STIN architecture based on the development trends of the Internet of Things, mobile networks, and satellite networks. Since TN has adequate computation resource and routing architecture, the backbone network is given to support an entire network, and AS is adopted to achieve regional self-optimization. The SSTIS is composed of the perception layer, the cognition layer, and the intelligence layer. It integrates IoT, SDN, and network functions virtualization technologies to achieve self-monitoring, crisis forecasting, and optimal control. Finally, the promising technical challenge, including integrated route planning and large-scale resource allocation, is given.

Journal ArticleDOI
TL;DR: This paper presents machine learning techniques to cluster and classify the intrusions in VANET by KNN and SVM algorithms and presents intrusion detection technique which relies on the analysis of the offset ratio and time interval between the messages request and the response in the CAN.
Abstract: Vehicular ad hoc networks (VANETs) enable wireless communication among Vehicles and Infrastructures. Connected vehicles are promising in Intelligent Transportation Systems (ITSs) and smart cities. The main ob-jective of VANET is to improve the safety, comfort, driving efficiency and waiting time on the road. VANET is unlike other ad hoc networks due to its unique characteristics and high mobility. However, it is vulnerable to various security attacks due to the lack of centralized infrastructure. This is a serious threat to the safety of road traffic. The Controller Area Network (CAN) is a bus communication protocol which defines a standard for reliable and efficient transmission between in-vehicle parts simultaneously. The message moves through CAN bus from one node to another node, but it does not have information about the source and destination address for authentication. Thus, the attacker can easily inject any message to lead to system faults. In this paper, we present machine learning techniques to cluster and classify the intrusions in VANET by KNN and SVM algorithms. The intrusion detection technique relies on the analysis of the offset ratio and time interval between the messages request and the response in the CAN.

Journal ArticleDOI
TL;DR: This paper introduces a new frequency-dependent 3D channel model for UAV communications, and presents new techniques as cooperative communications, self-positioning, trajectory design, resource allocation, and seamless coverage for multi-UAV scenario.
Abstract: Unmanned aerial vehicle (UAV) communications play an important role in building the space-air-ground network and realizing the seamless wide-area coverage thanks to its long-range connectivity, high maneuverability, flexible deployment, and low latency. Different from the traditional ground-only communications, the control techniques tightly impact UAV communications, which could be jointly designed to enhance the performance of data transmission. In this paper, we explore the opportunities and challenges of combining the communications and control in UAV systems. For single-UAV scenario, we introduce a new frequency-dependent 3D channel model. We then show how to perform channel tracking with a flight control system as well as how to mechanically and electronically formulate the transmission beams. For multi-UAV scenario, we present new techniques as cooperative communications, self-positioning, trajectory design, resource allocation, and seamless coverage. In the end, we provide some interesting discussions over communication protocol, secrecy, 3D dynamic topology heterogeneous networks, and low-cost design for practical UAV applications.

Proceedings ArticleDOI
01 Jan 2018
TL;DR: The article describes a developed model of logistic regression which allows to estimate the probability that a device initiating a connection is running a bot, and a method to detect compromised IoT devices included into a botnet.
Abstract: The main security problems, typical for the Internet of Things (IoT), as well as the purpose of gaining unauthorized access to the IoT, are considered in this paper. Common characteristics of the most widespread botnets are provided. A method to detect compromised IoT devices included into a botnet is proposed. The method is based on a model of logistic regression. The article describes a developed model of logistic regression which allows to estimate the probability that a device initiating a connection is running a bot. A list of network protocols, used to gain unauthorized access to a device and to receive instructions from common and control (C&C) server, is provided too.

Journal ArticleDOI
TL;DR: This paper determines the maximum number of LoRa nodes that can communicate with a Gateway considering the LoRaWAN protocol specifications and proposes a series of solutions for reducing the number of collisions and increasing the capacity of the communication channel.
Abstract: The LoRaWAN communication protocol can be used for the implementation of the IoT (Internet of Things) concept. Currently, most of the information regarding the scalability of the LoRa technology is commercial and deals with the best-case scenario. Thus, we need realistic models, enabling the proper assessment of the performance level. Most of the time, the IoT concept entails a large number of nodes distributed over a wide geographical area, therefore forming a high density, large-scale architecture. It is important to determine the number of collisions so that we can assess the network performance. The present paper aims at assessing the performance level of the LoRaWAN technology by analyzing the number of packet collisions that can occur. Thus, this paper determines the maximum number of LoRa nodes that can communicate with a Gateway considering the LoRaWAN protocol specifications. Furthermore, we have proposed a series of solutions for reducing the number of collisions and increasing the capacity of the communication channel.

Proceedings ArticleDOI
16 Apr 2018
TL;DR: It is found that virtualized network in containers incurs non-negligible overhead compared to physical networks, and users need to select an appropriate container network based on the requirements and characteristics of their workloads.
Abstract: Containers, a form of lightweight virtualization, provide an alternative means to partition hardware resources among users and expedite application deployment. Compared to virtual machines (VMs), containers incur less overhead and allow a much higher consolidation ratio. Container networking, a vital component in container-based virtualization, is still not well understood. Many techniques have been developed to provide connectivity between containers on a single host or across multiple machines. However, there lacks an in-depth analysis of their respective advantages, limitations, and performance in a cloud environment. In this paper, we perform a comprehensive study of representative container networks. We first conduct a qualitative comparison of their applicable scenarios, levels of security isolation, and overhead. Then we quantitatively evaluate the throughput, latency, scalability, and startup cost of various container networks in a realistic cloud environment. We find that virtualized network in containers incurs non-negligible overhead compared to physical networks. Performance degradation varies depending on the type of network protocol and packet size. Our experiments show that there is no clear winner in performance and users need to select an appropriate container network based on the requirements and characteristics of their workloads.

Journal ArticleDOI
TL;DR: This paper analyses the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs, and proposes an attack methodology that can disable an ongoing mission of a UAV.
Abstract: Recently, unmanned aerial vehicles (UAVs), or the so-called drones, have been used in various applications In particular, UAVs are used for rescue systems, disaster detection, and military purposes, as well as for leisure and commercial purposes UAVs that are controlled over networks by ground control stations (GCS) can provide various services with expanded activity area It is thus of critical importance to investigate the vulnerability of the drone system In this paper, we focus on UAVs controlled by GCS over networks We analyze the vulnerability of the micro-air-vehicle communication (MAVLink) protocol, which is one of the most widely adopted communication protocols for GCS-based control of UAVs Then, by exploiting the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV Our empirical study confirms that the proposed attack can stop the attacked UAV and disable the mission