首页 > 最新文献

2017 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks IEEE 802.15.4-2015 TSCH网络中链路质量和基于路径的聚类
Pub Date : 2017-09-04 DOI: 10.1109/ISCC.2017.8024625
A. Mavromatis, Georgios Z. Papadopoulos, Xenofon Fafoutis, A. Goulianos, G. Oikonomou, P. Chatzimisios, T. Tryfonas
Advance clustering techniques have been widely used in Wireless Sensor Networks (WSNs) since they can potentially reduce latency, improve scheduling, decrease end-to-end delay and optimise energy consumption within a dense network topology. In this paper, we present a novel clustering algorithm for high density IEEE 802.15.4-2015 Time-Slotted Channel Hopping (TSCH). In particular, the proposed methodology merges a variety of solutions into an integrated clustering design. Assuming an homogeneous network distribution, the proposed configuration deploys a hierarchical down-top approach of equally numbered sub-groups, in which the formation of the separate sub-groups is adapted to the network density and the node selection metric is based on the link quality indicator. The presented algorithm is implemented in Contiki Operating System (OS) and several test vectors have been designed in order to evaluate the performance of the proposed algorithm in a COOJA simulation environment. Performance results demonstrate the capability of the clustering structure since compared to the default scheme it significantly improves the energy efficiency up to 35%, packet drops more than 40% as well the packet retransmission rate. Last but not least, the outcome of this study indicates a major increase in the network lifetime, i.e., up to 50%.
先进的聚类技术已广泛应用于无线传感器网络(wsn),因为它们可以潜在地减少延迟,改进调度,减少端到端延迟,并在密集的网络拓扑结构中优化能耗。在本文中,我们提出了一种新的高密度IEEE 802.15.4-2015时隙信道跳频(TSCH)聚类算法。特别地,提出的方法将各种解决方案合并到一个集成的集群设计中。假设网络分布均匀,所提出的配置采用等量子组的自上而下分层方法,其中独立子组的形成适应网络密度,节点选择度量基于链路质量指标。提出的算法在Contiki操作系统(OS)上实现,并设计了几个测试向量,以评估该算法在COOJA仿真环境中的性能。性能结果证明了集群结构的能力,因为与默认方案相比,它显著提高了能源效率高达35%,数据包下降超过40%,数据包重传率也有所提高。最后但并非最不重要的是,本研究的结果表明网络生命周期大幅增加,即高达50%。
{"title":"Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks","authors":"A. Mavromatis, Georgios Z. Papadopoulos, Xenofon Fafoutis, A. Goulianos, G. Oikonomou, P. Chatzimisios, T. Tryfonas","doi":"10.1109/ISCC.2017.8024625","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024625","url":null,"abstract":"Advance clustering techniques have been widely used in Wireless Sensor Networks (WSNs) since they can potentially reduce latency, improve scheduling, decrease end-to-end delay and optimise energy consumption within a dense network topology. In this paper, we present a novel clustering algorithm for high density IEEE 802.15.4-2015 Time-Slotted Channel Hopping (TSCH). In particular, the proposed methodology merges a variety of solutions into an integrated clustering design. Assuming an homogeneous network distribution, the proposed configuration deploys a hierarchical down-top approach of equally numbered sub-groups, in which the formation of the separate sub-groups is adapted to the network density and the node selection metric is based on the link quality indicator. The presented algorithm is implemented in Contiki Operating System (OS) and several test vectors have been designed in order to evaluate the performance of the proposed algorithm in a COOJA simulation environment. Performance results demonstrate the capability of the clustering structure since compared to the default scheme it significantly improves the energy efficiency up to 35%, packet drops more than 40% as well the packet retransmission rate. Last but not least, the outcome of this study indicates a major increase in the network lifetime, i.e., up to 50%.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133679422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The use of predictive models in dynamic treatment planning 预测模型在动态治疗计划中的应用
Pub Date : 2017-09-04 DOI: 10.1109/ISCC.2017.8024536
Saemundur O. Haraldsson, Ragnheidur D. Brynjolfsdottir, J. Woodward, K. Siggeirsdottir, V. Gudnason
With the expanding load on healthcare and consequent strain on budget, the demand for tools to increase efficiency in treatments is rising. The use of prediction models throughout the treatment to identify risk factors might be a solution. In this paper we present a novel implementation of a prediction tool and the first use of a dynamic predictor in vocational rehabilitation practice. The tool is periodically updated and improved with Genetic Improvement of software. The predictor has been in use for 10 months and is evaluated on predictions made during that time by comparing them with actual treatment outcome. The results show that the predictions have been consistently accurate throughout the patients' treatment. After approximately 3 week learning phase, the predictor classified patients with 100% accuracy and precision on previously unseen data. The predictor is currently being successfully used in a complex live system where specialists have used it to make informed decisions.
随着医疗保健负担的不断扩大和随之而来的预算压力,对提高治疗效率的工具的需求正在上升。在整个治疗过程中使用预测模型来识别风险因素可能是一种解决方案。在本文中,我们提出了一个新的实现预测工具和第一次使用的动态预测在职业康复实践。该工具通过软件的遗传改进定期更新和改进。该预测器已经使用了10个月,并通过将其与实际治疗结果进行比较,对这段时间内的预测进行评估。结果表明,在患者的整个治疗过程中,预测一直是准确的。经过大约3周的学习阶段,预测器对患者进行了100%的准确和精确的分类。该预测器目前已成功应用于一个复杂的现场系统,专家们已经使用它来做出明智的决策。
{"title":"The use of predictive models in dynamic treatment planning","authors":"Saemundur O. Haraldsson, Ragnheidur D. Brynjolfsdottir, J. Woodward, K. Siggeirsdottir, V. Gudnason","doi":"10.1109/ISCC.2017.8024536","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024536","url":null,"abstract":"With the expanding load on healthcare and consequent strain on budget, the demand for tools to increase efficiency in treatments is rising. The use of prediction models throughout the treatment to identify risk factors might be a solution. In this paper we present a novel implementation of a prediction tool and the first use of a dynamic predictor in vocational rehabilitation practice. The tool is periodically updated and improved with Genetic Improvement of software. The predictor has been in use for 10 months and is evaluated on predictions made during that time by comparing them with actual treatment outcome. The results show that the predictions have been consistently accurate throughout the patients' treatment. After approximately 3 week learning phase, the predictor classified patients with 100% accuracy and precision on previously unseen data. The predictor is currently being successfully used in a complex live system where specialists have used it to make informed decisions.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Uncertainty-driven ensemble forecasting of QoS in Software Defined Networks 软件定义网络中QoS的不确定性驱动集成预测
Pub Date : 2017-09-04 DOI: 10.1109/ISCC.2017.8024701
Kostas Kolomvatsos, C. Anagnostopoulos, Angelos K. Marnerides, Q. Ni, S. Hadjiefthymiades, D. Pezaros
Software Defined Networking (SDN) is the key technology for combining networking and Cloud solutions to provide novel applications. SDN offers a number of advantages as the existing resources can be virtualized and orchestrated to provide new services to the end users. Such a technology should be accompanied by powerful mechanisms that ensure the end-to-end quality of service at high levels, thus, enabling support for complex applications that satisfy end users needs. In this paper, we propose an intelligent mechanism that agglomerates the benefits of SDNs with real-time “Big Data” forecasting analytics. The proposed mechanism, as part of the SDN controller, supports predictive intelligence by monitoring a set of network performance parameters, forecasting their future values, and deriving indications on potential service quality violations. By treating the performance measurements as time-series, our mechanism employs a novel ensemble forecasting methodology to estimate their future values. Such predictions are fed to a Type-2 Fuzzy Logic system to deliver, in real-time, decisions related to service quality violations. Such decisions proactively assist the SDN controller for providing the best possible orchestration of the virtualized resources. We evaluate the proposed mechanism w.r.t. precision and recall metrics over synthetic data.
软件定义网络(SDN)是将网络和云解决方案相结合以提供新颖应用的关键技术。SDN提供了许多优势,因为可以对现有资源进行虚拟化和编排,以向最终用户提供新的服务。这种技术应该伴随着强大的机制,以确保高水平的端到端服务质量,从而支持满足最终用户需求的复杂应用程序。在本文中,我们提出了一种智能机制,将sdn的优势与实时“大数据”预测分析结合起来。提议的机制,作为SDN控制器的一部分,通过监视一组网络性能参数,预测它们的未来值,并得出潜在服务质量违规的指示,来支持预测智能。通过将绩效测量视为时间序列,我们的机制采用了一种新颖的集合预测方法来估计其未来值。这样的预测被输入到2型模糊逻辑系统中,以实时地提供与服务质量违规相关的决策。这样的决策主动地帮助SDN控制器提供虚拟化资源的最佳编排。我们评估了所提出的机制w.r.t.精度和召回指标在合成数据。
{"title":"Uncertainty-driven ensemble forecasting of QoS in Software Defined Networks","authors":"Kostas Kolomvatsos, C. Anagnostopoulos, Angelos K. Marnerides, Q. Ni, S. Hadjiefthymiades, D. Pezaros","doi":"10.1109/ISCC.2017.8024701","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024701","url":null,"abstract":"Software Defined Networking (SDN) is the key technology for combining networking and Cloud solutions to provide novel applications. SDN offers a number of advantages as the existing resources can be virtualized and orchestrated to provide new services to the end users. Such a technology should be accompanied by powerful mechanisms that ensure the end-to-end quality of service at high levels, thus, enabling support for complex applications that satisfy end users needs. In this paper, we propose an intelligent mechanism that agglomerates the benefits of SDNs with real-time “Big Data” forecasting analytics. The proposed mechanism, as part of the SDN controller, supports predictive intelligence by monitoring a set of network performance parameters, forecasting their future values, and deriving indications on potential service quality violations. By treating the performance measurements as time-series, our mechanism employs a novel ensemble forecasting methodology to estimate their future values. Such predictions are fed to a Type-2 Fuzzy Logic system to deliver, in real-time, decisions related to service quality violations. Such decisions proactively assist the SDN controller for providing the best possible orchestration of the virtualized resources. We evaluate the proposed mechanism w.r.t. precision and recall metrics over synthetic data.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123519487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Reactive Security Framework for operational wind parks using Service Function Chaining 使用服务功能链的运营风电场响应式安全框架
Pub Date : 2017-09-04 DOI: 10.1109/ISCC.2017.8024604
Konstantinos Fysarakis, N. Petroulakis, Andreas Roos, Khawar Abbasi, P. Vizarreta, George P. Petropoulos, Ermin Sakic, G. Spanoudakis, Ioannis G. Askoxylakis
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional security mechanisms. A wind park is a good example of an industrial application relying on a network with strict performance, security, and reliability requirements, and was chosen as a representative example of industrial systems. This work highlights the benefit of leveraging the flexibility of SDN/NFV-enabled networks to deploy enhanced, reactive security mechanisms for the protection of the industrial network, via the use of Service Function Chaining. Moreover, a proof of concept implementation of the reactive security framework for an industrial-grade wind park network is presented. The framework is equipped with SDN and Supervisory Control and Data Acquisition (SCADA) honeypots, modelled on (and deployable to) an actual, operating wind park, allowing continuous monitoring of the industrial network and detailed analysis of potential attacks, thus isolating attackers and enabling the assessment of their level of sophistication.
5G核心技术的创新应用,即软件定义网络(SDN)和网络功能虚拟化(NFV),可以帮助降低工业网络的资本和运营支出。然而,SDN扩展了通信基础设施的攻击面,因此需要引入额外的安全机制。风电场是工业应用依赖于对性能、安全性和可靠性有严格要求的网络的一个很好的例子,被选为工业系统的代表性例子。这项工作强调了利用支持SDN/ nfv的网络的灵活性的好处,通过使用业务功能链来部署增强的、反应性的安全机制,以保护工业网络。此外,还提出了用于工业级风电场网络的响应式安全框架的概念验证。该框架配备了SDN和监控与数据采集(SCADA)蜜罐,以实际运行的风力发电场为模型(并可部署),允许对工业网络进行持续监控,并对潜在攻击进行详细分析,从而隔离攻击者并评估其复杂程度。
{"title":"A Reactive Security Framework for operational wind parks using Service Function Chaining","authors":"Konstantinos Fysarakis, N. Petroulakis, Andreas Roos, Khawar Abbasi, P. Vizarreta, George P. Petropoulos, Ermin Sakic, G. Spanoudakis, Ioannis G. Askoxylakis","doi":"10.1109/ISCC.2017.8024604","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024604","url":null,"abstract":"The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional security mechanisms. A wind park is a good example of an industrial application relying on a network with strict performance, security, and reliability requirements, and was chosen as a representative example of industrial systems. This work highlights the benefit of leveraging the flexibility of SDN/NFV-enabled networks to deploy enhanced, reactive security mechanisms for the protection of the industrial network, via the use of Service Function Chaining. Moreover, a proof of concept implementation of the reactive security framework for an industrial-grade wind park network is presented. The framework is equipped with SDN and Supervisory Control and Data Acquisition (SCADA) honeypots, modelled on (and deployable to) an actual, operating wind park, allowing continuous monitoring of the industrial network and detailed analysis of potential attacks, thus isolating attackers and enabling the assessment of their level of sophistication.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Biologically relevant simulations for validating risk models under small-sample conditions 在小样本条件下验证风险模型的生物学相关模拟
Pub Date : 2017-09-01 DOI: 10.1109/ISCC.2017.8024544
A. Bokov, Laura S. Manuel, Alfredo Tirado-Ramos, Jon A. Gelfond, S. Pletcher
In designing scientific experiments, power analysis is too often given a superficial treatment— choice of sample size is often made based on idealized distributions and simplistic tests that do not reflect the real-world constraints under which the actual data will be collected. We have developed a general Monte Carlo framework for two-group comparisons which samples points from a two-dimensional parameter space and at each point generates simulated datasets which are compared to simulated datasets for a “control group” at a fixed point in the parameter space. Rather than uniformly sampling this parameter space, our algorithm rapidly converges on a contour corresponding to the smallest detectable difference for the sample size of interest.
在设计科学实验时,功率分析往往被肤浅地对待——样本大小的选择往往是基于理想化的分布和简单的测试,而这些分布和测试并不反映收集实际数据的现实世界的限制。我们开发了一个通用的蒙特卡罗框架,用于两组比较,该框架从二维参数空间中采样点,并在每个点生成模拟数据集,这些数据集与参数空间中固定点的“对照组”的模拟数据集进行比较。我们的算法不是对该参数空间进行统一采样,而是快速收敛到与感兴趣的样本量的最小可检测差异对应的轮廓上。
{"title":"Biologically relevant simulations for validating risk models under small-sample conditions","authors":"A. Bokov, Laura S. Manuel, Alfredo Tirado-Ramos, Jon A. Gelfond, S. Pletcher","doi":"10.1109/ISCC.2017.8024544","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024544","url":null,"abstract":"In designing scientific experiments, power analysis is too often given a superficial treatment— choice of sample size is often made based on idealized distributions and simplistic tests that do not reflect the real-world constraints under which the actual data will be collected. We have developed a general Monte Carlo framework for two-group comparisons which samples points from a two-dimensional parameter space and at each point generates simulated datasets which are compared to simulated datasets for a “control group” at a fixed point in the parameter space. Rather than uniformly sampling this parameter space, our algorithm rapidly converges on a contour corresponding to the smallest detectable difference for the sample size of interest.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130349622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An effective Stackelberg game for high-assurance of data trustworthiness in WSNs 基于Stackelberg博弈的无线传感器网络数据可信度高保证算法
Pub Date : 2017-09-01 DOI: 10.1109/ISCC.2017.8024697
Mohamed S. Abdalzaher, Karim G. Seddik, O. Muta
Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to that considered in the previous work; this attack scenario frequently manipulates sets of the deployed nodes in the PGN, which cannot be treated using the previously proposed approach. Our proposed scheme reduces the required number of nodes to be protected to achieve the desired data trustworthiness. Simulation results prove efficient detection for corrupted transmitted data based on limited number of nodes as compared to the previously proposed approach.
无线传感器网络(Wireless Sensor network, WSNs)的安全性对保证数据的高效传输、稳定的网络拓扑结构和鲁棒的路由算法起着内在的作用。在本文中,我们提出了一种改进的Stackelberg对策,用于电网(PGN)数据可信度的高保证。与以前的工作相比,提出的方法可以缓解更严重的攻击场景;这种攻击场景经常操纵PGN中部署的节点集,这不能使用前面提出的方法来处理。我们提出的方案减少了需要保护的节点数量,以达到所需的数据可信度。仿真结果表明,与之前提出的方法相比,基于有限节点数的方法可以有效地检测传输数据的损坏。
{"title":"An effective Stackelberg game for high-assurance of data trustworthiness in WSNs","authors":"Mohamed S. Abdalzaher, Karim G. Seddik, O. Muta","doi":"10.1109/ISCC.2017.8024697","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024697","url":null,"abstract":"Wireless Sensor Networks (WSNs) security plays an intrinsic role to guarantee efficient data transmission, stable network topologies, and robust routing algorithms. In this paper, we propose a modified Stackelberg game of a previous work for high assurance of data trustworthiness in a Power Grid Network (PGN). The proposed approach is presented to mitigate a more severe attack scenario compared to that considered in the previous work; this attack scenario frequently manipulates sets of the deployed nodes in the PGN, which cannot be treated using the previously proposed approach. Our proposed scheme reduces the required number of nodes to be protected to achieve the desired data trustworthiness. Simulation results prove efficient detection for corrupted transmitted data based on limited number of nodes as compared to the previously proposed approach.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks 无线传感器网络中高优先级数据可信度最大化的重复博弈方法
Pub Date : 2017-09-01 DOI: 10.1109/ISCC.2017.8024586
Mohamed S. Abdalzaher, Karim G. Seddik, O. Muta
Due to the fast boom of security threats in wireless sensor networks (WSNs) sensitive applications, we propose a game-theoretic protection approach for sensor nodes in a clustered WSN based on a repeated game. The proposed game model is developed for detecting malicious sensor nodes that drop the high priority packets (HPPs) aiming at maximizing the high priority data trustworthiness (HPT). Simulation results indicate the improved HPT of the proposed protection model which attains the Pareto optimal HPT as compared to a non-cooperative defense mechanism.
针对无线传感器网络敏感应用中安全威胁的快速增长,提出了一种基于重复博弈的集群无线传感器网络中传感器节点的博弈论保护方法。该博弈模型用于检测丢弃高优先级数据包(HPPs)的恶意传感器节点,目的是最大化高优先级数据可信度(HPT)。仿真结果表明,与非合作防御机制相比,该保护模型的改进HPT达到了Pareto最优HPT。
{"title":"Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks","authors":"Mohamed S. Abdalzaher, Karim G. Seddik, O. Muta","doi":"10.1109/ISCC.2017.8024586","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024586","url":null,"abstract":"Due to the fast boom of security threats in wireless sensor networks (WSNs) sensitive applications, we propose a game-theoretic protection approach for sensor nodes in a clustered WSN based on a repeated game. The proposed game model is developed for detecting malicious sensor nodes that drop the high priority packets (HPPs) aiming at maximizing the high priority data trustworthiness (HPT). Simulation results indicate the improved HPT of the proposed protection model which attains the Pareto optimal HPT as compared to a non-cooperative defense mechanism.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An advertising revenue model for access ISPs 接入互联网服务提供商的广告收入模型
Pub Date : 2017-07-04 DOI: 10.1109/ISCC.2017.8024591
Pradeep Bangera, Syed Hasan, Sergey Gorinsky
Faced with the unrelenting traffic growth and rising costs, access ISPs (Internet Service Providers) realize that their traditional revenue model of flat subscription fees is unsustainable. Regulatory concerns, e.g., about content-specific charging, constrain the ISPs' search for new revenue sources. This paper analyzes a revenue model where an access ISP acts as a publisher of ads to users who explicitly opt for an ad-sponsored access plan of the ISP. First, we conduct a survey showing a substantial interest of users in ad-sponsored Internet access. Then, we mathematically characterize the advertising revenue model and asses its economic feasibility based on real data from two access ISPs and an ad publisher. While the ad revenues are tangible, they do not completely cover the costs of the access ISPs. Even in relative terms, a larger access ISP benefits more from the advertising, with the ad revenues covering up to 50% of the ISP's capital expenditure. Complementing the subscription fees, the access ISPs can leverage the ad revenues to meaningfully incentivize the users with better Internet connectivity, such as 6–9 Mbps in extra data rates or 12–20 GB in extra data caps for the two considered ISPs.
面对不断增长的流量和不断上涨的成本,互联网服务提供商(isp)意识到他们传统的固定订阅费用的收入模式是不可持续的。监管方面的担忧,例如针对特定内容的收费,限制了互联网服务提供商寻找新的收入来源。本文分析了一个收入模型,其中接入ISP作为广告发布者,向明确选择该ISP的广告赞助接入计划的用户发布广告。首先,我们进行了一项调查,显示用户对广告赞助的互联网接入有很大的兴趣。然后,我们在数学上描述了广告收入模型,并基于两个接入isp和一个广告发布商的真实数据评估了其经济可行性。虽然广告收入是有形的,但它们并不能完全覆盖接入互联网服务提供商的成本。即使相对而言,更大的互联网服务提供商从广告中获益更多,广告收入占互联网服务提供商资本支出的50%。作为订阅费用的补充,接入互联网服务提供商可以利用广告收入有意义地激励用户提供更好的互联网连接,例如为两个考虑的互联网服务提供商提供6-9 Mbps的额外数据速率或12-20 GB的额外数据上限。
{"title":"An advertising revenue model for access ISPs","authors":"Pradeep Bangera, Syed Hasan, Sergey Gorinsky","doi":"10.1109/ISCC.2017.8024591","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024591","url":null,"abstract":"Faced with the unrelenting traffic growth and rising costs, access ISPs (Internet Service Providers) realize that their traditional revenue model of flat subscription fees is unsustainable. Regulatory concerns, e.g., about content-specific charging, constrain the ISPs' search for new revenue sources. This paper analyzes a revenue model where an access ISP acts as a publisher of ads to users who explicitly opt for an ad-sponsored access plan of the ISP. First, we conduct a survey showing a substantial interest of users in ad-sponsored Internet access. Then, we mathematically characterize the advertising revenue model and asses its economic feasibility based on real data from two access ISPs and an ad publisher. While the ad revenues are tangible, they do not completely cover the costs of the access ISPs. Even in relative terms, a larger access ISP benefits more from the advertising, with the ad revenues covering up to 50% of the ISP's capital expenditure. Complementing the subscription fees, the access ISPs can leverage the ad revenues to meaningfully incentivize the users with better Internet connectivity, such as 6–9 Mbps in extra data rates or 12–20 GB in extra data caps for the two considered ISPs.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber-healthcare cloud computing interoperability using the HL7-CDA standard 使用HL7-CDA标准的网络医疗云计算互操作性
Pub Date : 2017-07-03 DOI: 10.1109/ISCC.2017.8024513
C. Lubamba, A. Bagula
The HL7 standard was initially designed to enable interoperability of healthcare information within large hospitals. HL7's focus has recently been extended to regional healthcare cloud infrastructures but not yet reached the lightweight fog infrastructures emerging from niche healthcare areas such as body area networks (BANs) and the massive flow of personal medical records resulting from off-the-shelf e-health devices and networks. This paper addresses the issue of interoperability between fog and cloud computing platforms by i) proposing a framework for a standardized exchange of information between healthcare entities ii) designing and implementing a software tool to be integrated into medical data dissemination protocols to ensure interoperability and iii) evaluating the impact of the software tool on the transport of data when exchanging healthcare information using “in-band” and “out-band” transport over the IEEE802.15.4/ZigBee and WiFi protocols. Our results reveal that, for the lightweight devices used by fog infrastructures, “out-band” transport over WiFi with edge data translation into HL7 records is a better option than “in-band” transport.
HL7标准最初的设计目的是实现大型医院内医疗保健信息的互操作性。HL7的重点最近已扩展到区域医疗保健云基础设施,但尚未涉及从身体区域网络(BANs)等利基医疗保健领域出现的轻量级雾基础设施,以及由现成的电子医疗设备和网络产生的大量个人医疗记录流。本文通过以下方式解决雾计算平台和云计算平台之间的互操作性问题:(1)提出医疗保健实体之间标准化信息交换的框架;(2)设计和实施集成到医疗数据传播协议中的软件工具,以确保互操作性;(3)在使用网络上的“带内”和“带外”传输交换医疗保健信息时,评估软件工具对数据传输的影响IEEE802.15.4/ZigBee和WiFi协议。我们的研究结果表明,对于雾基础设施使用的轻型设备,通过WiFi将边缘数据转换为HL7记录的“带外”传输是比“带内”传输更好的选择。
{"title":"Cyber-healthcare cloud computing interoperability using the HL7-CDA standard","authors":"C. Lubamba, A. Bagula","doi":"10.1109/ISCC.2017.8024513","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024513","url":null,"abstract":"The HL7 standard was initially designed to enable interoperability of healthcare information within large hospitals. HL7's focus has recently been extended to regional healthcare cloud infrastructures but not yet reached the lightweight fog infrastructures emerging from niche healthcare areas such as body area networks (BANs) and the massive flow of personal medical records resulting from off-the-shelf e-health devices and networks. This paper addresses the issue of interoperability between fog and cloud computing platforms by i) proposing a framework for a standardized exchange of information between healthcare entities ii) designing and implementing a software tool to be integrated into medical data dissemination protocols to ensure interoperability and iii) evaluating the impact of the software tool on the transport of data when exchanging healthcare information using “in-band” and “out-band” transport over the IEEE802.15.4/ZigBee and WiFi protocols. Our results reveal that, for the lightweight devices used by fog infrastructures, “out-band” transport over WiFi with edge data translation into HL7 records is a better option than “in-band” transport.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117045812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Optimised CSMA/CA protocol for safety messages in vehicular ad-hoc networks 优化CSMA/CA协议,用于车载自组织网络中的安全消息
Pub Date : 2017-07-03 DOI: 10.1109/ISCC.2017.8024608
Giorgia V. Rossi, K. Leung
Vehicular ad-hoc networks (VANETs) that enable communication among vehicles have recently attracted significant interest from researchers, due to the range of practical applications they can facilitate, particularly related to road safety. Despite the stringent performance requirements for such applications, the IEEE 802.11p standard still uses the carrier sensing medium access/collision avoidance (CSMA/CA) protocol. The latter when used in broadcast fashion employs a randomly selected backoff period from a fixed contention window (CW) range, which can cause performance degradation as a result of vehicular density changes. Concerns regarding the robustness and adaptiveness of protocols to support time-critical applications have been raised, which motivate this work. This paper investigates how the maximum CW size can be optimised to enhance performance based on vehicular density. A stochastic model is developed to obtain the optimal maximum CW that can be integrated in an amended CSMA/CA protocol to maximise the single-hop throughput among adjacent vehicles. Simulations confirm our optimised protocol can greatly improve the channel throughput and transmission delay performance, when compared to the standardised CSMA/CA, to support safety application in VANETs.
车辆自组织网络(VANETs)能够实现车辆之间的通信,最近引起了研究人员的极大兴趣,因为它们可以促进实际应用的范围,特别是与道路安全相关的应用。尽管对此类应用有严格的性能要求,但IEEE 802.11p标准仍然使用载波感应介质访问/避免碰撞(CSMA/CA)协议。当以广播方式使用时,后者采用从固定争用窗口(CW)范围随机选择的回退期,这可能由于车辆密度的变化而导致性能下降。对支持时间关键型应用的协议的鲁棒性和适应性的关注已经提出,这激发了这项工作。本文研究了如何根据车辆密度优化最大连续波尺寸以提高性能。建立了一个随机模型来获得最优的最大连续波,该模型可以集成到修改后的CSMA/CA协议中,以最大限度地提高相邻车辆之间的单跳吞吐量。仿真证实,与标准化的CSMA/CA相比,我们优化的协议可以大大提高信道吞吐量和传输延迟性能,以支持VANETs中的安全应用。
{"title":"Optimised CSMA/CA protocol for safety messages in vehicular ad-hoc networks","authors":"Giorgia V. Rossi, K. Leung","doi":"10.1109/ISCC.2017.8024608","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024608","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) that enable communication among vehicles have recently attracted significant interest from researchers, due to the range of practical applications they can facilitate, particularly related to road safety. Despite the stringent performance requirements for such applications, the IEEE 802.11p standard still uses the carrier sensing medium access/collision avoidance (CSMA/CA) protocol. The latter when used in broadcast fashion employs a randomly selected backoff period from a fixed contention window (CW) range, which can cause performance degradation as a result of vehicular density changes. Concerns regarding the robustness and adaptiveness of protocols to support time-critical applications have been raised, which motivate this work. This paper investigates how the maximum CW size can be optimised to enhance performance based on vehicular density. A stochastic model is developed to obtain the optimal maximum CW that can be integrated in an amended CSMA/CA protocol to maximise the single-hop throughput among adjacent vehicles. Simulations confirm our optimised protocol can greatly improve the channel throughput and transmission delay performance, when compared to the standardised CSMA/CA, to support safety application in VANETs.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2017 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1