Workshops
Wireless Security I
Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks
Wiktor S?dkowski (Nokia Networks, Poland); Clifton Fernandes (Nokia, United Kingdom (Great Britain)); Rakshesh P Bhatt (Nokia Networks Bangalore, India); Kodandram Ranganath (Nokia, India)
and even the patches were available in public. In 5G wireless networks, the number of network functions and devices are
expected to be in millions. For most of the CVEs published, different exploits are also published, and available in online
databases like Exploit DB. It is likely that attackers take such exploits, manipulate them to create different variants of such
exploits and launch attacks on networks. For example, https://www.exploit-db.com/ has more than 8000 exploits published only for SQL injection kind of
vulnerabilities. Older vulnerability exploits can inspire creation of newer ones for other products. 5G and future wireless networks having service-based architecture at the core will require more proactive approaches to predict any misuse of emerging or manipulated variants of known exploits. This paper proposes one possible solution for the same and presents results from experiments done using patterns generated from a remote command injection vulnerability exploit.
Speaker Wiktor Sedkowski
Wiktor Sędkowski graduated in Teleinformatics at the Wrocław University of Science and Technology, specialized in cybersecurity field. He is an expert on cyber threats. CISSP, CCSP, OSCP, OSWE and MCTS certified security engineer. Works as security researcher at Nokia. Ph.D. candidate at Opole University of Technology.
CVCA: A Complex-Valued Classifiable Autoencoder for MmWave Massive MIMO Physical Layer Authentication
Xinyuan Zeng and Chao Wang (Xidian University, China); Chengcai Wang (School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China); Zan Li (Xidian University, China)
Speaker Xinyuan Zeng (Xidian University)
Xinyuan Zeng received the B.S. degree in communication engineering from Yangzhou University, Yangzhou, China, in 2020. He is currently pursuing the Ph.D. degree in information and communication engineering with the National key laboratory of integrated service, Xidian University, China. His current research interests include wireless communications, physical layer authentication, and deep learning.
A Lightweight Preprocessing Scheme for Secret Key Generation from mmWave Massive MIMO Channel Measurements
Lijun Yang, Xinchao Ge, Qianyi Zhu and Lin Guo (Nanjing University of Posts and Telecommunications, China)
Speaker Lijun YANG (Nanjing University of Posts and Telecommunications)
Lijun YANG received the bachelor's degree in Information Engineering and the Ph.D. degree in Information Security from Nanjing University of Posts and Telecommunications, Nanjing, China, in 2007 and 2015, respectively. She is currently a Lecturer at Nanjing University of Posts and Telecommunications. Her current research interests include the Internet of Things, 5G/B5G, physical layer security, wireless security, and deep learning.
Jamming Attacks on Decentralized Federated Learning in General Multi-Hop Wireless Networks
Yi Shi, Yalin E Sagduyu and Tugba Erpek (Virginia Tech, USA)
Speaker Yi Shi (Virginia Tech)
Dr. Yi Shi is a Research Associate Professor in Commonwealth Cyber Initiative and a Faculty (by Courtesy) in the Bradley Department of Electrical and Computer Engineering, Virginia Tech. He is a Senior Member of IEEE. Dr. Shi's research focuses on machine learning, algorithm design, and optimization for 5G and NextG networks, cognitive radio networks, MIMO and cooperative communication networks, sensor networks, ad hoc networks, satellite networks, and social networks. His work has appeared in leading IEEE and ACM journals and top-tier international conferences. He is a recipient of Test of Time Paper Award at IEEE INFOCOM 2023, a recipient of Best Paper Award at IEEE HST 2018, a recipient of Best Student Paper Award at ACM WUWNet 2014, a recipient of the only Best Paper Award Runner-Up at IEEE INFOCOM 2011, and a recipient of Best Paper Award at IEEE INFOCOM 2008. Dr. Shi was IEEE INFOCOM 2021 Distinguished TPC member and IEEE Communications Surveys and Tutorials Exemplary Editor in 2014. Dr. Shi is an Editor for IEEE Communications Surveys and Tutorials and IEEE Transactions on Cognitive Communications and Networking, and was a Co-Chair for several IEEE and ACM Workshops, Conference Tracks, and Symposia.
Session Chair
Danda B. Rawat (Howard University, United States); Min Song (Stevens Institute of Technology, United States)
Wireless Security II
A Finite Blocklength Approach for Wireless Hierarchical Federated Learning in the Presence of Physical Layer Security
Honan Zhang (Southwest Jiaotong University, China); Chuanchuan Yang (State Key Laboratory of Advanced Optical Communication Systems and Networks, Peking University, China); Bin Dai (Southwest Jiaotong University, China)
Speaker Haonan Zhang (Southwest Jiaotong University, China)
Haonan Zhang received the B.S. degree in communication engineering from Southwest Jiaotong University, in 2017, and the M.S. degree in communication engineering from Southwest Jiaotong University, in 2020. He is currently pursuing the Ph.D. degree in communication engineering with Southwest Jiaotong University, Chengdu, China. His research interests include physical layer security and wireless communication.
A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems
Alekha Kumar Mishra (National Institute of Technology Jamshedpur, India); Deepak Puthal (Khalifa University, United Arab Emirates); Asis Kumar Tripathy (Vellore Institute of Technology, Vellore, India)
Speaker Alekha Mishra (NIT Jamshedpur)
Alekha Kumar Mishra has received his Ph.D degree from NIT Rourkela, India in the year of 2014. He has also received his M.Tech degree in Information Security from NIT Rourkela in the year of 2009. Currently, Dr. Mishra is working as a faculty member in the department of computer science and engineering, NIT Jamshedpur, India. His research interests include IoT, Network Security, Security Threat Modelling and Analysis, Energy-efficient Routing in LLN, and Cybersecurity.
Wireless Signal Denoising Using Conditional Generative Adversarial Networks
Haolin Tang and Yanxiao Zhao (Virginia Commonwealth University, USA); Guodong Wang (MCLA, USA); Changqing Luo (Virginia Commonwealth University, USA); Wei Wang (San Diego State University, USA)
Speaker Haolin Tang (Virginia Commonwealth University)
Haolin Tang is currently pursuing the Ph.D. degree with the Department of Electrical and Computer Engineering at Virginia Commonwealth University. His research interests include next-generation wireless communication, cyber security, computer vision, and machine learning.
Performance Evaluation of Quantum-resistant Open Fronthaul Communications in 5G
Ricardo Harrilal-Parchment, Isabela Fernandez Pujol and Kemal Akkaya (Florida International University, USA)
Speaker Ricardo Harrilal-Parchment (Florida International University)
Ricardo is currently pursuing his Masters in Cybersecurity with Florida International University while simultaneously conducting research with the Advanced Wireless & Security (AdWise Lab). His current research interests include 5G communications, post-quantum cryptography, payment channel systems, and IoT security.
Session Chair
Danda B. Rawat (Howard University, United States); Min Song (Stevens Institute of Technology, United States)
Gold Sponsor
Gold Sponsor
Bronze Sponsor
Student Travel Grants
Student Travel Grants
Local Organizer
Gold Sponsor
Gold Sponsor
Bronze Sponsor
Student Travel Grants
Student Travel Grants
Local Organizer
Made with in Toronto · Privacy Policy · INFOCOM 2020 · INFOCOM 2021 · INFOCOM 2022 · © 2023 Duetone Corp.