Gergely Biczók

Gergely Biczók
Budapest University of Technology and Economics · CrySyS Lab, Department of Networked Systems and Services

PhD

About

74
Publications
32,254
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,202
Citations
Citations since 2017
31 Research Items
701 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Gergely Biczók currently works at the CrySyS Lab, Department of Networked Systems and Services, Budapest University of Technology and Economics. Gergely does research in the economics of networked systems, information privacy and computer networks.
Additional affiliations
September 2016 - present
Budapest University of Technology and Economics
Position
  • Professor (Associate)
December 2010 - March 2014
Norwegian University of Science and Technology
Position
  • PostDoc Position

Publications

Publications (74)
Article
The ever-increasing volume of vehicular data has enabled different service providers to access and monetize in-vehicle network data of millions of drivers. However, such data often carry personal or even potentially sensitive information, and therefore service providers either need to ask for drivers' consent or anonymize such data in order to comp...
Article
Most governments employ a set of quasi-standard measures to fight COVID-19, including wearing masks, social distancing, virus testing, contact tracing, and vaccination. However, combining these measures into an efficient holistic pandemic response instrument is even more involved than anticipated. We argue that some non-trivial factors behind the v...
Article
Full-text available
The unavailability of training data is a permanent source of much frustration in research, especially when it is due to privacy concerns. This is particularly true for location data since previous techniques all suffer from the inherent sparseness and high dimensionality of location trajectories which render most techniques impractical, resulting i...
Chapter
Third-party applications are popular: they improve and extend the features offered by their respective platforms, whether being mobile OS, browsers or cloud-based tools. Although some privacy concerns regarding these apps have been studied in detail, the phenomenon of interdependent privacy, when a user shares others’ data with an app without their...
Preprint
Full-text available
Most governments employ a set of quasi-standard measures to fight COVID-19 including wearing masks, social distancing, virus testing, contact tracing, and vaccination. However, combining these measures into an efficient holistic pandemic response instrument is even more involved than anticipated. We argue that some non-trivial factors behind the va...
Preprint
Full-text available
Multiple attacks have shown that in-vehicle networks have vulnerabilities which can be exploited. Securing the Controller Area Network (CAN) for modern vehicles has become a necessary task for car manufacturers. Some attacks inject potentially large amount of fake messages into the CAN network; however, such attacks are relatively easy to detect. I...
Chapter
Full-text available
Account information from major online providers are getting exposed regularly; this gives rise to PWND services, providing a smart means to check whether a password or username/password tuple has already been leaked, rendering them “pwned” and therefore risky to use. However, state-of-the-art PWND mechanisms leak some information themselves. In thi...
Preprint
Full-text available
The quantity of mobility data is overwhelming nowadays providing tremendous potential for various value-added services. While the benefits of these mobility datasets are apparent, they also provide significant threat to location privacy. Although a multitude of anonymization schemes have been proposed to release location data, they all suffer from...
Article
It is becoming increasingly common for enterprises to outsource network functions to a third party provider such as a public cloud. Besides its well documented benefits in cost and flexibility, outsourcing also introduces security issues. Peeking into or modifying traffic destined to the cloud are not the only threats we have to deal with; it can a...
Preprint
Full-text available
Pandemic response is a complex affair. Most governments employ a set of quasi-standard measures to fight COVID-19 including wearing masks, social distancing, virus testing and contact tracing. We argue that some non-trivial factors behind the varying effectiveness of these measures are selfish decision-making and the differing national implementati...
Article
Full-text available
Data generated by cars is growing at an unprecedented scale. As cars gradually become part of the Internet of Things (IoT) ecosystem, several stakeholders discover the value of in-vehicle network logs containing the measurements of the multitude of sensors deployed within the car. This wealth of data is also expected to be exploitable by third part...
Conference Paper
Full-text available
Data generated by cars is growing at an unprecedented scale. As cars gradually become part of the Internet of Things (IoT) ecosystem, several stakeholders discover the value of in-vehicle network logs containing the measurements of the multitude of sensors deployed within the car. This wealth of data is also expected to be exploitable by third part...
Preprint
Full-text available
Data generated by cars is growing at an unprecedented scale. As cars gradually become part of the Internet of Things (IoT) ecosystem, several stakeholders discover the value of in-vehicle network logs containing the measurements of the multitude of sensors deployed within the car. This wealth of data is also expected to be exploitable by third part...
Conference Paper
Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of Circular Economy. In this paper, we assess existing SE services and identify their challenges in areas that are not technically connected to their core...
Article
Full-text available
Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have the necessary data to train a reasonably accurate model. For such organizat...
Preprint
Full-text available
Data is the new oil for the car industry. Cars generate data about how they are used and who is behind the wheel which gives rise to a novel way of profiling individuals. Several prior works have successfully demonstrated the feasibility of driver re-identification using the in-vehicle network data captured on the vehicles CAN (Controller Area Netw...
Conference Paper
Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have enough data to train a reasonably accurate model. For such organizations, a...
Article
Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the applications nor by Facebook and they have not given consent. This paper presents a detailed multi-faceted study on the collateral information collection...
Chapter
This chapter presents important challenges, opportunities and operational, business‐ and customer‐centric aspects of single‐ and multi‐operator Internet Protocol television (IPTV) services in 5G networks. It provides an example that suggests ways of enabling end‐user interaction needed to align the customer's expectations with what is offered. The...
Preprint
Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the applications nor by Facebook, and they have not given consent. This paper presents a detailed multi-faceted study of the collateral information collectio...
Chapter
Full-text available
The fifth generation of mobile networks (5G) will support new business and service models. A particular model of business and technical interest is multi-operator service orchestration, where service chains are created dynamically with coordination across multiple administrative domains. In such a scenario, resource sharing among operators is expec...
Article
Full-text available
Foreseen 5G verticals hold the promise of being true value-added services, hence bringing significant income to their respective providers. However, the nature of these verticals are very demanding in terms of both economic and technical requirements, such as multi-operator cooperation, end-to-end quality assurance, and the unified orchestration of...
Conference Paper
Full-text available
A majority of 5G verticals have the potential togenerate large revenues, but are expected to have strict Qualityof Service (QoS) guarantees, and are projected to be delivered asa service chain of multiple, independent operators. Such multi-operator service delivery requires a set of interdependent ServiceLevel Agreements (SLAs) between operators. T...
Article
Full-text available
Over the last couple of years, industry operators' associations issued requirements towards an end-to-end management and orchestration plane for 5G networks. Consequently, standard organisations started their activities in this domain. This article provides an analysis and an architectural survey of these initiatives and of the main requirements, p...
Conference Paper
Third-party apps enable a personalized experience on social networking platforms; however, they give rise to privacy interdependence issues. Apps installed by a user’s friends can collect and potentially misuse her personal data inflicting collateral damage on the user while leaving her without proper means of control. In this paper, we present a m...
Conference Paper
Full-text available
Article
Full-text available
Global navigation systems and location-based services have found their way into our daily lives. Recently, indoor positioning techniques have also been proposed, and there are several live or trial systems already operating. In this paper, we present insights from MazeMap, the first live indoor/outdoor positioning and navigation system deployed at...
Article
Communication networks have to provide a high level of availability and instantaneous recovery after failures in order to ensure sufficient survivability for mission-critical services. Currently, dedicated path protection (or 1 + 1) is implemented in backbone networks to provide the necessary resilience and instantaneous recovery against single lin...
Article
The increasing popularity of both small and large private clouds and expanding public clouds poses new requirements to data center (DC) architectures. First, DC architectures should be incrementally scalable allowing the creation of DCs of arbitrary size with consistent performance characteristics. Second, initial DC deployments should be increment...
Article
Full-text available
Current trends in cloud computing suggest that both large, public clouds and small, private clouds will proliferate in the near future. Operational requirements, such as high bandwidth, dependability and smooth manageability, are similar for both types of clouds and their underlying data center architecture. Such requirements can be satisfied with...
Conference Paper
Full-text available
Users share massive amounts of personal information and opinion with each other and different service providers every day. In such an interconnected setting, the privacy of individual users is bound to be affected by the decisions of others, giving rise to the phenomenon which we term as interdependent privacy. In this paper we define online privac...
Chapter
Full-text available
Federated testbeds for future Internet experimentation have been de-ployed worldwide to enable large scale and diverse experiments with future In-ternet technologies ranging from components to complete systems. They serve the purpose of validating new solutions to identified problems and to compare them with current or other evolving solutions. The...
Article
Greedy navigability is a central issue in the theory of networks. However, the exogenous nature of network models do not allow for describing how greedy routable-networks emerge in reality. In turn, network formation games focus on the very emergence proess, but the applied shortest-path based cost functions exclude navigational aspects. This paper...
Conference Paper
Full-text available
Communication networks have to provide a high level of resilience in order to ensure sufficient Quality of Service for mission-critical services. Currently, dedicated 1+1 path protection is implemented in backbone networks to provide the necessary resilience. On the other hand, there are several possible realization strategies for 1+1 path protecti...
Conference Paper
Full-text available
Current trends in cloud computing suggest that both large, public clouds and small, private clouds will proliferate in the near future. Operational requirements, such as high bandwidth, dependability and smooth manageability, are similar for both types of clouds and their underlying data center architecture. Such requirements can be satisfied with...
Article
Full-text available
ICT services markets function as an arena for deployment and diffusion of new ICT services. Such markets are characterized by dynamic and temporal competition between the providers of ICT services. New service providers enter the market as others fail to generate enough profit and leave the market, while market leaders often come and go as the mark...
Technical Report
Full-text available
This document describes different experiment control frameworks currently under de- velopment on the context of the OpenLab project, and provides a global view of the interactions with other OpenLab components. It presents two experiment use cases that will be conducted as part of OpenLab to evaluate the feasibility and the usefulness of the tools...
Article
Full-text available
This article quantifies the global carbon footprint of mobile communication systems, and discusses its ecological and economic implications. Using up-to-date data and life cycle assessment models, we predict an increase of CO2 equivalent emissions by a factor of three until 2020 compared to 2007, rising from about 86 to 235 Mto CO2e, suggesting a s...
Article
The wireless community networking paradigm shows great promise in achieving a global status. However, in creating a “global wireless village”, both user participation and support from traditional Internet Service Providers (ISPs) are key ingredients; for this end a viable incentive system is essential. In this paper we investigate the economic inte...
Conference Paper
Currently, the vast majority of mobile subscribers rely on second-generation mobile technologies, but service providers are investing into aggressive rollouts of mobile broadband networks to deliver a fully-featured wireless Internet. While the main focus in research has been put on enhancing the capacity of this kind of networks, very little has b...
Conference Paper
Full-text available
Mobile communications are increasingly contributing to global energy consumption. The EARTH (Energy Aware Radio and neTworking tecHnologies) project tackles the important issue of reducing CO<sub>2</sub> emissions by enhancing the energy efficiency of cellular mobile networks. EARTH is a holistic approach to develop a new generation of energy effic...
Article
Socio-economic aspects of future communication networks such as pricing models for network providers, network neutrality, and Quality of Experience (QoE) are becoming more and more important as the convergence of networks is in progress. All the above areas share a common interest: the deeper understanding of user behavior. In this paper, as a firs...
Conference Paper
Full-text available
The popularity of online multiplayer games is ever-growing. Traditionally, networked games have relied on the client-server model for information sharing among players, putting a tremendous burden on the server and creates a single point of failure. Recently, there have been efforts to employ the peer-to-peer paradigm for gaming purposes, however,...
Article
Full-text available
We are all used to the way we pay for our Internet expe-rience. We buy 'connectivity' from our local Internet Ser-vice Provider (ISP) and then consume a variety of Internet-based services. Some of these charge additional fees, mostly without any service guarantee. Numerous efforts have been undertaken to provide price differentiation in the Interne...
Conference Paper
Emerging broadband mobile cellular networks are inherently heterogeneous due to the co-existence of multiple wireless access technologies. In such a network sudden capacity changes are bound to happen due to inter-system handovers, user mobility and flow dynamics. Existing congestion control protocols are shown to deal sufficiently with capacity dr...
Conference Paper
Full-text available
Proper pricing schemes are vital components to the continuing success of the Internet. In this paper, we propose a new pricing scheme for Internet access called user-influenced pricing. Our main contribution is threefold: first, we show how user-influenced pricing can provide the ISP with calculable revenues, while giving the users a chance to lowe...
Article
Full-text available
The wireless community networking paradigm shows great promise in achieving a global status. However, both user participation and support from traditional Internet Service Providers (ISPs) play key roles in creating worldwide coverage; for this end a viable incen-tive system is essential. In this paper we study the economic inter-actions between us...
Conference Paper
Full-text available
ABSTRACT In this paper we,investigate the impact of customer loy- alty on the price competition between local Internet Service Providers who,sell Internet access to end-users. The main contribution of this paper is threefold. First, we develop a repeated game, and show how cooperation between ISPs resulting in higher profits can be enforced through...
Article
Full-text available
The net neutrality issue is far from being only a theoretical and legal playing field. Internet Service Providers (ISPs) all over the world deploy middleboxes able to filter, shape, and poison certain traffic flows. We propose an end-host based monitoring service capable of detecting such biased network behavior. By using this service users will be...
Conference Paper
Full-text available
We analyse throughput adaptation of high-speed TCP protocols during handovers in an emulation testbed. We use emulation characteristics reflecting current mobile networks and future network specifications as set by the relevant standards. We found that the performance of TCP protocols is satisfactory, except as follows. Traditional loss-based TCP-s...
Chapter
Full-text available
In this paper we present the SAMSON (Smart Address Management in Self-Organizing Networks) protocol, which is a simple and effective solution for assigning unique addresses to nodes of a MANET. Our protocol reduces the configuration time of arriving nodes by optimizing the number of configuration messages and the number of hops the configuration me...
Conference Paper
Full-text available
This paper proposes a middleware that creates a dynamically changeable, but uniform computing environment for personal area networks (PANs). The middleware hides the physical scatteredness and the dynamically changing configuration of the PAN and presents its capabilities as a single computer. Using the uniform application programming interface (AP...
Conference Paper
Full-text available
The expected growth in the number of communicating wireless devices claims for a more effective utilization of widespread wireless technologies, like WiFi. In this paper we propose an addressing and routing network architecture that uses multi-hop access to extend the range of managed wireless networks. It provides a scalable and controllable solut...
Conference Paper
Full-text available
Lookup operations in CAN might take a long time, as requests are passed only to direct neighbors. Realities ease this problem, but their random nature does not ensure fairness between participating nodes. In this paper we propose multiple levels of long range neighbors, called Reference Points (RPs), placed in a deterministic manner. Their location...
Article
Full-text available
In this article, we give a short overview on wireless access networks and the BRAIN Candidate Mobility Protocol (BCMP). The two different handover mechanisms of BCMP are introduced. With the help of standard network tools and an own measurement program, latencies caused by both kind of handovers were examined. We show that latency values are largel...
Article
Full-text available
One of the main characteristics of future networks will be the considerable increase in the number of communicating entities; PCs and laptops, but also PDAs, 3G phones, sensors, wearable devices, etc., will all connect to and communicate with each other, to form large-scale intelligent networks, integrating different technologies. On the other hand...
Chapter
Full-text available
This paper presents the detailed description of the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), which is designed to ease distributed service development for mobile and nomadic environment. This middleware provides a uniform computing environment for distributed applications that operate in dynamically changing pe...
Article
Full-text available
This paper presents the Middleware for Applica-tion Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dynamically changing personal area networks (PANs). The middleware hides the physical scatteredness and device configuration of the PAN and presents its capabilities as a sin...
Article
Full-text available
Fighting packet loss in optical packet-switched networks has been a priority in the optical research community in recent years. In this short paper, we present a scheme which utilizes both forward error correction at the ingress node and in-network coding at intermediary optical packet switches to reduce packet loss due to contention at the network...

Network