38 research outputs found

    The Bits of Silence : Redundant Traffic in VoIP

    Get PDF
    Human conversation is characterized by brief pauses and so-called turn-taking behavior between the speakers. In the context of VoIP, this means that there are frequent periods where the microphone captures only background noise – or even silence whenever the microphone is muted. The bits transmitted from such silence periods introduce overhead in terms of data usage, energy consumption, and network infrastructure costs. In this paper, we contribute by shedding light on these costs for VoIP applications. We systematically measure the performance of six popular mobile VoIP applications with controlled human conversation and acoustic setup. Our analysis demonstrates that significant savings can indeed be achievable - with the best performing silence suppression technique being effective on 75% of silent pauses in the conversation in a quiet place. This results in 2-5 times data savings, and 50-90% lower energy consumption compared to the next better alternative. Even then, the effectiveness of silence suppression can be sensitive to the amount of background noise, underlying speech codec, and the device being used. The codec characteristics and performance do not depend on the network type. However, silence suppression makes VoIP traffic network friendly as much as VoLTE traffic. Our results provide new insights into VoIP performance and offer a motivation for further enhancements, such as performance-aware codec selection, that can significantly benefit a wide variety of voice assisted applications, as such intelligent home assistants and other speech codec enabled IoT devices.Peer reviewe

    State-of-the-Art Multihoming Protocols and Support for Android

    Get PDF
    Il traguardo più importante per la connettività wireless del futuro sarà sfruttare appieno le potenzialità offerte da tutte le interfacce di rete dei dispositivi mobili. Per questo motivo con ogni probabilità il multihoming sarà un requisito obbligatorio per quelle applicazioni che puntano a fornire la migliore esperienza utente nel loro utilizzo. Sinteticamente è possibile definire il multihoming come quel processo complesso per cui un end-host o un end-site ha molteplici punti di aggancio alla rete. Nella pratica, tuttavia, il multihoming si è rivelato difficile da implementare e ancor di più da ottimizzare. Ad oggi infatti, il multihoming è lontano dall’essere considerato una feature standard nel network deployment nonostante anni di ricerche e di sviluppo nel settore, poiché il relativo supporto da parte dei protocolli è quasi sempre del tutto inadeguato. Naturalmente anche per Android in quanto piattaforma mobile più usata al mondo, è di fondamentale importanza supportare il multihoming per ampliare lo spettro delle funzionalità offerte ai propri utenti. Dunque alla luce di ciò, in questa tesi espongo lo stato dell’arte del supporto al multihoming in Android mettendo a confronto diversi protocolli di rete e testando la soluzione che sembra essere in assoluto la più promettente: LISP. Esaminato lo stato dell’arte dei protocolli con supporto al multihoming e l’architettura software di LISPmob per Android, l’obiettivo operativo principale di questa ricerca è duplice: a) testare il roaming seamless tra le varie interfacce di rete di un dispositivo Android, il che è appunto uno degli obiettivi del multihoming, attraverso LISPmob; e b) effettuare un ampio numero di test al fine di ottenere attraverso dati sperimentali alcuni importanti parametri relativi alle performance di LISP per capire quanto è realistica la possibilità da parte dell’utente finale di usarlo come efficace soluzione multihoming

    From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission

    Get PDF
    abstract: The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls. In this dissertation, a study of what causes the users to fall victim to telephone scams is presented, and it demonstrates that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, a novel architecture and method to authenticate the transmission of the caller ID is proposed. The solution enables the possibility of a security indicator which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information.Dissertation/ThesisDoctoral Dissertation Computer Science 201

    Applications in security and evasions in machine learning : a survey

    Get PDF
    In recent years, machine learning (ML) has become an important part to yield security and privacy in various applications. ML is used to address serious issues such as real-time attack detection, data leakage vulnerability assessments and many more. ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for learning, cost-efficiency and error-free processing. Therefore, in this paper, we review the state of the art approaches where ML is applicable more effectively to fulfill current real-world requirements in security. We examine different security applications' perspectives where ML models play an essential role and compare, with different possible dimensions, their accuracy results. By analyzing ML algorithms in security application it provides a blueprint for an interdisciplinary research area. Even with the use of current sophisticated technology and tools, attackers can evade the ML models by committing adversarial attacks. Therefore, requirements rise to assess the vulnerability in the ML models to cope up with the adversarial attacks at the time of development. Accordingly, as a supplement to this point, we also analyze the different types of adversarial attacks on the ML models. To give proper visualization of security properties, we have represented the threat model and defense strategies against adversarial attack methods. Moreover, we illustrate the adversarial attacks based on the attackers' knowledge about the model and addressed the point of the model at which possible attacks may be committed. Finally, we also investigate different types of properties of the adversarial attacks

    The systemic dimension of success (or failure?) in the use of data and AI during the COVID-19 pandemic. A cross-country comparison on contact tracing apps

    Get PDF
    During the COVID-19 pandemic, public attention turned to contact tracing apps as a possible solution to the spread of the virus. Many countries have moved in this direction, adopting contact tracing apps, while respecting personal data protection and, for EU countries, adhering to a number of fundamental principles: voluntariness, interoperability, regulatory coverage, purpose specification, minimisation, transparency, protection, security, and timeliness. In spite of timely public policy efforts, tracking apps have not been a success in many countries, and today, when their use could be of great importance, it seems appropriate to open a reflection on the success and unsuccessfulness of a public policy that has resolutely supported the use of digital technologies for public utility purposes. This working paper proposes a comparative analysis of nine OECD countries: Australia, France, Germany, Ireland, Italy, New Zealand, Russia, South Korea, Spain. It outlines the specific factors in each country's public policy that made the use of tracking apps possible, in terms of policy design with respect to: objectives, instruments, public procurement selection criteria, resources and the context in which the policy was implemented. The working paper concludes with three lessons learned from the comparative analysis: the privacy paradox, the choice of a public interest technology, and the systemic interweaving that the implementation of a public policy must take into account to enhance the effectiveness of a public interest action

    Serviços OTT TV: aspectos técnico-económicos

    Get PDF
    Mestrado em Engenharia Eletrónica e TelecomunicaçõesThe breadth of availability and variety of online video contents has helped to encourage a far more mobile experience, which has proved particularly popular among younger generations. Over The Top (OTT) services, particularly those on-demand video platforms, became more and more attractive to consumers when compared with the current main TV packages. This document describes how the video OTT Ecosystem works from a technical side. The description presented reaches both ends of the distribution chain: from how the video signals are acquired and processed, thru all the way to how they are delivered to the client, passing by the challenges and consequences that such services have on the network. The main objective of this dissertation is to understand the possibility to create in Portugal a new operator where the core business is video delivery using only OTT services.A amplitude e variedade de conteúdos disponíveis online têm ajudado a promover uma experiência cada ver mais móvel da televisão, serviço que se tem revelado particularmente popular entre os mais jovens. Serviços Over The Top (OTT), sobretudo aqueles disponíveis através de plataformas de video on-demand, têm-se tornado cada vez mais atraentes para os consumidores, em comparação com os atuais pacotes de televisão. Este documento descreve como funciona, do ponto de vista técnico, o ecossistema do vídeo sobre OTT. A descrição apresentada abrange ambas as extremidades da cadeia de distribuição: desde a forma como os sinais de vídeo são adquiridos e processados até ao modo como eles são entregues ao cliente, passando pelos problemas e consequências que tais serviços podem ter na rede. O principal objectivo deste trabalho é contribuir para compreender se é possível criar em Portugal um novo operador onde o core business seja a distribuição de vídeo utilizando apenas serviços OTT

    LEVERAGING OPENAIRINTERFACE AND SOFTWARE DEFINED RADIO TO ESTABLISH A LOW-COST 5G NON-STANDALONE ARCHITECTURE

    Get PDF
    Includes Supplementary MaterialCommercial cellular service providers are at the forefront of the paradigm shift from 4G Long Term Evolution (LTE) to 5G New Radio (NR). The increase in throughput, provisioning of ultra-low latency, and greater reliability of 5G enable potential uses that no other wireless communication could support. The Department of Defense (DOD) is interested in 5G NR technologies, but the implementation of the architecture can be lengthy and costly. This capstone configured a 4G LTE network and a 5G non-standalone network using OpenAirInterface and software defined radios (SDRs). Universal Subscriber Identity Module (USIM) cards were configured and introduced to user equipment and attached to the 4G LTE network. A gNodeB (gNB) was added to the 4G LTE network to establish the 5G non-standalone (NSA) network architecture (3GPP Option 3). The testbed developed in this research was able to connect the core to a commercial internet service provider and browse the internet using third-party applications. Our analysis educates future researchers on the challenges and lessons learned when implementing the OpenAirInterface 4G LTE and 5G NSA networks. This work also provides a better understanding of 4G LTE and 5G NSA OpenAirInterface software usability, flexibility, and scalability for potential use cases for the DOD.Chief Petty Officer, United States NavyApproved for public release. Distribution is unlimited

    Machine learning for Quality of Experience in real-time applications

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen
    corecore