首页 > 最新文献

2020 3rd International Conference on Hot Information-Centric Networking (HotICN)最新文献

英文 中文
Continuous Distributed Key Generation on Blockchain Based on BFT Consensus 基于BFT共识的区块链连续分布式密钥生成
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350834
Lei Lei, Ping Ma, C. Lan, L. Lin
VSS (Verifiable Secret Sharing) protocols are used in a number of block-chain systems, such as Dfinity and Ouroboros to generate unpredicted random number flow, they can be used to determine the proposer list and the voting powers of the voters at each height. To prevent random numbers from being predicted and attackers from corrupting a sufficient number of participants to violate the underlying trust assumptions, updatable VSS protocol in distributed protocols is important. The updatable VSS universal setup is also a hot topic in zkSNARKS protocols such as Sonic [19]. The way that we make it updatable is to execute the share exchange process repeatedly on chain, this process is challenging to be implemented in asynchronous network model, because it involves the wrong shares and the complaints, it requires the participant has the same view towards the qualified key generators, we take this process on chain and rely on BFT consensus mechanism to solve this. The group secret is thus updatable on chain. This is an enhancement to Dfinity. Therefore, even if all the coefficients of the random polynomials of epoch n are leaked, the attacker can use them only in epoch n+2. And the threshold group members of the DKG protocol can be updated along with the updates of the staked accounts and nodes.
VSS(可验证秘密共享)协议用于许多区块链系统,如definity和Ouroboros,以生成不可预测的随机数流,它们可用于确定提案者列表和每个高度的选民的投票权。为了防止随机数被预测,防止攻击者破坏足够数量的参与者来违反底层信任假设,分布式协议中的可更新VSS协议非常重要。可更新的VSS通用设置也是Sonic等zkSNARKS协议中的热门话题[19]。我们使其可更新的方式是在链上重复执行共享交换过程,这个过程在异步网络模型中实现是具有挑战性的,因为它涉及到错误的共享和投诉,它要求参与者对合格的密钥生成器有相同的看法,我们把这个过程放在链上,依靠BFT共识机制来解决这个问题。因此,组秘密可以在链上更新。这是对清晰度的增强。因此,即使n时期的随机多项式的所有系数都泄露了,攻击者也只能在n+2时期使用它们。DKG协议的阈值组成员可以随着权益账户和节点的更新而更新。
{"title":"Continuous Distributed Key Generation on Blockchain Based on BFT Consensus","authors":"Lei Lei, Ping Ma, C. Lan, L. Lin","doi":"10.1109/HotICN50779.2020.9350834","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350834","url":null,"abstract":"VSS (Verifiable Secret Sharing) protocols are used in a number of block-chain systems, such as Dfinity and Ouroboros to generate unpredicted random number flow, they can be used to determine the proposer list and the voting powers of the voters at each height. To prevent random numbers from being predicted and attackers from corrupting a sufficient number of participants to violate the underlying trust assumptions, updatable VSS protocol in distributed protocols is important. The updatable VSS universal setup is also a hot topic in zkSNARKS protocols such as Sonic [19]. The way that we make it updatable is to execute the share exchange process repeatedly on chain, this process is challenging to be implemented in asynchronous network model, because it involves the wrong shares and the complaints, it requires the participant has the same view towards the qualified key generators, we take this process on chain and rely on BFT consensus mechanism to solve this. The group secret is thus updatable on chain. This is an enhancement to Dfinity. Therefore, even if all the coefficients of the random polynomials of epoch n are leaked, the attacker can use them only in epoch n+2. And the threshold group members of the DKG protocol can be updated along with the updates of the staked accounts and nodes.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123043435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Secure Collaboration Platform for Sharing and Accessing Scientific Research Data 基于区块链的科研数据共享与访问安全协作平台
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350856
Afnan M. Alniamy, Hang Liu
Research teams or institutions in different countries need an effective and secure online platform for collaboration and data sharing. It is essential to build such a collaboration platform with strong data security and privacy. In this paper, we propose a platform for researchers to collaborate and share their data by leveraging attribute-based access control (ABAC) and blockchain technologies. ABAC provides an access control paradigm whereby access rights are granted to users through attribute-based policies, instead of user identities and roles. Hyperledger fabric permission blockchain is used to enable a decentralized secure data sharing environment and preserves user’s privacy. The proposed platform allows researchers to fully control their data, manage access to the data at a fine-grained level, keep file updates with proof of authorship, and ensure data integrity and privacy.
不同国家的研究团队或机构需要一个有效、安全的在线协作和数据共享平台。建立这样一个具有强大数据安全性和隐私性的协作平台至关重要。在本文中,我们提出了一个平台,供研究人员利用基于属性的访问控制(ABAC)和区块链技术进行协作和共享他们的数据。ABAC提供了一种访问控制范例,通过基于属性的策略(而不是用户身份和角色)将访问权限授予用户。Hyperledger fabric许可区块链用于实现分散的安全数据共享环境并保护用户隐私。提出的平台允许研究人员完全控制他们的数据,在细粒度级别管理对数据的访问,通过作者身份证明保持文件更新,并确保数据完整性和隐私。
{"title":"Blockchain-Based Secure Collaboration Platform for Sharing and Accessing Scientific Research Data","authors":"Afnan M. Alniamy, Hang Liu","doi":"10.1109/HotICN50779.2020.9350856","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350856","url":null,"abstract":"Research teams or institutions in different countries need an effective and secure online platform for collaboration and data sharing. It is essential to build such a collaboration platform with strong data security and privacy. In this paper, we propose a platform for researchers to collaborate and share their data by leveraging attribute-based access control (ABAC) and blockchain technologies. ABAC provides an access control paradigm whereby access rights are granted to users through attribute-based policies, instead of user identities and roles. Hyperledger fabric permission blockchain is used to enable a decentralized secure data sharing environment and preserves user’s privacy. The proposed platform allows researchers to fully control their data, manage access to the data at a fine-grained level, keep file updates with proof of authorship, and ensure data integrity and privacy.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127098239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pre-caching Mechanism of Video Stream Based on Hidden Markov Model in Vehicular Content Centric Network 车载内容中心网络中基于隐马尔可夫模型的视频流预缓存机制
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350830
Lin Yao, Z. Li, Wenyu Peng, Bin Wu, Weifeng Sun
Vehicular Content Centric Network (VCCN) enjoys advantages in effectiveness and convenience for content distribu- tion among vehicles, by adopting features of Content Centric Net- works into Vehicular Ad-Hoc Networks. However, the dynamic topology makes it difficult to establish stable connections. To get a better network performance and user experience, we exploit the user mobility to achieve efficient content distribution in VCCN. In this paper, we propose a mechanism for pre-caching chunks of large content objects such as videos among RSUs. First, we adopt Hidden Markov Model (HMM) to predict a user’ s moving trajectory. Based on the time gap from the current location to the predicted location of the mobile user, the corresponding RSU can pre-cache the required video chunks and provide them to the user as soon as he arrives at the predicted location. Simulation results show that our scheme is effective with higher cache hit, lower deliver latency, lower deliver overhead and lower average hops compared to other pre-caching schemes.
车载内容中心网络(VCCN)通过将内容中心网络的特性引入车载自组织网络,具有在车辆间分发内容的有效性和便捷性。然而,动态拓扑结构使其难以建立稳定的连接。为了获得更好的网络性能和用户体验,我们利用用户的移动性来实现VCCN中高效的内容分发。在本文中,我们提出了一种在rsu之间预缓存大型内容对象(如视频)块的机制。首先,我们采用隐马尔可夫模型(HMM)预测用户的移动轨迹。根据移动用户当前位置到预测位置的时间间隔,相应的RSU可以预缓存所需的视频块,并在用户到达预测位置时立即提供给用户。仿真结果表明,与其他预缓存方案相比,该方案具有较高的缓存命中率、较低的传输延迟、较低的传输开销和较低的平均跳数。
{"title":"A Pre-caching Mechanism of Video Stream Based on Hidden Markov Model in Vehicular Content Centric Network","authors":"Lin Yao, Z. Li, Wenyu Peng, Bin Wu, Weifeng Sun","doi":"10.1109/HotICN50779.2020.9350830","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350830","url":null,"abstract":"Vehicular Content Centric Network (VCCN) enjoys advantages in effectiveness and convenience for content distribu- tion among vehicles, by adopting features of Content Centric Net- works into Vehicular Ad-Hoc Networks. However, the dynamic topology makes it difficult to establish stable connections. To get a better network performance and user experience, we exploit the user mobility to achieve efficient content distribution in VCCN. In this paper, we propose a mechanism for pre-caching chunks of large content objects such as videos among RSUs. First, we adopt Hidden Markov Model (HMM) to predict a user’ s moving trajectory. Based on the time gap from the current location to the predicted location of the mobile user, the corresponding RSU can pre-cache the required video chunks and provide them to the user as soon as he arrives at the predicted location. Simulation results show that our scheme is effective with higher cache hit, lower deliver latency, lower deliver overhead and lower average hops compared to other pre-caching schemes.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HotICN 2020 Table of Contents HotICN 2020目录表
Pub Date : 2020-12-12 DOI: 10.1109/hoticn50779.2020.9350783
{"title":"HotICN 2020 Table of Contents","authors":"","doi":"10.1109/hoticn50779.2020.9350783","DOIUrl":"https://doi.org/10.1109/hoticn50779.2020.9350783","url":null,"abstract":"","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Identity-Based Security Mechanism Using Blockchain in Named Data Networking 命名数据网络中使用区块链的分层身份安全机制
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350821
Bing Li, M. Ma, Rong Xia
Named Data Networking (NDN) with the data-centric design has been viewed as a promising future Internet architecture. It requires a new security model orienting data but not host. In this paper, a Hierarchical Identity-based Security Mechanism by Blockchain (HISM-B) is to be proposed for NDN networks. It could satisfy the two assumptions specified in the NDN testbed to maintain the data-oriented authentication. At one hand, the hierarchical identity-based cryptology is used to bind the data name with the public key and then two signatures are encapsulated in the data packet so that the data source authentication and the integrity of data packet can be supported. At the other hand, a blockchain is employed to manage public keys for different domains to avoid catastrophes due to a single node failure. The validation result shows that the proposed HISM-B is safe.
以数据为中心的命名数据网络(NDN)被认为是未来很有前途的互联网架构。它需要一种新的面向数据而非主机的安全模型。本文提出了一种基于区块链分层身份的NDN网络安全机制(HISM-B)。它可以满足NDN测试平台中指定的两个假设,以维持面向数据的身份验证。一方面,采用基于分层身份的密码学方法将数据名称与公钥绑定,然后在数据包中封装两个签名,从而支持数据源认证和数据包的完整性;另一方面,区块链用于管理不同域的公钥,以避免由于单个节点故障而导致的灾难。验证结果表明,所提出的hsm - b是安全的。
{"title":"Hierarchical Identity-Based Security Mechanism Using Blockchain in Named Data Networking","authors":"Bing Li, M. Ma, Rong Xia","doi":"10.1109/HotICN50779.2020.9350821","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350821","url":null,"abstract":"Named Data Networking (NDN) with the data-centric design has been viewed as a promising future Internet architecture. It requires a new security model orienting data but not host. In this paper, a Hierarchical Identity-based Security Mechanism by Blockchain (HISM-B) is to be proposed for NDN networks. It could satisfy the two assumptions specified in the NDN testbed to maintain the data-oriented authentication. At one hand, the hierarchical identity-based cryptology is used to bind the data name with the public key and then two signatures are encapsulated in the data packet so that the data source authentication and the integrity of data packet can be supported. At the other hand, a blockchain is employed to manage public keys for different domains to avoid catastrophes due to a single node failure. The validation result shows that the proposed HISM-B is safe.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121080525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Content Priority-Based Caching Strategy in NDMANET NDMANET中基于内容优先级的缓存策略研究
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350757
Quan Zheng, Yulin Bao, Zixuan Gao, Liu Yuan, Jian Yang, Xiaobin Tan
Most research on NDMANET cache strategy does not take the priority of content into consideration, which will affect the usability of important content in the mobile environment. Aiming at solving this problem, this paper proposes a cache replacement strategy based on content priority. First, the content is prioritized according to the different needs for the availability of different content. Then, the priority of the content is used as a reference factor for cache replacement to make a cache replacement decision, and the goal is to improve the hit rate and availability of important content. At the same time, the simulation results of ndnSIM show that the strategy can significantly increase the number of cached important content without affecting the global hit rate and response delay, thereby improving the availability of important content.
大多数关于NDMANET缓存策略的研究都没有考虑到内容的优先级,这会影响重要内容在移动环境中的可用性。针对这一问题,本文提出了一种基于内容优先级的缓存替换策略。首先,根据不同内容可用性的不同需求对内容进行优先级排序。然后,将内容的优先级作为缓存替换的参考因素,做出缓存替换决策,目标是提高重要内容的命中率和可用性。同时,ndnSIM的仿真结果表明,该策略可以在不影响全局命中率和响应延迟的情况下显著增加重要内容的缓存数量,从而提高重要内容的可用性。
{"title":"Research on Content Priority-Based Caching Strategy in NDMANET","authors":"Quan Zheng, Yulin Bao, Zixuan Gao, Liu Yuan, Jian Yang, Xiaobin Tan","doi":"10.1109/HotICN50779.2020.9350757","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350757","url":null,"abstract":"Most research on NDMANET cache strategy does not take the priority of content into consideration, which will affect the usability of important content in the mobile environment. Aiming at solving this problem, this paper proposes a cache replacement strategy based on content priority. First, the content is prioritized according to the different needs for the availability of different content. Then, the priority of the content is used as a reference factor for cache replacement to make a cache replacement decision, and the goal is to improve the hit rate and availability of important content. At the same time, the simulation results of ndnSIM show that the strategy can significantly increase the number of cached important content without affecting the global hit rate and response delay, thereby improving the availability of important content.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite-Time Synchronization and Identification of Markovian Switching Delayed Networks with Multiple Weights 多权重马尔可夫交换延迟网络的有限时间同步与辨识
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350758
Qian Xie, Duo Guo, Tong Wang, Xiaoping Yang, Xinghua Liu
In this paper, the finite-time synchronization and identification problem is investigated for Markovian switching delayed networks with multiple weighs, where the effects of nonlinear coupling and stochastic disturbances on the networks are considered. In the process of finite-time synchronization, the stability of the networks will be affected by a large number of controlled nodes, and then an effective control method is necessary to design and adopt. Under this control strategy, the finite-time synchronization of the networks is realized, and at the same time, the unknown parameter vector of the networks can also be identified in a finite time. Finally, a representative numerical simulation is provided to further prove the feasibility and applicability of the research content.
研究了考虑非线性耦合和随机干扰影响的多权重马尔可夫切换延迟网络的有限时间同步与辨识问题。在有限时间同步过程中,大量被控节点会影响网络的稳定性,需要设计和采用有效的控制方法。在该控制策略下,实现了网络的有限时间同步,同时也可以在有限时间内识别网络的未知参数向量。最后,给出了具有代表性的数值模拟,进一步证明了研究内容的可行性和适用性。
{"title":"Finite-Time Synchronization and Identification of Markovian Switching Delayed Networks with Multiple Weights","authors":"Qian Xie, Duo Guo, Tong Wang, Xiaoping Yang, Xinghua Liu","doi":"10.1109/HotICN50779.2020.9350758","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350758","url":null,"abstract":"In this paper, the finite-time synchronization and identification problem is investigated for Markovian switching delayed networks with multiple weighs, where the effects of nonlinear coupling and stochastic disturbances on the networks are considered. In the process of finite-time synchronization, the stability of the networks will be affected by a large number of controlled nodes, and then an effective control method is necessary to design and adopt. Under this control strategy, the finite-time synchronization of the networks is realized, and at the same time, the unknown parameter vector of the networks can also be identified in a finite time. Finally, a representative numerical simulation is provided to further prove the feasibility and applicability of the research content.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Chunk Size on Named Data Networking Performance 块大小对命名数据网络性能的影响
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350754
Christos Nasis, Christos-Alexandros Sarros, V. Tsaoussidis
Internet usage has evolved during the years towards accessing content, regardless of its location. The Named Data Networking architecture was designed to satisfy that need and replace today’s host-centric TCP/IP stack by placing named content at the core of the architecture. In this paper, we provide the first evaluation specifically targeting the impact of packet size in NDN performance. Our results show the impact of chunk sizes is far from negligible; it clearly affects NDN performance as measured by metrics such as throughput, delay, cache hits and cache entry lifetime. Attention should, therefore, be given to the selection of an appropriate chunk size in NDN deployments.
多年来,互联网的使用已经发展到访问内容,而不考虑其位置。命名数据网络体系结构旨在满足这一需求,并通过将命名内容置于体系结构的核心位置来取代目前以主机为中心的TCP/IP堆栈。在本文中,我们提供了第一个专门针对NDN性能中数据包大小影响的评估。我们的结果表明,块大小的影响远非可以忽略不计;通过吞吐量、延迟、缓存命中数和缓存条目生命周期等指标来衡量,它显然会影响NDN性能。因此,在NDN部署中应注意选择适当的块大小。
{"title":"The Impact of Chunk Size on Named Data Networking Performance","authors":"Christos Nasis, Christos-Alexandros Sarros, V. Tsaoussidis","doi":"10.1109/HotICN50779.2020.9350754","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350754","url":null,"abstract":"Internet usage has evolved during the years towards accessing content, regardless of its location. The Named Data Networking architecture was designed to satisfy that need and replace today’s host-centric TCP/IP stack by placing named content at the core of the architecture. In this paper, we provide the first evaluation specifically targeting the impact of packet size in NDN performance. Our results show the impact of chunk sizes is far from negligible; it clearly affects NDN performance as measured by metrics such as throughput, delay, cache hits and cache entry lifetime. Attention should, therefore, be given to the selection of an appropriate chunk size in NDN deployments.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Objective-Oriented Resource Pooling in MPTCP: A Deep Reinforcement Learning Approach 面向目标的MPTCP资源池:一种深度强化学习方法
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350854
Chengyuan Huang, Jiao Zhang, Tao Huang
The most important benefit introduced by multi-path TCP (MPTCP) is its ability of resource pooling. The congestion control algorithm and the packet scheduler in MPTCP work together to consume the pooled network resource of different sub-paths. However, the objectives of a MPTCP congestion control algorithm and a packet scheduler are not always in agreement with each other, which hinders the enhancement of the applications’ performance. In this paper, we propose Partner, a distributed Deep Reinforcement Learning (DRL)-based congestion control algorithm in MPTCP. By setting the reward function which is in agreement with the corresponding packet scheduler, Partner can accurately shape the decision space utilized by the packet scheduler, thus unleashing its full power. Our results show that Partner significantly outperforms the state-of-the-art congestion control algorithms in terms of meeting various applications’ requirements.
多路径TCP (MPTCP)带来的最重要的好处是它的资源池能力。MPTCP中的拥塞控制算法和分组调度程序共同使用不同子路径的网络资源池。然而,MPTCP拥塞控制算法的目标与数据包调度程序的目标并不总是一致的,这就阻碍了应用程序性能的提高。本文提出了一种基于分布式深度强化学习(DRL)的MPTCP拥塞控制算法Partner。Partner通过设置与相应的包调度器相一致的奖励函数,可以准确地塑造包调度器所利用的决策空间,从而释放出它的全部力量。我们的研究结果表明,Partner在满足各种应用需求方面明显优于最先进的拥塞控制算法。
{"title":"Objective-Oriented Resource Pooling in MPTCP: A Deep Reinforcement Learning Approach","authors":"Chengyuan Huang, Jiao Zhang, Tao Huang","doi":"10.1109/HotICN50779.2020.9350854","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350854","url":null,"abstract":"The most important benefit introduced by multi-path TCP (MPTCP) is its ability of resource pooling. The congestion control algorithm and the packet scheduler in MPTCP work together to consume the pooled network resource of different sub-paths. However, the objectives of a MPTCP congestion control algorithm and a packet scheduler are not always in agreement with each other, which hinders the enhancement of the applications’ performance. In this paper, we propose Partner, a distributed Deep Reinforcement Learning (DRL)-based congestion control algorithm in MPTCP. By setting the reward function which is in agreement with the corresponding packet scheduler, Partner can accurately shape the decision space utilized by the packet scheduler, thus unleashing its full power. Our results show that Partner significantly outperforms the state-of-the-art congestion control algorithms in terms of meeting various applications’ requirements.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124808759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Chained Tendermint: A Parallel BFT Consensus Mechanism 链式嫩芽:一种并行BFT共识机制
Pub Date : 2020-12-12 DOI: 10.1109/HotICN50779.2020.9350801
Lei Lei, C. Lan, L. Lin
A number of well-known BFT (Byzantine Fault Tolerant) algorithms, such as Tendermint, Casper, HotStuff, and Grandpa, have been developed in recent years to solve the problem of consensus. Of them, Tendermint can ensure instant finality but needs multiple rounds to commit a block. Casper and HotStuff both need a constraint on the direct parent to commit to a block. Grandpa uses ghost function to extract a common block from a vote set, but it is not based on a chained model and does not use signature aggregation to boost performance. We propose a consensus algorithm based on the theories of Tendermint and HotStuff. It is based on the same network model (each message sent out can reach every replica eventually, the adversary can hold it but not forever) and adversary assumption (the adversary can do Byzantine behavior like not proposing block or sending vote, or sending contradictory votes) as in Tendermint, but does not have the feature of instant finality. The result is an increase in throughput, since the blocks are handled in the chained model, the processes of handling each block can overlap.
为了解决共识问题,近年来开发了许多著名的BFT(拜占庭容错)算法,如Tendermint、Casper、HotStuff和Grandpa。其中,Tendermint可以确保即时完成,但需要多轮才能提交一个区块。Casper和HotStuff都需要在直接父节点上有一个约束来提交一个块。爷爷算法使用鬼函数从投票集中提取公共块,但它不是基于链式模型,也没有使用签名聚合来提高性能。我们提出了一种基于Tendermint和HotStuff理论的共识算法。它基于与Tendermint相同的网络模型(发送的每条消息最终都可以到达每个副本,对手可以持有但不能永远持有)和对手假设(对手可以做拜占庭式的行为,如不提议区块或发送投票,或发送矛盾的投票),但不具有即时终结性的特征。结果是吞吐量的增加,因为块是在链式模型中处理的,处理每个块的进程可以重叠。
{"title":"Chained Tendermint: A Parallel BFT Consensus Mechanism","authors":"Lei Lei, C. Lan, L. Lin","doi":"10.1109/HotICN50779.2020.9350801","DOIUrl":"https://doi.org/10.1109/HotICN50779.2020.9350801","url":null,"abstract":"A number of well-known BFT (Byzantine Fault Tolerant) algorithms, such as Tendermint, Casper, HotStuff, and Grandpa, have been developed in recent years to solve the problem of consensus. Of them, Tendermint can ensure instant finality but needs multiple rounds to commit a block. Casper and HotStuff both need a constraint on the direct parent to commit to a block. Grandpa uses ghost function to extract a common block from a vote set, but it is not based on a chained model and does not use signature aggregation to boost performance. We propose a consensus algorithm based on the theories of Tendermint and HotStuff. It is based on the same network model (each message sent out can reach every replica eventually, the adversary can hold it but not forever) and adversary assumption (the adversary can do Byzantine behavior like not proposing block or sending vote, or sending contradictory votes) as in Tendermint, but does not have the feature of instant finality. The result is an increase in throughput, since the blocks are handled in the chained model, the processes of handling each block can overlap.","PeriodicalId":125282,"journal":{"name":"2020 3rd International Conference on Hot Information-Centric Networking (HotICN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 3rd International Conference on Hot Information-Centric Networking (HotICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1