2022 RoEduNet Conference: Networking in Education and Research
21st RoEduNet Conference
Networking in Education and Research
Nowadays, modern education and research activities are strongly dependent on a high-speed communication infrastructure and computer networks based on the newest technology. Design, implementation, management of such networks, together with development of new application fields are not possible without good knowledge of networking state-of-the-art.
The 21st edition of Agency ARNIEC/RoEduNet's (Romanian Education Network) annual Conference is organised with the help of "Alexandru Ioan Cuza" University of Iasi, University Politehnica of Bucharest, Universitatea de Medicină, Farmacie, Științe și Tehnologie „George Emil Palade” din Târgu Mureș, Carnegie Mellon University, Pittsburgh, US, and IEEE Computer Society Romania Chapter, under the patronage of Ministry of National Education and Scientific Research of Romania, offers special opportunities for information exchange in computer networking: technical and strategic aspects, communication issues, and of course their applications in education and research.
We are hoping that the pandemic will allow us to organize the gathering in person at a place that is currently up for negotiation. We, as well as the other participants, are extremely interested in your experience and thoughts. You are welcome to join in. Please register as a user on the conference website to receive updates on the 21st RoEduNet Conference.
The conference will be organized online with help from our partners and sponsors.
Thank you, and hope to see you soon at the 21st Conference of RoEduNet !!!
-
-
Opening Plenary Session
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=m4bfbbc696641a87e771ce68d47c6f6bb
Convener: Dr Octavian RUSU (Agency ARNIEC/RoEduNet, Alexandru Ioan Cuza University of Iasi)-
1
Opening / Welcome
Welcome message from conference hosts
Speaker: Dr Octavian RUSU (Agency ARNIEC/RoEduNet, Alexandru Ioan Cuza University of Iasi) -
2
RoNaQCISpeaker: Mihai CARABAȘ (Agency ARNIEC/RoEduNet, University Politehnica of Bucharest)
-
3
GÉANT - OCRE
Cloud Framework by OCRE
Speaker: Olaf Verschoor (GÉANT ) -
4
GÉANT - Safe and Secure Research and Education NetworkingSpeaker: Roderick MOOI (GEANT)
-
1
-
15:30
Coffee Break
-
Partners - Technical Session
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=m69cc71b244168877c074fbcfbef0993a
Convener: Dr Octavian RUSU (Agency ARNIEC/RoEduNet, Alexandru Ioan Cuza University of Iasi)-
5
Solutii tehnice pentru invatamantul hibrid - Cisco România
Cisco Romania
Speaker: Razvan ATIMARITI (CISCO Romania) -
6
Accelerate time to innovation - Dell Technologies
Accelerate time to innovation
Serban Zirnovan, Sr. Director, ISG Solutions, Dell EMEASpeaker: Serban ZIRNOVAN (ISG Solutions, Dell EMEA) -
7
TBC
-
5
-
Cocktail event support by Dell Technologies and Microsoft
DELL Partner
-
-
-
Session 1A - Cloud Computing and Network Virtualisation Room A
Room A
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=me480250a7ecfecd2627bea2b43b3030c
Convener: Mihai CARABAȘ (Agency ARNIEC/RoEduNet, University Politehnica of Bucharest)-
8
Symmetric Multiprocessor Support for bhyve on arm64
In the years, ARM started to take its share of the personal computers and server markets.
Their CPUs are known for their low power consumption and mobile market supremacy. In these new areas, virtualization is used to provide working machines in the cloud and create secure environments.
The FreeBSD community started developing an ARM-based hypervisor, but it was not tested on real hardware and without some features that AMD64 has.
Furthermore, nowadays, computers usually have more CPUs, to perform the task in parallel and increase the speed of the overall system. This paper presents the SMP (Symmetric Multiprocessor Support) added to bhyve on arm64. This feature allows the user to start a virtual machine when the host operating system has more than one cores and the ability to start a virtual machine with more virtual CPUs.Speaker: Mr Mihai Carabas (University Politehnica of Bucharest) -
9
Automation of Network Traffic Monitoring using Docker images of Snort3, Grafana and a custom API
In this paper we present a mechanism to automate network traffic monitoring by using Docker images. The application has three parts: a Snort3 application for capturing network traffic, a Grafana application to display statistics on the dashboard and a custom API that makes the connection between Snort3 and Grafana. We pushed these images to DockerHub. An automation script that executes all needed steps, was created and published to a Github repository.
Speakers: Mr Levente Manases (Technical Universiti of Cluj-Napoca), Daniel Zinca (Technical University of Cluj-Napoca) -
10
Honeypot generator using software defined networks and recursively defined topologies
The domain of cyber security represents a constant struggle between researchers and hackers, a continuous competition where the global digital infrastructure is at stake. Throughout the years, various protective measures have been developed to prevent against an increasing number of exploits that are becoming more and more complex and refined. Instead of concentrating on general mitigating techniques, our proposal orients towards creating performant honeypots which are safe and isolated environments that attract malicious users for the purpose of studying their invasive techniques. Firstly, this paper introduces an original method of describing, from a mathematically point of view, recursively defined topologies and presents a proposed algorithm used in constructing them. Secondly, we suggest a novel architecture which combines recursively defined topologies (RDT), software-defined networks (SDN) and an orchestrator engine for containerized infrastructure in order to develop a high-interaction honeypot which simulates an entire data center using a single physical host. The proposed implementation may represent a promising framework used as a developing platform for more complex honeypots used in either researching malicious human behavior or in the IT industry as a defensive measure. Regarding achieved results, the proposed implementation accomplishes notable results in deceptive techniques, isolation and effortless configurability.
Speaker: Ioan-Mihail Stan (University Politehnica Bucharest) -
11
Web Application for Monitoring Large-scale Virtualized Computing Resources
The Flask framework is used for implementing a simple web app that allows any user to visualize and monitor computing resources that it has access to. The resources are virtualized, deployed, and managed through the OpenStack infrastructure. Within the web app, the user can see the entire set of virtual machines as a topological view or check system information as graphical representations (i.e., pie charts, histograms, and bar charts with machine status, network information, system metrics, and so on). These features can help any scientist dealing with complex simulations that require computational power, by granting a quick way of checking potential issues on the machines executing calculations.
Speaker: Mr Robert Poenaru (Horia Hulubei National Institute of Physics and Nuclear Engineering) -
12
Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort
The exploit of network traffic has become common due to the increased flow of web traffic from services like HTTP, FTP, SMTP etc. The number of cyberattacks has grown due to the fact that they require different information about a target with the purpose of intimidating, blackmailing or harassing a person or a company. Servers of medical and dental organizations have become a good source of information for cyber criminals, due to the huge information stored across years. Besides compromised health data, another problem with huge impact is the congestion of a network. If a network of database servers is overcrowded, the result is high delays in obtaining the information of a patient that needs urgent medical care. In this paper, we are going to analyze network traffic generated by a network simulator during a User Datagram Protocol (UDP) flood. We are proposing a solution to this type of network attack, consisting in a custom firewall rule, that obtains significant improvements in the network resources usage. This paper specifically demonstrates the attack of LOIC on an FTP server inside a network that is managed by pfSense as firewall and Snort as IDS. We concluded the paper with the results of our study and the solution that we developed. Our study regarding this problem consists in an approach to solve the problem of the UDP flood inside a local network and also using open-source distributions to resolve the congestion of the network traffic.
Keywords— FTP, eHealth, Medical care, Snort, pfSense, UDP flood, vsftpd, IDS.Speakers: Andrei-Daniel Tudosi (USV), Adrian GRAUR, Doru Balan (USV), Alin Dan POTORAC
-
8
-
Session 1B - Network Security Room B
Room B
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=mdb21f44fba55794ef50ae01fdbe34d6b
Convener: Emil-Ioan CEBUC (Agency ARNIEC/RoEduNet, Technical University of Cluj-Napoca)-
13
Hiding cloud network access patterns for enhanced privacy
The cybersecurity landscape in the last years shows a disastrous scenario in which more than 281 million people were affected by cyber-threads in 2021 with an estimated financial impact of more than $15.680 million. Perimeter breaching is the incipient step that attackers take when they target external networks. According to the latest research1, on average the penetration of the internal networks of the majority of companies takes no more than two days. With this paper, we intend to get one step closer to a secure network desideratum. Therefore, we propose a real-time security mechanism for network traffic using obfuscation and deobfuscation techniques over the XMPP protocol. We evaluate the proposed solution in terms of time frame, speed, and rate limiting delay.
Speaker: Mr Gabriel-Cosmin Apostol (University POLITEHNICA of Bucharest) -
14
Probability and Attack Graph models in Contextual Risk Scoring System
The interest of attackers is expanding in response to the on-growing enthusiasm for rapid development, so seeking ways to quantify and manage the risks has become a priority. However, in the current context, there is no consistent and effective strategy for evaluating computer network security. Therefore, we propose a comprehensive software solution that collects, processes, and evaluates data from devices inside a network, in order to identify the key security issues and measure the level of risk using a probability-based model. The final result is represented by the network score, which is a measure of the risk to which it is exposed.
Speaker: Octavian Grigorescu -
15
Increasing communication security for Bluetooth Medical Devices in eHealth systems
The market of Medical Devices have a compound annual growth rate perspective of 5.4% in the period 2022 - 2028. The growth rate is mainly supported by the increased usage of devices for chronic diseases prevention and for remote patients monitoring. The growth rate is also supported by the population's appetite for mobile devices. The continuously growing number of mobile devices has led to an increase in the number of cyber attacks against them. In this paper we present Personal Medical Hub, an optimized security solution for Bluetooth enabled medical devices, that enhances data privacy and is aimed to protect from man-in-the-middle attacks and other security breaches and backdoors.
Speakers: CRISTIAN CONTASEL (University Politehnica of Bucharest), Dumitru-Cristian Tranca (University Politehnica of Bucharest) -
16
Increasing the security of web applications by using smartphones
The web applications security systems often use the authentication strategy and credentials to be able to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the authenticity of identity is claimed based on authentication strategy. This paper analyzes and compares different strategies used to enforce the web applications security systems by using location and biometric features of the smartphones to provide two way authentications.
Speakers: CRISTIAN CONTASEL (University Politehnica of Bucharest), Dumitru-Cristian Tranca (University Politehnica of Bucharest) -
17
The Role of Load Balancer Mechanisms in Securing IoT Platforms
Abstract—As IoT ecosystems are growing these days, the question of potentially dangerous and even life-threatening security risks raises concerns, especially for bigger-scale environments, such as smart cities. In this regard, many cyber security researchers are trying to develop solutions, which eventually could provide a high-security level enough to discourage any attempts of illicit activities. This paper introduces existing technologies, some even at the enterprise level, and more common ones, which could provide a very strong layer of security for web-based monitoring and management platforms used in IoT environments.
Speaker: Daniel Hritcan (University "Stefan cel Mare" Suceava)
-
13
-
10:40
Coffee Break
-
Session 2A - Sensor Networking Room A
Room A
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=m08176490fe911be7e08acafe78b1e81e
Convener: Paul GASNER (Agency ARNIEC/RoEduNet, Alexandru Ioan Cuza University of Iasi)-
18
Solar Power Prediction Based on Weather Forecast
Prediction of an evolving system behavior based on a sparse historic data set is hardly achievable with current artificial intelligence concepts, even if using massive computing power.
This paper presents a novel prediction technique for such difficult cases.
The technique is based on local regression and dimensional splitting of the parameter space.
As an application, the power generated by a generic solar cell is predicted, based on the weather forecast obtained from public sources.
The algorithm maintains a good balance between generating reasonably good predictions and keeping the computation needs very low.
Several common prediction strategies are compared, proving the superiority of an adaptive approach.
Measurements on an experimental device are used to validate the prediction technique.Speakers: Florin Bogdan MANOLACHE (Carnegie Mellon University), Dr Octavian RUSU (Alexandru Ioan Cuza University) -
19
Convolutional Neural Networks for Environmental Sound Recognition
Environmental sound recognition is now an important field of computer science, with applications in manifold domains like security, environment protection, wildlife monitoring. The current methodology evolved from methods used in speech-based applications to more specific approaches, and with the rapid growth of the deep learning technologies many attempts using these methods came about. The paper extends our former research using Deep Feed Forward Neural Networks, by exploring the Convolutional Neural Networks for the recognition of environmental sounds susceptible to indicate a logging activity in forest environment. Unlike other Convolutional Neural Networks solutions to AESR, where the input data ix based either on Log-Mel-Spectrograms or raw data, we will use as input data linear frequency Log Spectrograms. We will compare these results with the ones obtained with Deep Deed forward Neural Networks applied on Fourier power spectrum.
Speaker: Dr Svetlana Segarceanu (BEIA CONSULT INTERNATIONAL) -
20
Classification algorithm of an automated sorting system for Construction and Demolition Waste materials
Construction and Demolition Waste (CDW) management market size has reached in 2021 USD 212.8 Billion and its constantly increasing and expected to reach USD 287.4 Billion by 2027. The demolition of existing infrastructures generates more than twenty types of materials. CDW management aims at the disposing and reusing the materials to reduce the negative impact on the environment and the consumption of raw materials which have higher costs at present after the COVID-19 pandemic. In the last years, the integration of AI and robots for efficient recycling activities in CDW has been increasing. The development of a system for CDW material handling and processing composed of a robotic arm and classification algorithm will have important benefits such as increasing the total amount of recycled material, maximize the economic value of recycled materials and products, reducing the environmental degradation, greenhouse gas emissions, pollution, contamination. This paper aims to present a classification algorithm for fast identification and selection of CDW materials based on information obtained from several hyperspectral cameras and sensors. The main goal is the division of the materials from the conveyor belt into specific groups and their placement into dedicated bins.
Speakers: Ioana Petre (SC BEIA CONSULT INTERNATIONAL SRL), Mr Ionel Tapurica (SC BEIA CONSULT INTERNATIONAL), Mr Stefan Simionescu (SC BEIA CONSULT INTERNATIONAL SRL)
-
18
-
Session 2B - Technologies for Future Internet
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=mde89db8b548786e8938dabf3f3af28be
Convener: Florin Bogdan MANOLACHE (Carnegie Mellon University)-
21
Image-based Fruit Recognition and Classification
Automatically analysing images enables a range of applications in the field of agriculture, where many decisions are made based on the appearance of the product. There are significant benefits in the automation of these decisions. An important class of problems, which has seen significant attention in recent years is the analysis of agricultural images such as fruits and vegetables for recognition and classifications purposes. This paper proposes solution that uses Convolutional Neural Networks for classifying fruits as either healthy or damaged. The algorithm was built on YOLOv3, a state-of-the-art network for objects detection in images that runs on the Darknet architecture. The network was trained and evaluated on a newly collected and annotated dataset of over 400 images of 12 different fruits. The algorithm obtained a good classification accuracy of over 75%, considering the 12 double-state classes. We make the collected dataset available together with annotations indicating the type of fruit and the healthy or damaged state.
Speakers: Alexandru MARIN (University Politehnica of Bucharest), Mr Emilian Radoi (University Politehnica of Bucharest), Mr Emilian Radoi (University Politehnica of Bucharest) -
22
A roadmap for building quantum key distribution devices
Adopting the emerging quantum communication technologies seems to be a logical answer to the security challenges implied by the ever expanding communication networks and computing and storage facilities. Quantum communications are based on quantum key distribution, which uses quantum mechanical processes to generate cryptographic keys and to securely distribute them to the users in the networks.
There already are quantum key distribution devices on the market, but it is ill advised to fully rely on such devices, in the national security use cases. Thus, each country in EU is actively trying or has already succeeded in developing their own prototypes.
We present our roadmap for building such a quantum key distribution prototype and the current status of the R&D activities undertaken by our collaboration ITIM-UTCN in that direction.Speakers: Dr Liviu Zarbo (INCDTIM Cluj), Dr Teodora Murariu (CETATEA, National Institute for Research and Development of Isotopic and Molecular Technologies INCDTIM Cluj-Napoca, Romania) -
23
Bootstrapping Road Sign Detection for Self-Driving Cars using Weakly-Supervised Learning
Given the escalating trend in the number of cars on the public roads, advanced autonomous driver-assistance systems become more accessible to the masses in order to keep safe all the traffic participants. Bosch Future Mobility Challenge is an IEEE ITSS certified contest that encourages students to develop complete autonomous driving solutions for scaled vehicles in controlled real-life scenarios. This work addresses the problem of traffic signs detection
constrained by running in a minimal embedded platform. Our solution consists of the generation of a synthetic object detection dataset using CARLA Simulator, a popular self-driving car virtual environment, enhancing it with image augmentation policies and bootstrapping the model performance by using knowledge distillation from a model ensemble. We make use of modern weakly supervised techniques to minimize labelling noise and achieve a fast, predictive, high-precision model that performs well in real-life scenarios. The model is integrated with ease into real-time applications that run on embedded platforms. Our proposed computer vision solution that powered the scaled self-driving car achieved third place at the Bosch Future Mobility Challenge 2022.Speaker: Mr Costin-Tudor Rachieru (University Politehnica of Bucharest)
-
21
-
12:20
Lunch
-
Session 3A - Grid, Cloud & High Performance Computing
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=m6057b088a862ba1c89de732d89acd085
Convener: Adrian ISTRATE (Agency ARNIEC/RoEduNet, “Dunărea de Jos” University of Galati)-
24
Scalable Cloud Deployments for Real-Time Video Stream Processing
Real-time stream processing is becoming more prevalent today due to huge chunks of data needing to be processed upon arrival. In video streaming the need for real-time management is also extremely important because video frames come at high frequency. AI advances have made it possible to understand video feeds at a high level in real time, making them a valuable source of information on human behavior, trends, surveillance and much more. As a consequence of those reasons, there is a need for a highly performant and deployable system in terms of latency, scalability, accuracy of results and computing power which leverages the cloud as a service. A design for a low-latency and highly scalable system is very much needed as video stream processing or video analytics has uses in surveillance, real-time video analytics, criminality and autonomous vehicles, which require fast and accurate analysis of data. Such a system should be able to employ not only streaming but also different processing actions including machine learning models which can be applied to those frames resulting in data analysis or further data pipelines. We developed a scalable real-time video processing system which consumes video frames, processes them using deep learning models, renders them and stores the resulting semantic information in a database for further downstream processing. We show that our proposed processing architecture is a suitable solution for modern video analytics systems, which can be scaled both vertically and horizontally, and achieves real-time latency within maximum of 1 second for various frame rates ranging from 10 to 60 fps.
Speaker: Mr Catalin Patrascu (University Politehnica of Bucharest) -
25
Complete OCR Solution for Image Analysis of World War 2 Documents
The field of Optical Character Recognition (OCR) consists of techniques that are mainly focused on document image analysis. Aside from generating significant speedups of everyday procedures, OCR has a considerable role in the preservation of historical sources of information. Most of the World War 2 (WW2) documents are of great importance, especially with applications in virtual archives, museums, and research. The situation asks for an efficient, yet not aggressive, transcribing method using OCR tools. This paper describes an approach in the context of the given problem. The focus is oriented towards extracting the information from documents affected by their age, but with simpler structures, mainly split into paragraphs, such as letters and military reports. The approach is based on combining the results of multiple OCR engines, with the final objective of achieving better performance compared to the individual performance of each engine.
Speaker: Mr Nicolae Tarbă (University Politehnica of Bucharest) -
26
Improving and testing live migration for bhyve
When managing a cluster or grid infrastructure, a system administrator uses live migration to move virtual machines that provide certain services from one host to another. The migration process should be fast and should not affect the service.
For bhyve, FreeBSD's hypervisor, we have added a live migration support. This paper presents the improvements we have added to the live migration feature such as cleaning the dirty bit after copying a page and extending the live migration support to support guests with more that 3GB of RAM. Moreover, this paper presents the testing procedure and scenarios we used to asset our live migration support in bhyve.Speaker: Maria-Elena Mihailescu (University Politehnica of Bucharest) -
27
Image Enhancement for Facial Landmark Detection
Facial landmark detection (FLD) is a field of study in computer vision that specializes in detecting and tracking key points from human faces. There are many applications, such as detecting a human’s head pose (position and rotation), tracking whether drivers are paying attention or not, applying augmented reality, etc. Common problems for FLD algorithms include occlusion and pose variation. Mapping errors have a high chance of occurring because the problem implies a transformation from a tri-dimensional space into a two-dimensional one. Furthermore, because the environmental conditions in which the picture was taken affect the quality of the photo, the landmark detection algorithms may misinterpret the key points. This paper proposes to evaluate and decide what are the optimal techniques of image enhancement that can be used to improve different algorithms of FLD. After proposing different pipelines of contrast enhancement and grayscale conversion to enhance the image before applying the FLD algorithm, the results show that the performance will not increase drastically if an image enhancement pipeline is used, but for the reason that this step will not consume a lot of time in the process of detection, it is a step worth considering.
Speaker: Mr Nicolae Tarbă (University Politehnica of Bucharest)
-
24
-
Session 3B - Network Management // Open Source and GNU in Education and Research
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=mba7b4928a68eb976bb9a34622664e88b
Convener: Dr Octavian RUSU (Agency ARNIEC/RoEduNet, Alexandru Ioan Cuza University of Iasi)-
28
A voting method for image binarization of text-based documents
Binarization is an essential stage of image pre-processing before text recognition. This process improves the performance of the obtained text and decreases the effort required for post-processing to find possible mistakes. The main direction for this work is to improve the binarization step in a Document Image Analysis System to increase the text's accuracy and combine a series of thresholding algorithms into a voting solution.
Speaker: Giorgiana Vlăsceanu (University Politehnica of Bucharest) -
29
Development Framework for Simulating Routing Behavior in Software-Defined Wireless Networks
Wireless technologies play an important role in the Internet of Things (IoT) and they facilitate the deployment of various types of sensor networks. Nodes in a sensor network don’t always have a direct connection to the central sink node, therefore they route packets through other nodes in the network. In the emerging Software-Defined Networking (SDN) architecture, a main controller is responsible for coordinating the network functions including the routing operation. The current article presents a Java-based simulation framework developed for testing the routing mechanism in a wireless SDN. The goal of the implemented framework is to create a working framework that can be used to perform various routing simulations. The framework is constructed to be multi-purpose, it can be used on a local machine, but is also compatible with the Mininet-WiFi network simulator. Routing simulations are performed locally and in Mininet-WiFi in IPv4 networks and they prove the framework’s functionality and its working features.
Speaker: Sorin Buzura (Technical University of Cluj-Napoca) -
30
Video Streaming Evaluation Using Priority Queuing in P4 Programmable Networks
There is an increasing popularity of domain-specific languages such as P4 and of the capability to write code for improving the device performance. Therefore, the time-critical traffic becomes decisive to avoid network and service disruption due to a poor implementation. To handle real-time traffic and latency-sensitive applications (e.g., video streaming) in a Software-Defined Network (SDN) environment, the trustworthy and secure mechanisms are needed to guarantee a minimum end-to-end delay and to manage response time. This paper presents a P4-based switch solution to improve the data-control performance and to provide efficient queuing in SDN. Additionally, we studied how priority queuing mechanisms can help in achieving a solid video quality. In contradiction, a poor network implementation can lead to a longer network delay, which can make the video unplayable. The network was developed using the Behavioral Model v2 of the P4 language.
Speaker: Mr Calin-Marian Iurian (Technical University of Cluj-Napoca) -
31
Open Source Network Management System Based on SharpPcap for QoS and Security Policies
A network management system (NMS) is a vital tool to be used in a corporate network. It ensures that Quality of Service (QoS) policies are correctly applied, but can also have a great impact over the network security preventing attacks and blocking the ongoing actions of attackers in enterprise networks. The current work presents an implementation of an out-of-band NMS with the primary purpose of detecting and blocking ongoing Domain Name System (DNS) exfiltration attacks which are triggered by other hosts in the network. The secondary purpose of the NMS is to adjust the QoS policies of the other devices in the network manipulating the value of the DifferentiatedServices (DiffServ) field of the IP packets. The solution is implemented using the SharpPcap framework for automated packet processing with the desire to make this system open source for further development. An experimental setup was created using a wiretap for traffic duplication to an out-of-band monitoring device. The experimental work proves that the solution is effective in detecting dictionary-based DNS exfiltration attacks and is successful in blocking the attacker from the network.
Speaker: Sorin Buzura (Technical University of Cluj-Napoca) -
32
Industrial IoT (IIoT) Architecture for Remote Solar Plant Monitoring
This paper proposes a redundant IIoT network architecture design for SCADA systems in photovoltaic (PV) / solar power plants. IIOT is found at the crossroads of SCADA and IOT, and therefore it encompasses the monitoring and control part of the former, and the data analysis of the latter. Using two industrial carrier boards from Waveshare based on Raspberry Pi Compute module 4 (CM4), a redundant gateway protocol translator is achieved. Data sent from various sensors connected to the peripherals can be encapsulated for transport to the central management system for analysis and decision making. This ensemble is used in solar panel monitoring in our experimental setup alongside various environmental sensors for weather analysis and forecasting. To ensure security over the Internet, a VPN tunnel is established between the egress location and the central system. Being connected via VPN to the central control location ensures a degree of security in communications. Having an always ready data link to the central system guarantees that any modifications an operator makes on the remote solar power plant are to be executed without delay.
Speaker: Vlad Voicu (Universitatea Tehnica din Cluj-Napoca)
-
28
-
15:40
Coffee Break
-
Session CISCO
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=mb3a0a336dfe6f29c4548c699e0520d45
-
33
Demo Session - Cisco :: Solutii tehnice pentru invatamantul hibridSpeaker: George BOULESCU (Cisco Romania)
-
33
-
Closing Plenary Session
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=m3e070641be252a482fd7b1a9769eba7e
-