首页 > 最新文献

2017 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignment 通过动态路径分配提高多无线电多信道网络的性能和寿命
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876179
Paulo Alexandre Regis, S. Bhunia, S. Sengupta
In this paper, we present a novel approach to assign paths to data streams in a mission-centric heterogeneous wireless mesh network where nodes have multi-channel radio interfaces. Different than conventional packet-switching routing, our approach assigns the paths using a link utility based on sub-topologies of non-orthogonal frequencies. We use a graph coloring algorithm to calculate the utility of each link. We then propose two path assignment strategies: (i) single path, where each data stream traverse a unique path, and (ii) split-path, where the flows can be divided into multiple paths. Results show no best strategy fits all scenarios. Instead, in different situations, different algorithms are better suited.
在本文中,我们提出了一种在任务中心异构无线网状网络中为数据流分配路径的新方法,其中节点具有多通道无线电接口。与传统的分组交换路由不同,我们的方法使用基于非正交频率子拓扑的链路实用程序来分配路径。我们使用图形着色算法来计算每个链接的效用。然后,我们提出了两种路径分配策略:(i)单路径,其中每个数据流遍历一个唯一的路径;(ii)分离路径,其中流可以分为多个路径。结果表明,没有适合所有情况的最佳策略。相反,在不同的情况下,不同的算法更适合。
{"title":"Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignment","authors":"Paulo Alexandre Regis, S. Bhunia, S. Sengupta","doi":"10.1109/ICCNC.2017.7876179","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876179","url":null,"abstract":"In this paper, we present a novel approach to assign paths to data streams in a mission-centric heterogeneous wireless mesh network where nodes have multi-channel radio interfaces. Different than conventional packet-switching routing, our approach assigns the paths using a link utility based on sub-topologies of non-orthogonal frequencies. We use a graph coloring algorithm to calculate the utility of each link. We then propose two path assignment strategies: (i) single path, where each data stream traverse a unique path, and (ii) split-path, where the flows can be divided into multiple paths. Results show no best strategy fits all scenarios. Instead, in different situations, different algorithms are better suited.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129372449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neighbor discovery utilizing in-band full duplex in wireless clique networks 无线团网中利用带内全双工的邻居发现
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876276
Yuichi Miyaji, H. Uehara
In wireless ad hoc networks, neighbor discovery is essential for medium access control and routing. In this paper, we propose a new neighbor discovery algorithm utilizing in-band full duplex. This algorithm employs a reservation scheme with full duplex into an existing algorithm based on half-duplex. We analyze neighbor discovery time of both algorithms with absorbing Markov chain models and simulations. These results show our proposed algorithm shortens neighbor discovery. Furthermore, we discuss an affinity between the proposed algorithm and an existing one with full duplex.
在无线自组织网络中,邻居发现对介质访问控制和路由至关重要。本文提出了一种新的带内全双工邻居发现算法。该算法将全双工的预留方案引入到现有的半双工算法中。利用马尔可夫链模型和仿真分析了两种算法的邻居发现时间。结果表明,该算法缩短了邻居发现时间。此外,我们还讨论了该算法与现有全双工算法之间的亲和力。
{"title":"Neighbor discovery utilizing in-band full duplex in wireless clique networks","authors":"Yuichi Miyaji, H. Uehara","doi":"10.1109/ICCNC.2017.7876276","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876276","url":null,"abstract":"In wireless ad hoc networks, neighbor discovery is essential for medium access control and routing. In this paper, we propose a new neighbor discovery algorithm utilizing in-band full duplex. This algorithm employs a reservation scheme with full duplex into an existing algorithm based on half-duplex. We analyze neighbor discovery time of both algorithms with absorbing Markov chain models and simulations. These results show our proposed algorithm shortens neighbor discovery. Furthermore, we discuss an affinity between the proposed algorithm and an existing one with full duplex.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An erasure code with reduced average locality for distributed storage systems 分布式存储系统中具有降低平均局域性的擦除码
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876166
M. Shahabinejad, M. Ardakani, M. Khabbazian
A linear block code with dimension k and length n is called a locally repairable code (LRC) with locality r if it can retrieve any coded symbol by at most r other coded symbols. LRCs have been recently proposed and used in practice in distributed storage systems such as Windows Azure Storage and Facebook HDFS-RAID. Theoretical bounds on the maximum locality of LRCs have been established, and optimal LRCs that achieve the obtained bound have been designed. Average locality of LRCs (r̅) is directly proportional to the costly repair bandwidth, disk I/O, and number of nodes involved in a repair process of a missing data block. There is a gap in the literature establishing the theoretical bounds on r̅. As an initial attempt to fill this gap, in this paper, we establish a lower bound on r̅ for the same code parameters used by Facebook HDFS-RAID. We also present a code that achieves the obtained bound. Comparing with the LRC used in Facebook HDFS-RAID, our proposed LRC improves the average locality by 22.5% without sacrificing the rate and minimum distance of the code.
一个维数为k、长度为n的线性分组码,如果能通过最多r个其他编码符号检索到任意编码符号,则称为局部性为r的局部可修复码(LRC)。lrc最近被提出并应用于分布式存储系统,如Windows Azure storage和Facebook HDFS-RAID。建立了lrc最大局部性的理论界限,并设计了达到该界限的最优lrc。lrc的平均局域性(r′s)与修复带宽、磁盘I/O和修复丢失数据块过程中涉及的节点数量成正比。在建立r′s的理论界限的文献中存在空白。作为填补这一空白的初步尝试,在本文中,我们为Facebook HDFS-RAID使用的相同代码参数建立了r′s的下界。我们还给出了实现所得到的界的代码。与Facebook HDFS-RAID中使用的LRC相比,我们提出的LRC在不牺牲代码速率和最小距离的情况下,将平均局域性提高了22.5%。
{"title":"An erasure code with reduced average locality for distributed storage systems","authors":"M. Shahabinejad, M. Ardakani, M. Khabbazian","doi":"10.1109/ICCNC.2017.7876166","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876166","url":null,"abstract":"A linear block code with dimension k and length n is called a locally repairable code (LRC) with locality r if it can retrieve any coded symbol by at most r other coded symbols. LRCs have been recently proposed and used in practice in distributed storage systems such as Windows Azure Storage and Facebook HDFS-RAID. Theoretical bounds on the maximum locality of LRCs have been established, and optimal LRCs that achieve the obtained bound have been designed. Average locality of LRCs (r̅) is directly proportional to the costly repair bandwidth, disk I/O, and number of nodes involved in a repair process of a missing data block. There is a gap in the literature establishing the theoretical bounds on r̅. As an initial attempt to fill this gap, in this paper, we establish a lower bound on r̅ for the same code parameters used by Facebook HDFS-RAID. We also present a code that achieves the obtained bound. Comparing with the LRC used in Facebook HDFS-RAID, our proposed LRC improves the average locality by 22.5% without sacrificing the rate and minimum distance of the code.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cognitive mission planning and system orchestration 认知任务规划和系统编排
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876223
M. Rahmes, Richard Clouse, Jay Virts, George Yakimovicz, Bernard Rees, W. Talbert
We present an approach to increase likelihood that an automated reasoning system will make the best decisions for a system and sensor resource manager (SSRM) with limited resources. The introduction of automated game theory to mission planning allows for a modular architecture and scalable approach across a range of platforms and facilitates rapid integration of new modes and technology. Game theory enhances a multi-objective management system, enabling it to intelligently coordinate and optimally achieve disparate mission objectives of a converged system. Our solution may also save money by offering a Pareto efficient process for mission plan validation, which reduces time needed to validate scenarios. An area of significant contribution in our work is our new genetic linear optimization, which is an innovative, developmental extension of our efforts comparing genetic algorithms with linear programming. We show results in receiver-operating characteristic (ROC) curves and compare the performance. We also quantify the performance improvement across all combinations of decisions or players in a linear program. We further enhance decision making by combining the best parts of multiple solutions. Our design provides insight into the most important or optimal weights for degrees of freedom and can be used to efficiently tune those weights. We also discuss tradeoffs for improving processing time with a sensitivity analysis.
我们提出了一种方法来提高自动化推理系统在有限资源下为系统和传感器资源管理器(SSRM)做出最佳决策的可能性。将自动化博弈论引入到任务规划中,允许在一系列平台上采用模块化架构和可扩展方法,并促进新模式和技术的快速集成。博弈论增强了一个多目标管理系统,使其能够智能地协调和最佳地实现一个融合系统的不同任务目标。我们的解决方案还可以通过提供任务计划验证的Pareto高效过程来节省资金,这减少了验证场景所需的时间。在我们的工作中有重要贡献的一个领域是我们的新遗传线性优化,这是我们将遗传算法与线性规划进行比较的一种创新的、发展的延伸。我们在接受者工作特征(ROC)曲线中显示结果并比较性能。我们还量化了线性计划中所有决策组合或参与者的性能改进。我们通过结合多个解决方案的最佳部分来进一步提高决策能力。我们的设计提供了对自由度最重要或最优权重的洞察,并可用于有效地调整这些权重。我们还讨论了利用敏感性分析改进处理时间的权衡。
{"title":"Cognitive mission planning and system orchestration","authors":"M. Rahmes, Richard Clouse, Jay Virts, George Yakimovicz, Bernard Rees, W. Talbert","doi":"10.1109/ICCNC.2017.7876223","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876223","url":null,"abstract":"We present an approach to increase likelihood that an automated reasoning system will make the best decisions for a system and sensor resource manager (SSRM) with limited resources. The introduction of automated game theory to mission planning allows for a modular architecture and scalable approach across a range of platforms and facilitates rapid integration of new modes and technology. Game theory enhances a multi-objective management system, enabling it to intelligently coordinate and optimally achieve disparate mission objectives of a converged system. Our solution may also save money by offering a Pareto efficient process for mission plan validation, which reduces time needed to validate scenarios. An area of significant contribution in our work is our new genetic linear optimization, which is an innovative, developmental extension of our efforts comparing genetic algorithms with linear programming. We show results in receiver-operating characteristic (ROC) curves and compare the performance. We also quantify the performance improvement across all combinations of decisions or players in a linear program. We further enhance decision making by combining the best parts of multiple solutions. Our design provides insight into the most important or optimal weights for degrees of freedom and can be used to efficiently tune those weights. We also discuss tradeoffs for improving processing time with a sensitivity analysis.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving peers in distributed, location-based peer-to-peer overlays 在分布式、基于位置的点对点覆盖中移动对等点
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876253
Tobias Amft, Kalman Graffi
In the past decades, various concepts of peer-to-peer (P2P) systems have been realized in desktop applications for stationary PCs. Last recent years show that computers have evolved to handy devices which can be used nearly everywhere, not only at home. For this reason, location-based services which allow to associate peers in a network with geographical positions, e.g. to track a device in emergency cases, become interesting. In this paper, we introduce LobSter, a lightweight location-based service over unmodified DHTs like Chord [24], Kademlia [14] and Pastry [21] which supports the mobility of peers. Our evaluation compares LobSter to related work in stationary situations and gives insights about the general limits of distributed location-based services in mobile environments.
在过去的几十年里,各种对等(P2P)系统的概念已经在固定pc的桌面应用中实现。最近几年表明,计算机已经发展成为一种方便的设备,几乎可以在任何地方使用,而不仅仅是在家里。基于位置的服务允许将网络中的对等点与地理位置相关联,例如在紧急情况下跟踪设备,因此变得有趣起来。在本文中,我们介绍了LobSter,这是一种轻量级的基于位置的服务,基于未修改的dht,如Chord[24]、Kademlia[14]和Pastry[21],它支持对等体的移动性。我们的评估将LobSter与固定情况下的相关工作进行了比较,并给出了关于移动环境中分布式基于位置的服务的一般限制的见解。
{"title":"Moving peers in distributed, location-based peer-to-peer overlays","authors":"Tobias Amft, Kalman Graffi","doi":"10.1109/ICCNC.2017.7876253","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876253","url":null,"abstract":"In the past decades, various concepts of peer-to-peer (P2P) systems have been realized in desktop applications for stationary PCs. Last recent years show that computers have evolved to handy devices which can be used nearly everywhere, not only at home. For this reason, location-based services which allow to associate peers in a network with geographical positions, e.g. to track a device in emergency cases, become interesting. In this paper, we introduce LobSter, a lightweight location-based service over unmodified DHTs like Chord [24], Kademlia [14] and Pastry [21] which supports the mobility of peers. Our evaluation compares LobSter to related work in stationary situations and gives insights about the general limits of distributed location-based services in mobile environments.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud bursting approach based on predicting requests for business-critical web systems 基于预测关键业务web系统请求的云爆发方法
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876168
Yukio Ogawa, G. Hasegawa, M. Murata
Cloud bursting temporarily expands the capacity of cloud-based service hosted in a private data center by renting public data center capacity when the demand for capacity spikes. This paper presents a cloud bursting approach based on long- and short-term predictions of requests to a business-critical web system to determine the optimal resources of the system deployed over private and public data centers. In a private data center, a dedicated pool of virtual machines (VMs) is assigned to the web system on the basis of one-week predictions. Moreover, in both private and public data centers, VMs are activated on the basis of one-hour predictions. We formulated a problem that includes the total cost and response time constraints and conducted numerical simulations. The results indicate that our approach is tolerant of prediction errors. Even if the website receives bursty requests and one-hour predictions include a mean absolute percentage error (MAPE) of 0.2, the total cost decreases to a half the current cost while 95% of response time is kept below 0.15 s.
云爆发通过在容量需求激增时租用公共数据中心容量,暂时扩展托管在私有数据中心的基于云的服务的容量。本文提出了一种基于对业务关键型web系统请求的长期和短期预测的云爆发方法,以确定在私有和公共数据中心部署的系统的最佳资源。在私有数据中心中,根据一周的预测为web系统分配一个专用的虚拟机池。此外,在私有和公共数据中心中,虚拟机都是根据一小时的预测来激活的。我们制定了一个包含总成本和响应时间约束的问题,并进行了数值模拟。结果表明,我们的方法对预测误差具有一定的容忍度。即使网站收到突发请求,并且一小时预测包含0.2的平均绝对百分比误差(MAPE),总成本也会降低到当前成本的一半,而95%的响应时间保持在0.15秒以下。
{"title":"Cloud bursting approach based on predicting requests for business-critical web systems","authors":"Yukio Ogawa, G. Hasegawa, M. Murata","doi":"10.1109/ICCNC.2017.7876168","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876168","url":null,"abstract":"Cloud bursting temporarily expands the capacity of cloud-based service hosted in a private data center by renting public data center capacity when the demand for capacity spikes. This paper presents a cloud bursting approach based on long- and short-term predictions of requests to a business-critical web system to determine the optimal resources of the system deployed over private and public data centers. In a private data center, a dedicated pool of virtual machines (VMs) is assigned to the web system on the basis of one-week predictions. Moreover, in both private and public data centers, VMs are activated on the basis of one-hour predictions. We formulated a problem that includes the total cost and response time constraints and conducted numerical simulations. The results indicate that our approach is tolerant of prediction errors. Even if the website receives bursty requests and one-hour predictions include a mean absolute percentage error (MAPE) of 0.2, the total cost decreases to a half the current cost while 95% of response time is kept below 0.15 s.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114384361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Throughput optimization in multi-hop wireless networks with reconfigurable antennas 天线可重构多跳无线网络的吞吐量优化
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876201
Yantian Hou, Ming Li, K. Zeng
In multi-hop wireless networks (MWNs), interference and connectivity are two key factors that affect end-to-end network throughput. Traditional omni-directional antennas and directional antennas either generate significant interference or provide poor network connectivity. Reconfigurable antenna (RA) is an emerging antenna technology that can agilely switch among many different antenna states including radiation patterns, so as to suppress interference and maintain high connectivity at the same time. In this work, we systematically exploit the pattern diversity and fast reconfigurability of RAs to enhance the throughput of MWNs. We first propose a novel link-layer model that captures the dynamic relations between antenna pattern, link coverage and interference. Based on our model, a throughput optimization framework is proposed by jointly considering pattern selection and link scheduling. Our problem is formulated as a mixed integer non-linear programming problem. The superiority of reconfigurable antennas compared with traditional omni-directional and directional antennas is both theoretically proven, and validated through extensive simulations.
在多跳无线网络中,干扰和连通性是影响端到端网络吞吐量的两个关键因素。传统的全向天线和定向天线要么产生明显的干扰,要么网络连通性差。可重构天线(Reconfigurable antenna, RA)是一种新兴的天线技术,它可以在多种不同的天线状态(包括辐射方向图)之间灵活切换,从而在抑制干扰的同时保持高连通性。在这项工作中,我们系统地利用RAs的模式多样性和快速可重构性来提高MWNs的吞吐量。我们首先提出了一种新的链路层模型,该模型捕捉了天线方向图、链路覆盖和干扰之间的动态关系。在此基础上,提出了一个综合考虑模式选择和链路调度的吞吐量优化框架。我们的问题被表述为一个混合整数非线性规划问题。可重构天线相对于传统的全向天线和定向天线的优越性在理论上得到了证明,并通过大量的仿真得到了验证。
{"title":"Throughput optimization in multi-hop wireless networks with reconfigurable antennas","authors":"Yantian Hou, Ming Li, K. Zeng","doi":"10.1109/ICCNC.2017.7876201","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876201","url":null,"abstract":"In multi-hop wireless networks (MWNs), interference and connectivity are two key factors that affect end-to-end network throughput. Traditional omni-directional antennas and directional antennas either generate significant interference or provide poor network connectivity. Reconfigurable antenna (RA) is an emerging antenna technology that can agilely switch among many different antenna states including radiation patterns, so as to suppress interference and maintain high connectivity at the same time. In this work, we systematically exploit the pattern diversity and fast reconfigurability of RAs to enhance the throughput of MWNs. We first propose a novel link-layer model that captures the dynamic relations between antenna pattern, link coverage and interference. Based on our model, a throughput optimization framework is proposed by jointly considering pattern selection and link scheduling. Our problem is formulated as a mixed integer non-linear programming problem. The superiority of reconfigurable antennas compared with traditional omni-directional and directional antennas is both theoretically proven, and validated through extensive simulations.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114737157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SEINA: A stealthy and effective internal attack in Hadoop systems SEINA:在Hadoop系统中隐蔽而有效的内部攻击
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876183
Jiayin Wang, Teng Wang, Zhengyu Yang, Ying Mao, N. Mi, B. Sheng
Big data processing frameworks such as Hadoop [1] are now widely adopted, however the security issues in large scale systems have not been well studied yet. Unlike prior work on data privacy and protection, this paper investigates a potential attack from a compromised internal node against the overall system performance. We develop an effective attack launched from the compromised node that can significantly degrade the data processing performance of the cluster without being detected and blacklisted for job execution, also present a mitigation scheme that protects a Hadoop system from such attack. The results of experiments show that this attack greatly slows down the job executions in the native Hadoop system even with some basic defense mechanisms, however, our mitigation schem can keep the whole cluster running efficiently under such attack.
Hadoop[1]等大数据处理框架目前已被广泛采用,但大规模系统中的安全问题尚未得到很好的研究。与之前关于数据隐私和保护的工作不同,本文研究了来自受损内部节点对整体系统性能的潜在攻击。我们开发了一种从受损节点发起的有效攻击,该攻击可以显著降低集群的数据处理性能,而不会被检测到并被列入作业执行的黑名单,同时还提出了一种缓解方案,保护Hadoop系统免受此类攻击。实验结果表明,即使有一些基本的防御机制,这种攻击也会大大降低本机Hadoop系统的作业执行速度,而我们的缓解方案可以在这种攻击下保持整个集群的高效运行。
{"title":"SEINA: A stealthy and effective internal attack in Hadoop systems","authors":"Jiayin Wang, Teng Wang, Zhengyu Yang, Ying Mao, N. Mi, B. Sheng","doi":"10.1109/ICCNC.2017.7876183","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876183","url":null,"abstract":"Big data processing frameworks such as Hadoop [1] are now widely adopted, however the security issues in large scale systems have not been well studied yet. Unlike prior work on data privacy and protection, this paper investigates a potential attack from a compromised internal node against the overall system performance. We develop an effective attack launched from the compromised node that can significantly degrade the data processing performance of the cluster without being detected and blacklisted for job execution, also present a mitigation scheme that protects a Hadoop system from such attack. The results of experiments show that this attack greatly slows down the job executions in the native Hadoop system even with some basic defense mechanisms, however, our mitigation schem can keep the whole cluster running efficiently under such attack.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115045774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Analysis and improvement of the 3-star algorithm for the STP-MSP problem in Wireless Sensor Networks 无线传感器网络STP-MSP问题的3星算法分析与改进
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876269
Shuo-Han Chen, Chi-Heng Lee, Tseng-Yi Chen, H. Wei, T. Hsu, W. Shih
A Wireless Sensor Network (WSN) uses a larger number of low-power sensor nodes to gather environmental information which is then wirelessly forwarded to a base station. However, sensor nodes have very limited communication ranges. Thus, relay nodes are required to ensure reliable connectivity throughout the WSN. On the other hand, relay nodes are typically more sophisticated and expensive than sensor nodes. Therefore, deployment strategies should seek to minimize the number of required relay nodes, a problem referred to as the Steiner Tree Problem with Minimum Number of Steiner Points (SMT-MSP), which has been shown to be NP-hard. This paper analyzes and improves the 3-star approximation algorithm by reducing the time complexity from O(n3) to O(nlogn) with the identical performance ratio. Experiments are conducted to verify the correctness of the proposed algorithm.
无线传感器网络(WSN)使用大量的低功耗传感器节点来收集环境信息,然后将这些信息无线转发到基站。然而,传感器节点的通信范围非常有限。因此,需要中继节点来确保整个WSN的可靠连接。另一方面,中继节点通常比传感器节点更复杂和昂贵。因此,部署策略应该寻求最小化所需中继节点的数量,这个问题被称为具有最小数量斯坦纳点的斯坦纳树问题(SMT-MSP),该问题已被证明是np困难的。本文对3星近似算法进行了分析和改进,将时间复杂度从O(n3)降低到O(nlogn),性能比相同。实验验证了所提算法的正确性。
{"title":"Analysis and improvement of the 3-star algorithm for the STP-MSP problem in Wireless Sensor Networks","authors":"Shuo-Han Chen, Chi-Heng Lee, Tseng-Yi Chen, H. Wei, T. Hsu, W. Shih","doi":"10.1109/ICCNC.2017.7876269","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876269","url":null,"abstract":"A Wireless Sensor Network (WSN) uses a larger number of low-power sensor nodes to gather environmental information which is then wirelessly forwarded to a base station. However, sensor nodes have very limited communication ranges. Thus, relay nodes are required to ensure reliable connectivity throughout the WSN. On the other hand, relay nodes are typically more sophisticated and expensive than sensor nodes. Therefore, deployment strategies should seek to minimize the number of required relay nodes, a problem referred to as the Steiner Tree Problem with Minimum Number of Steiner Points (SMT-MSP), which has been shown to be NP-hard. This paper analyzes and improves the 3-star approximation algorithm by reducing the time complexity from O(n3) to O(nlogn) with the identical performance ratio. Experiments are conducted to verify the correctness of the proposed algorithm.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advertisement removal of Android applications by reverse engineering 通过逆向工程移除Android应用的广告
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876214
Jen-Yi Pan, Shengfu Ma
Millions of apps cover all aspects of our lives and make smartphones success. Advertisers financially support developers but also collect users' privacy. Several ad blocking apps help users to eliminate advertisement by filtering or redirection for certain targets whose list is maintained by a third party, and some of them require root permission. We develop an advertisement removal program with the technique of reverse engineering, which can effectively patch the advertising code, even obfuscated by other tools. The proposed method takes no overhead at runtime, and requires neither root permission nor list updating. This study also gives a different perspective on tailoring behavior of Android applications.
数以百万计的应用程序覆盖了我们生活的方方面面,使智能手机取得了成功。广告商在为开发者提供资金支持的同时,也会收集用户的隐私。一些广告拦截应用程序通过过滤或重定向某些目标来帮助用户消除广告,这些目标的列表由第三方维护,其中一些需要root权限。我们利用逆向工程技术开发了一个广告删除程序,该程序可以有效地修补广告代码,即使被其他工具混淆。建议的方法在运行时没有开销,既不需要根权限,也不需要列表更新。这项研究也为Android应用程序的定制行为提供了不同的视角。
{"title":"Advertisement removal of Android applications by reverse engineering","authors":"Jen-Yi Pan, Shengfu Ma","doi":"10.1109/ICCNC.2017.7876214","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876214","url":null,"abstract":"Millions of apps cover all aspects of our lives and make smartphones success. Advertisers financially support developers but also collect users' privacy. Several ad blocking apps help users to eliminate advertisement by filtering or redirection for certain targets whose list is maintained by a third party, and some of them require root permission. We develop an advertisement removal program with the technique of reverse engineering, which can effectively patch the advertising code, even obfuscated by other tools. The proposed method takes no overhead at runtime, and requires neither root permission nor list updating. This study also gives a different perspective on tailoring behavior of Android applications.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1