Skip to main content

Showing 1–40 of 40 results for author: Portmann, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.14746  [pdf, other

    cs.CR cs.AI cs.CL cs.NE cs.NI

    FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems

    Authors: Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Marius Portmann

    Abstract: This paper presents the FlowTransformer framework, a novel approach for implementing transformer-based Network Intrusion Detection Systems (NIDSs). FlowTransformer leverages the strengths of transformer models in identifying the long-term behaviour and characteristics of networks, which are often overlooked by most existing NIDSs. By capturing these complex patterns in network traffic, FlowTransfo… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  2. arXiv:2212.08184  [pdf, other

    cs.LG cs.AI cs.CL cs.IR

    NBC-Softmax : Darkweb Author fingerprinting and migration tracking

    Authors: Gayan K. Kulatilleke, Shekhar S. Chandra, Marius Portmann

    Abstract: Metric learning aims to learn distances from the data, which enhances the performance of similarity-based algorithms. An author style detection task is a metric learning problem, where learning style features with small intra-class variations and larger inter-class differences is of great importance to achieve better performance. Recently, metric learning based on softmax loss has been used succes… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  3. arXiv:2212.07558  [pdf, other

    cs.CR cs.LG cs.NI

    DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection

    Authors: Mohanad Sarhan, Gayan Kulatilleke, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: Machine Learning (ML) approaches have been used to enhance the detection capabilities of Network Intrusion Detection Systems (NIDSs). Recent work has achieved near-perfect performance by following binary- and multi-class network anomaly detection tasks. Such systems depend on the availability of both (benign and malicious) network data classes during the training phase. However, attack data sample… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  4. DI-NIDS: Domain Invariant Network Intrusion Detection System

    Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann

    Abstract: The performance of machine learning based network intrusion detection systems (NIDSs) severely degrades when deployed on a network with significantly different feature distributions from the ones of the training dataset. In various applications, such as computer vision, domain adaptation techniques have been successful in mitigating the gap between the distributions of the training and test data.… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

  5. arXiv:2210.03254  [pdf, other

    cs.CR cs.DC cs.LG cs.NI

    Network Intrusion Detection System in a Light Bulb

    Authors: Liam Daly Manocchio, Siamak Layeghy, Marius Portmann

    Abstract: Internet of Things (IoT) devices are progressively being utilised in a variety of edge applications to monitor and control home and industry infrastructure. Due to the limited compute and energy resources, active security protections are usually minimal in many IoT devices. This has created a critical security challenge that has attracted researchers' attention in the field of network security. De… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  6. arXiv:2209.14067  [pdf, other

    cs.LG cs.IR

    Efficient block contrastive learning via parameter-free meta-node approximation

    Authors: Gayan K. Kulatilleke, Marius Portmann, Shekhar S. Chandra

    Abstract: Contrastive learning has recently achieved remarkable success in many domains including graphs. However contrastive loss, especially for graphs, requires a large number of negative samples which is unscalable and computationally prohibitive with a quadratic time complexity. Sub-sampling is not optimal and incorrect negative sampling leads to sampling bias. In this work, we propose a meta-node base… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

  7. arXiv:2207.09088  [pdf, other

    cs.CR cs.LG cs.NI

    XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: In this paper, we propose XG-BoT, an explainable deep graph neural network model for botnet node detection. The proposed model comprises a botnet detector and an explainer for automatic forensics. The XG-BoT detector can effectively detect malicious botnet nodes in large-scale networks. Specifically, it utilizes a grouped reversible residual connection with a graph isomorphism network to learn exp… ▽ More

    Submitted 11 March, 2023; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: Accepted by Internet of Things, Elsevier

  8. arXiv:2207.06819  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks

    Authors: Evan Caville, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning to generalise graph representations and output embeddings. As network flows are naturally graph-based, GNNs are a suitable fit for analysing and learning network behaviour… ▽ More

    Submitted 9 February, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted by Knowledge-Based Systems

  9. On Generalisability of Machine Learning-based Network Intrusion Detection Systems

    Authors: Siamak Layeghy, Marius Portmann

    Abstract: Many of the proposed machine learning (ML) based network intrusion detection systems (NIDSs) achieve near perfect detection performance when evaluated on synthetic benchmark datasets. Though, there is no record of if and how these results generalise to other network scenarios, in particular to real-world networks. In this paper, we investigate the generalisability property of ML-based NIDSs by ext… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  10. arXiv:2204.12656  [pdf, other

    cs.LG cs.CV cs.MM

    SCGC : Self-Supervised Contrastive Graph Clustering

    Authors: Gayan K. Kulatilleke, Marius Portmann, Shekhar S. Chandra

    Abstract: Graph clustering discovers groups or communities within networks. Deep learning methods such as autoencoders (AE) extract effective clustering and downstream representations but cannot incorporate rich structural information. While Graph Neural Networks (GNN) have shown great success in encoding graph structure, typical GNNs based on convolution or attention variants suffer from over-smoothing, no… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: 9 pages, 5 figures

  11. arXiv:2204.04254  [pdf, other

    cs.CR cs.LG cs.NI

    HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

    Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: The continuous strengthening of the security posture of IoT ecosystems is vital due to the increasing number of interconnected devices and the volume of sensitive data shared. The utilisation of Machine Learning (ML) capabilities in the defence against IoT cyber attacks has many potential benefits. However, the currently proposed frameworks do not consider data privacy, secure architectures, and/o… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  12. arXiv:2203.10465  [pdf, other

    cs.CR cs.LG q-fin.ST

    Inspection-L: Self-Supervised GNN Node Embeddings for Money Laundering Detection in Bitcoin

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Criminals have become increasingly experienced in using cryptocurrencies, such as Bitcoin, for money laundering. The use of cryptocurrencies can hide criminal identities and transfer hundreds of millions of dollars of dirty funds through their criminal digital wallets. However, this is considered a paradox because cryptocurrencies are goldmines for open-source intelligence, giving law enforcement… ▽ More

    Submitted 9 October, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

  13. arXiv:2201.07537  [pdf, other

    cs.CR cs.LG

    Graph Neural Network-based Android Malware Classification with Jum** Knowledge

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) with Jum**-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jum**-Knowled… ▽ More

    Submitted 13 June, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022

  14. arXiv:2111.02791  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann

    Abstract: The uses of Machine Learning (ML) in detection of network attacks have been effective when designed and evaluated in a single organisation. However, it has been very challenging to design an ML-based detection system by utilising heterogeneous network data samples originating from several sources. This is mainly due to privacy concerns and the lack of a universal format of datasets. In this paper,… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

  15. arXiv:2110.11464  [pdf, other

    cs.LG

    FDGATII : Fast Dynamic Graph Attention with Initial Residual and Identity Map**

    Authors: Gayan K. Kulatilleke, Marius Portmann, Ryan Ko, Shekhar S. Chandra

    Abstract: While Graph Neural Networks have gained popularity in multiple domains, graph-structured input remains a major challenge due to (a) over-smoothing, (b) noisy neighbours (heterophily), and (c) the suspended animation problem. To address all these problems simultaneously, we propose a novel graph neural network FDGATII, inspired by attention mechanism's ability to focus on selective information supp… ▽ More

    Submitted 25 October, 2021; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 10 pages, 4 figures. Reworded section 2.1 with references. Reworded argument in section 2.3 para 2

    ACM Class: I.2.6; C.4; J.4

  16. Exploring Deep Neural Networks on Edge TPU

    Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Marius Portmann

    Abstract: This paper explores the performance of Google's Edge TPU on feed forward neural networks. We consider Edge TPU as a hardware platform and explore different architectures of deep neural network classifiers, which traditionally has been a challenge to run on resource constrained edge devices. Based on the use of a joint-time-frequency data representation, also known as spectrogram, we explore the tr… ▽ More

    Submitted 20 October, 2021; v1 submitted 17 October, 2021; originally announced October 2021.

    Comments: 12 pages, 16 figures

    Journal ref: Internet of Things, Volume 22, July 2023, 100749

  17. From Zero-Shot Machine Learning to Zero-Day Attack Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, Marius Portmann

    Abstract: The standard ML methodology assumes that the test samples are derived from a set of pre-observed classes used in the training phase. Where the model extracts and learns useful patterns to detect new data samples belonging to the same data classes. However, in certain applications such as Network Intrusion Detection Systems, it is challenging to obtain data samples for all attack classes that the m… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

  18. arXiv:2108.12732  [pdf, other

    cs.CR cs.LG cs.NI

    Feature Analysis for Machine Learning-based IoT Intrusion Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Internet of Things (IoT) networks have become an increasingly attractive target of cyberattacks. Powerful Machine Learning (ML) models have recently been adopted to implement network intrusion detection systems to protect IoT networks. For the successful training of such ML models, selecting the right data features is crucial, maximising the detection accuracy and computational efficiency. This pa… ▽ More

    Submitted 23 November, 2022; v1 submitted 28 August, 2021; originally announced August 2021.

    Comments: 22 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:2108.12722

  19. Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks

    Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann

    Abstract: A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems (NIDSs). Consequently, network interruptions and loss of sensitive data have occurred, which led to an active research area for improving NIDS technologies. In an analysis of related works, it was observed that most researchers aim to obtain better classifi… ▽ More

    Submitted 5 December, 2022; v1 submitted 28 August, 2021; originally announced August 2021.

  20. Benchmarking the Benchmark -- Analysis of Synthetic NIDS Datasets

    Authors: Siamak Layeghy, Marcus Gallagher, Marius Portmann

    Abstract: Network Intrusion Detection Systems (NIDSs) are an increasingly important tool for the prevention and mitigation of cyber attacks. A number of labelled synthetic datasets generated have been generated and made publicly available by researchers, and they have become the benchmarks via which new ML-based NIDS classifiers are being evaluated. Recently published results show excellent classification p… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: 25 pages, 13 figures

  21. Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection

    Authors: Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Machine Learning (ML)-based network intrusion detection systems bring many benefits for enhancing the cybersecurity posture of an organisation. Many systems have been designed and developed in the research community, often achieving a close to perfect detection rate when evaluated using synthetic datasets. However, the high number of academic research has not often translated into practical deploy… ▽ More

    Submitted 28 August, 2021; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: 11 pages, 7 figures

  22. arXiv:2103.16329  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation data for NIDSs are typically represented as flow records, which can naturally be represented in a graph format. In this paper, we propose E-Graph… ▽ More

    Submitted 10 January, 2022; v1 submitted 30 March, 2021; originally announced March 2021.

    Comments: will appear in IEEE/IFIP Network Operations and Management Symposium 2022

  23. arXiv:2103.16295  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    Exploring Edge TPU for Network Intrusion Detection in IoT

    Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann

    Abstract: This paper explores Google's Edge TPU for implementing a practical network intrusion detection system (NIDS) at the edge of IoT, based on a deep learning approach. While there are a significant number of related works that explore machine learning based NIDS for the IoT edge, they generally do not consider the issue of the required computational and energy resources. The focus of this paper is the… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: 22 pages, 11 figures

  24. Towards a Standard Feature Set for Network Intrusion Detection System Datasets

    Authors: Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Network Intrusion Detection Systems (NIDSs) are important tools for the protection of computer networks against increasingly frequent and sophisticated cyber attacks. Recently, a lot of research effort has been dedicated to the development of Machine Learning (ML) based NIDSs. As in any ML-based application, the availability of high-quality datasets is critical for the training and evaluation of M… ▽ More

    Submitted 14 May, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

    Comments: 13 pages, 4 figures, 13 tables. arXiv admin note: substantial text overlap with arXiv:2011.09144

  25. arXiv:2012.06989  [pdf, other

    cs.NI cs.PF

    Network Traffic Control for Multi-homed End-hosts via SDN

    Authors: Anees Al-Najjar, Furqan Hameed Khan, Marius Portmann

    Abstract: Software Defined Networking (SDN) is an emerging technology of efficiently controlling and managing computer networks, such as in data centres, Wide Area Networks (WANs), as well as in ubiquitous communication. In this paper, we explore the idea of embedding the SDN components, represented by SDN controller and virtual switch, in end-hosts to improve network performance. In particular, we consider… ▽ More

    Submitted 13 December, 2020; originally announced December 2020.

    Comments: 13 pages, 26 Figures

    ACM Class: D.8.3; D.3.2

  26. NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems

    Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann

    Abstract: Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have proven to become a reliable intelligence tool to protect networks against cyberattacks. Network data features has a great impact on the performances of ML-based NIDSs. However, evaluating ML models often are not reliable, as each ML-enabled NIDS is trained and validated using different data features that may do not contai… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Journal ref: BDTA 2020

  27. Deep Learning-based Cattle Activity Classification Using Joint Time-frequency Data Representation

    Authors: Seyedeh Faezeh Hosseini Noorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Greg Bishop-hurley, Marius Portmann

    Abstract: Automated cattle activity classification allows herders to continuously monitor the health and well-being of livestock, resulting in increased quality and quantity of beef and dairy products. In this paper, a sequential deep neural network is used to develop a behavioural model and to classify cattle behaviour and activities. The key focus of this paper is the exploration of a joint time-frequency… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 22 pages, 17 figures

  28. Experimental Evaluation of LoRaWAN in NS-3

    Authors: Furqan Hameed Khan, Marius Portmann

    Abstract: Long Range Wide Area Networks (LoRaWAN) is an open medium access control (MAC) layer technology devised for the long range connectivity of massive number of low power network devices. This work gives an overview of the key aspects of LoRaWAN technology and presents results that we achieved via extensive evaluation of Class A LoRaWAN devices in different network settings using the state-of-the-art… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: 8 pages, 11 figures

    Journal ref: Proc. 28th Int. Telecommun. Netw. Appl. Conf. (ITNAC), pp. 1-8, Nov. 2019

  29. A Model for Reliable Uplink Transmissions in LoRaWAN

    Authors: Furqan Hameed Khan, Raja Jurdak, Marius Portmann

    Abstract: Long range wide area networks (LoRaWAN) technology provides a simple solution to enable low-cost services for low power internet-of-things (IoT) networks in various applications. The current evaluation of LoRaWAN networks relies on simulations or early testing, which are typically time consuming and prevent effective exploration of the design space. This paper proposes an analytical model to calcu… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: 11 pages, 8 figures

    Journal ref: Marius (2019) 147-156

  30. Joint QoS-control and Handover Optimization in Backhaul aware SDN-based LTE Networks

    Authors: Furqan Hameed Khan, Marius Portmann

    Abstract: Future cellular networks will be dense and require key traffic management technologies for fine-grained network control. The problem gets more complicated in the presence of different network segments with bottleneck links limiting the desired quality of service (QoS) delivery to the last mile user. In this work, we first design a framework for software-defined cellular networks (SDCN) and then pr… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

    Comments: 33 pages, 11 Figures. M. Wireless Netw (2019)

  31. arXiv:1807.02827  [pdf, other

    cs.NI

    MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward

    Authors: Wei Yin, Peizhao Hu, Jadwiga Indulska, Marius Portmann, Ying Mao

    Abstract: Rate control at the MAC-layer is one of the fundamental building blocks in many wireless networks. Over the past two decades around thirty mechanisms have been proposed in the literature. Among them, there are mechanisms that make rate selection decisions based on sophisticated measurements of wireless link quality, and others that are based on straight-forward heuristics. Minstrel, for example, i… ▽ More

    Submitted 8 July, 2018; originally announced July 2018.

    Comments: Submitted to Elseviser COMCOM

  32. arXiv:1607.03243  [pdf, other

    cs.NI

    SCOR: Software-defined Constrained Optimal Routing Platform for SDN

    Authors: Siamak Layeghy, Farzaneh Pakzad, Marius Portmann

    Abstract: A Software-defined Constrained Optimal Routing (SCOR) platform is introduced as a Northbound interface in SDN architecture. It is based on constraint programming techniques and is implemented in MiniZinc modelling language. Using constraint programming techniques in this Northbound interface has created an efficient tool for implementing complex Quality of Service routing applications in a few lin… ▽ More

    Submitted 12 July, 2016; originally announced July 2016.

    Comments: 19 pages, 11 figures, 11 algorithms, 3 tables

    MSC Class: 68M10; 90B18; 90B20; 90B22; 90C09; 90C27; 90C29; 90C35 ACM Class: C.2.2; D.3.2; D.3.3; F.2.2; F.4.1; G.2.2

    Journal ref: Horizons in computer science research. Volume 22, 2022, ISBN 9798886971019

  33. Sequence Numbers Do Not Guarantee Loop Freedom; AODV Can Yield Routing Loops

    Authors: Rob van Glabbeek, Peter Höfner, Wee Lum Tan, Marius Portmann

    Abstract: In the area of mobile ad-hoc networks and wireless mesh networks, sequence numbers are often used in routing protocols to avoid routing loops. It is commonly stated in protocol specifications that sequence numbers are sufficient to guarantee loop freedom if they are monotonically increased over time. A classical example for the use of sequence numbers is the popular Ad hoc On-Demand Distance Vecto… ▽ More

    Submitted 30 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: text overlap with arXiv:1312.7645

    ACM Class: C.2.2; F.3.1

    Journal ref: Proc. Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM'13, ACM, 2013, pp. 91-100

  34. A Rigorous Analysis of AODV and its Variants

    Authors: Peter Höfner, Rob van Glabbeek, Wee Lum Tan, Marius Portmann, Annabelle McIver, Ansgar Fehnker

    Abstract: In this paper we present a rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol using a formal specification in AWN (Algebra for Wireless Networks), a process algebra which has been specifically tailored for the modelling of Mobile Ad Hoc Networks and Wireless Mesh Network protocols. Our formalisation models the exact details of the core functionality of AODV, such as… ▽ More

    Submitted 30 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1312.7645

    ACM Class: C.2.2; F.3.1; F.3.2

    Journal ref: Proc. Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM'12, ACM, 2012, pp. 203-212

  35. Modelling and Verifying the AODV Routing Protocol

    Authors: Rob van Glabbeek, Peter Höfner, Marius Portmann, Wee Lum Tan

    Abstract: This paper presents a formal specification of the Ad hoc On-Demand Distance Vector (AODV) routing protocol using AWN (Algebra for Wireless Networks), a recent process algebra which has been tailored for the modelling of Mobile Ad Hoc Networks and Wireless Mesh Network protocols. Our formalisation models the exact details of the core functionality of AODV, such as route discovery, route maintenance… ▽ More

    Submitted 30 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1312.7645

    ACM Class: C.2.2; F.3.1; F.3.2

    Journal ref: Distributed Computing 29(4), 2016, pp. 279-315

  36. Automated Analysis of AODV using UPPAAL

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: This paper describes an automated, formal and rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol, a popular protocol used in wireless mesh networks. We give a brief overview of a model of AODV implemented in the UPPAAL model checker. It is derived from a process-algebraic model which reflects precisely the intention of AODV and accurately captures the protocol spec… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: text overlap with arXiv:1512.07312

    ACM Class: C.2.2; D.2.4

    Journal ref: Proc. Tools and Algorithms for the Construction and Analysis of Systems, TACAS'12 (C. Flanagan & B. König, eds.), LNCS 7214, Springer, 2012, pp. 173-187

  37. A Process Algebra for Wireless Mesh Networks

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: We propose a process algebra for wireless mesh networks that combines novel treatments of local broadcast, conditional unicast and data structures. In this framework, we model the Ad-hoc On-Demand Distance Vector (AODV) routing protocol and (dis)prove crucial properties such as loop freedom and packet delivery.

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1312.7645

    ACM Class: F.3.2; F.3.1; C.2.2

    Journal ref: Proc. 21st European Symposium on Programming, ESOP'12, (Helmut Seidl, ed.), LNCS 7211, Springer, 2012, pp. 295-315

  38. arXiv:1512.07312  [pdf, ps, other

    cs.NI cs.LO

    Modelling and Analysis of AODV in UPPAAL

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: This paper describes work in progress towards an automated formal and rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol, a popular protocol used in ad hoc wireless networks. We give a brief overview of a model of AODV implemented in the UPPAAL model checker, and describe experiments carried out to explore AODV's behaviour in two network topologies. We were able to l… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: in Proc. 1st International Workshop on Rigorous Protocol Engineering, WRiPE 2011

    ACM Class: C.2.2; D.2.4

  39. arXiv:1312.7645  [pdf, ps, other

    cs.NI cs.LO

    A Process Algebra for Wireless Mesh Networks used for Modelling, Verifying and Analysing AODV

    Authors: Ansgar Fehnker, Rob van Glabbeek, Peter Höfner, Annabelle McIver, Marius Portmann, Wee Lum Tan

    Abstract: We propose AWN (Algebra for Wireless Networks), a process algebra tailored to the modelling of Mobile Ad hoc Network (MANET) and Wireless Mesh Network (WMN) protocols. It combines novel treatments of local broadcast, conditional unicast and data structures. In this framework we present a rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) protocol, a popular routing protocol designe… ▽ More

    Submitted 30 December, 2013; originally announced December 2013.

    Report number: Technical Report 5513, NICTA, 2013 ACM Class: C.2.2; F.3.1; F.3.2

  40. arXiv:cs/0507016  [pdf, ps, other

    cs.DM

    Minimizing makespan in flowshop with time lags

    Authors: Julien Fondrevelle, Ammar Oulamara, Marie-Claude Portmann

    Abstract: We consider the problem of minimizing the makespan in a flowshop involving maximal and minimal time lags. Time lag constraints generalize the classical precedence constraints between operations. We assume that such constraints are only defined between operations of the same job. We propose a solution method and present several extensions.

    Submitted 6 July, 2005; originally announced July 2005.

    Comments: 2 pages. Also available at http://hal.inria.fr/inria-00000149

    Journal ref: Dans MAPSP'2005 [OAI: oai:hal.inria.fr:inria-00000149_v1]