scholarly journals On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks

Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 428
Author(s):  
Xiaosa Xu ◽  
Wen-Kang Jia ◽  
Yi Wu ◽  
Xufang Wang

For the law enforcement agencies, lawful interception is still one of the main means to intercept a suspect or address most illegal actions. Due to its centralized management, however, it is easy to implement in traditional networks, but the cost is high. In view of this restriction, this paper aims to exploit software-defined network (SDN) technology to contribute to the next generation of intelligent lawful interception technology, i.e., to optimize the deployment of intercept access points (IAPs) in hybrid software-defined networks where both SDN nodes and non-SDN nodes exist simultaneously. In order to deploy IAPs, this paper puts forward an improved equal-cost multi-path shortest path algorithm and accordingly proposes three SDN interception models: T interception model, ECMP-T interception model and Fermat-point interception model. Considering the location relevance of all intercepted targets and the operation and maintenance cost of operators from the global perspective, by the way, we further propose a restrictive minimum vertex cover algorithm (RMVCA) in hybrid SDN. Implementing different SDN interception algorithms based RMVCA in real-world topologies, we can reasonably deploy the best intercept access point and intercept the whole hybrid SDN with the least SDN nodes, as well as significantly optimize the deployment efficiency of IAPs and improve the intercept link coverage in hybrid SDN, contributing to the implementation of lawful interception.

INGENIO ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 15-25
Author(s):  
Mario Chavez Estrella ◽  
Robert Enríquez-Reyes ◽  
Giovanny Cadena Flores ◽  
Milton G. Mocayo Unda
Keyword(s):  

El presente artículo tiene como finalidad mostrar información completa, precisa y en tiempo real, sobre la movilidad de los usuarios en un campus, identificando tipos de usuarios y sus características, todo esto mediante una plataforma informática constituida por dos aplicaciones un API especializado en el almacenamiento de la data depurada hacia una base de datos relacional, y una aplicación web que presenta información al usuario final. Dicha plataforma se desarrolla mediante el uso de tecnologías y herramientas de código abierto. La información entregada procede de los Access Points instalados en la red de comunicaciones del campus, la cual, mediante tratamiento informático, es anonimizada, almacenada, depurada y clasificada para su posterior análisis. Como caso de estudio se ha implementado la aplicación en el contexto universitario específicamente en la Universidad Central del Ecuador.


2019 ◽  
Vol 15 (2) ◽  
pp. 188
Author(s):  
Rukiyah Rukiyah ◽  
Ana Irhandayaningsih ◽  
Lydia Christiani

Introduction. Radio Boekoe as a community that affected by the determination of information technology, adapts through the deconstruction process of information dissemination access points by utilizing hybrid media. This study aims to discuss the deconstruction process of information dissemination access points on Radio Boekoe.Research methods. This research used a qualitative method with case study approach. The process of collecting data involved observations, interviews, and documentation studies. The informants are the founder, manager and volunteer of Radio Boekoe.Data Analysis. The research data was analyzed with the stages of reduction, display, and drawing conclusions.Results and Discussion. The deconstruction process of information access points on Radio Boekoe occurred through the use of hybrid media. The deconstruction process of the information access point was expanded to the process of adding information access capacity in the form of Bale Black Box co-working space.Conclusions. The process of deconstruction of information access points on Radio Boekoe occurs through the shifting of local access points in the form of the Gelaran Iboekoe to global hybrid media-based access in the form of internet radio. Furthermore, it is recommended to conduct a research to examine the effectiveness of using hybrid media to expand information access points.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5401
Author(s):  
Mingzhi Song ◽  
Jiansheng Qian

The access points (APs) in a coal mine wireless local area network (WLAN) are generally sparsely distributed. It can, with difficulty, satisfy the basic requirements of the fingerprint positioning based on Wi-Fi. Currently, the effectiveness of positioning is ensured by deploying more APs in an underground tunnel, which significantly increases system cost. This problem can be solved by using the Virtual Access Point (VAP) method that introduces virtual access points (VAPs), which can be virtually arranged in any part of the positioning area without installing actual access points. The drawback of the VAP method is that the generated received signal strength (RSS) value of a VAP is calculated based on the mapping of RSS value from only one corresponding access point (AP). This drawback does not consider the correlation between different AP signals and the generated RSS value of a VAP, which makes the modeling of fingerprint samples and real-time RSS collection incomplete. This study proposed a Multi-Association Virtual Access Point (MA-VAP) method takes into account the influence of multi-association. The multi-association coefficient is calculated based on the correlation between the RSS values of a VAP and multiple access points (APs). Then, the RSS value generated by a VAP is calculated using the multi-association function. The real-time collected RSS values from multiple APs related to this VAP are the input of the multi-association function. The influence of the number of VAPs and their arrangement on positioning accuracy is also analyzed. The experimental positioning results show that the proposed MA-VAP method achieves better positioning performance than the VAP method for the same VAP arrangement. Combined with the Weight K-Nearest Neighbors (WKNN) algorithm and Kernel Principal Component Analysis (KPCA) algorithm, the positioning error of the MA-VAP method of the error distance cumulative distribution function (CDF) at 90% is 4.5 m (with WKNN) and 3.5 m (with KPCA) in the environment with non-line-of-sight (NLOS) interference, and the positioning accuracy is improved by 10% (with WKNN) and 22.2% (with KPCA) compared with the VAP method. The MA-VAP method not only effectively solves the fingerprint positioning problem when APs are sparse deployed, but also improves the positioning accuracy.


2017 ◽  
Vol 21 (4) ◽  
pp. 741-744 ◽  
Author(s):  
Ying Hu ◽  
Tao Luo ◽  
Norman C. Beaulieu ◽  
Chunxue Deng

Telecom IT ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 83-92
Author(s):  
A Vybornova

This article is dedicated to the overview and analysis of the existing approaches to the controller placement problem for the multi-controller Software Defined Networks (SDN) with a focus on the swarm intelligence methods. For this purpose, the controller placement problem is defined, as well as possible optimization functions and constraints. Research subject of this article is a controller placement problem for the multi-controller SDN. As a research method a comparative analysis is used. Core results of the work is a comparison of different approaches based on the different optimality criteria and constraints. Practical relevance of the work is that the results can be used in the SDN design and optimization.


2021 ◽  
Author(s):  
Pragati Shrivastava ◽  
Kotaro Kataoka

<p>The hybrid software-defined networks (SDN) architectures are beneficial for a smooth transition and less costly SDN deployment. However, legacy switches and SDN switches coexistence brings new challenges of deployment inconsistency management and security. Security is not well studied for hybrid SDN architecture. In this paper, we study the topology poisoning attacks in hybrid SDN for the first time. We propose new attack vectors for link fabrication in hybrid SDN. The new attack is named “multi-hop link fabrication”, in which an adversary successfully injects a fake multi-hop link (MHL) by exploiting the link discovery protocols. We presented the Hybrid-Shield, a link verification framework for hybrid SDN link discovery. Hybrid-Shield introduces a novel verification technique that includes: i) monitoring legacy switch and host generated traffic at MHL and ii) validating the existence of legacy switches contained in an MHL. This paper presents the prototype implementation of Hybrid-Shield over a real SDN controller. The experimental evaluation is performed with the mininet virtual network emulation. Our evaluation shows that Hybrid-Shield is capable of detecting MHL fabrication attacks in real-time with high accuracy. Hybrid-Shield’s performance evaluation shows that it is lightweight at the controller as it causes less overhead and requires no additional functionalities at the SDN controller for deployment.</p>


Sign in / Sign up

Export Citation Format

Share Document