首页 > 最新文献

2017 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
On-demand cache placement protocol for content delivery sensor networks 用于内容传递传感器网络的按需缓存放置协议
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876128
Minkeun Ha, Daeyoung Kim
A significant number of promising wireless sensor applications for the Internet of Things (IoT) are becoming a reality. Most of these applications require a variety of heterogeneous and geographical sensor data to be delivered to users such as mobile devices, vehicles, and cloud systems for big data analysis to extract maximum value from the physical world. Data caching of popular data items in a network can significantly improve efficiency and reliability of content delivery by contributing the reduction of data access delay, bandwidth usage, and packet losses in resource-limited low-rate wireless sensor networks. In this paper, we propose an efficient cache placement protocol (BCDA) that minimizes data access cost and guarantees cache consistency in a lightweight manner. The BCDA decides where to store a copy of data content in a network using a distributed approach according to clients' access patterns, memory capacity, data size, and so on. To evaluate the feasibility and effectiveness, we implemented the BCDA in ns-2 and compared its performance with existing caching strategies. The simulation results highlight that the BCDA significantly reduces data access cost with minimizing cache management cost.
大量有前途的无线传感器应用于物联网(IoT)正在成为现实。这些应用中的大多数都需要将各种异构和地理传感器数据交付给移动设备、车辆和云系统等用户,以便进行大数据分析,从物理世界中提取最大价值。在资源有限的低速率无线传感器网络中,网络中流行数据项的数据缓存可以通过减少数据访问延迟、带宽使用和数据包丢失来显著提高内容交付的效率和可靠性。在本文中,我们提出了一种高效的缓存放置协议(BCDA),该协议以轻量级的方式最小化数据访问成本并保证缓存一致性。BCDA根据客户机的访问模式、内存容量、数据大小等,使用分布式方法决定在网络中存储数据内容副本的位置。为了评估其可行性和有效性,我们在ns-2中实现了BCDA,并将其性能与现有缓存策略进行了比较。仿真结果表明,BCDA在最小化缓存管理成本的同时显著降低了数据访问成本。
{"title":"On-demand cache placement protocol for content delivery sensor networks","authors":"Minkeun Ha, Daeyoung Kim","doi":"10.1109/ICCNC.2017.7876128","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876128","url":null,"abstract":"A significant number of promising wireless sensor applications for the Internet of Things (IoT) are becoming a reality. Most of these applications require a variety of heterogeneous and geographical sensor data to be delivered to users such as mobile devices, vehicles, and cloud systems for big data analysis to extract maximum value from the physical world. Data caching of popular data items in a network can significantly improve efficiency and reliability of content delivery by contributing the reduction of data access delay, bandwidth usage, and packet losses in resource-limited low-rate wireless sensor networks. In this paper, we propose an efficient cache placement protocol (BCDA) that minimizes data access cost and guarantees cache consistency in a lightweight manner. The BCDA decides where to store a copy of data content in a network using a distributed approach according to clients' access patterns, memory capacity, data size, and so on. To evaluate the feasibility and effectiveness, we implemented the BCDA in ns-2 and compared its performance with existing caching strategies. The simulation results highlight that the BCDA significantly reduces data access cost with minimizing cache management cost.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards proactive SDN-controller attack and failure resilience 主动sdn控制器攻击与故障恢复
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876169
M. Azab, J. Fortes
SDN networks rely mainly on a set of software defined modules, running on generic hardware platforms, and managed by a central SDN controller. The tight coupling and lack of isolation between the controller and the underlying host limit the controller resilience against host-based attacks and failures. That controller is a single point of failure and a target for attackers. “Linux-containers” is a successful thin virtualization technique that enables encapsulated, host-isolated execution-environments for running applications. In this paper we present PAFR, a controller sandboxing mechanism based on Linux-containers. PAFR enables controller/host isolation, plug-and-play operation, failure-and-attack-resilient execution, and fast recovery. PAFR employs and manages live remote checkpointing and migration between different hosts to evade failures and attacks. Experiments and simulations show that the frequent employment of PAFR's live-migration minimizes the chance of successful attack/failure with limited to no impact on network performance.
SDN网络主要依赖于一组软件定义的模块,运行在通用的硬件平台上,由中央SDN控制器进行管理。控制器和底层主机之间的紧密耦合和缺乏隔离限制了控制器抵御基于主机的攻击和故障的弹性。该控制器是单点故障,也是攻击者的目标。“linux -容器”是一种成功的瘦虚拟化技术,它为运行的应用程序提供了封装的、主机隔离的执行环境。本文提出了一种基于linux容器的控制器沙箱机制PAFR。PAFR支持控制器/主机隔离、即插即用操作、故障和攻击弹性执行以及快速恢复。PAFR采用并管理实时远程检查点和不同主机之间的迁移,以避免故障和攻击。实验和模拟表明,频繁使用PAFR的实时迁移可以最大限度地减少成功攻击/失败的机会,而对网络性能的影响有限或没有影响。
{"title":"Towards proactive SDN-controller attack and failure resilience","authors":"M. Azab, J. Fortes","doi":"10.1109/ICCNC.2017.7876169","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876169","url":null,"abstract":"SDN networks rely mainly on a set of software defined modules, running on generic hardware platforms, and managed by a central SDN controller. The tight coupling and lack of isolation between the controller and the underlying host limit the controller resilience against host-based attacks and failures. That controller is a single point of failure and a target for attackers. “Linux-containers” is a successful thin virtualization technique that enables encapsulated, host-isolated execution-environments for running applications. In this paper we present PAFR, a controller sandboxing mechanism based on Linux-containers. PAFR enables controller/host isolation, plug-and-play operation, failure-and-attack-resilient execution, and fast recovery. PAFR employs and manages live remote checkpointing and migration between different hosts to evade failures and attacks. Experiments and simulations show that the frequent employment of PAFR's live-migration minimizes the chance of successful attack/failure with limited to no impact on network performance.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130335810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A new index of hidden workload for firewall rule processing on virtual machine 一种用于虚拟机防火墙规则处理的隐藏工作负载索引
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876203
Dai Suzuki, Satoshi Imai, T. Katagiri
Network Functions Virtualization (NFV) is a technology for running software-based functions on commodity hardware, which can lead to cost savings and flexible functionality. However, due to the software processing of network functions, the performance of Virtualized Network Functions (VNFs) is considerably degraded in relation to the types of VNFs and the configuration of VNF applications. Therefore, for a practical NFV system, grasping the accurate workload of VNF applications and managing the VNF performance are important. This paper focuses on analysis of a virtual firewall as a representative VNF. We first reveal new insights about the performance characteristics of the virtual firewall through preliminary experiments. Furthermore, we propose a method for estimating the hidden workload of the virtual firewall by using the number of rules in an Access Control List (ACL) and the traffic volume for each rule. Finally, we show the effectiveness of the proposed methods.
网络功能虚拟化(Network Functions Virtualization, NFV)是一种在商用硬件上运行基于软件的功能的技术,它可以节省成本并提供灵活的功能。然而,由于网络功能的软件处理,虚拟网络功能的性能与虚拟网络功能的类型和虚拟网络功能应用的配置有很大的关系。因此,对于一个实用的NFV系统来说,准确掌握VNF应用的工作负载和管理VNF的性能是非常重要的。本文着重分析了一种具有代表性的虚拟防火墙。我们首先通过初步实验揭示了关于虚拟防火墙性能特征的新见解。在此基础上,提出了一种利用访问控制列表(ACL)中的规则数和每个规则的流量来估计虚拟防火墙隐藏工作负载的方法。最后,我们证明了所提出方法的有效性。
{"title":"A new index of hidden workload for firewall rule processing on virtual machine","authors":"Dai Suzuki, Satoshi Imai, T. Katagiri","doi":"10.1109/ICCNC.2017.7876203","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876203","url":null,"abstract":"Network Functions Virtualization (NFV) is a technology for running software-based functions on commodity hardware, which can lead to cost savings and flexible functionality. However, due to the software processing of network functions, the performance of Virtualized Network Functions (VNFs) is considerably degraded in relation to the types of VNFs and the configuration of VNF applications. Therefore, for a practical NFV system, grasping the accurate workload of VNF applications and managing the VNF performance are important. This paper focuses on analysis of a virtual firewall as a representative VNF. We first reveal new insights about the performance characteristics of the virtual firewall through preliminary experiments. Furthermore, we propose a method for estimating the hidden workload of the virtual firewall by using the number of rules in an Access Control List (ACL) and the traffic volume for each rule. Finally, we show the effectiveness of the proposed methods.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outage-based cooperative resource competition game in LTE-A small cell networks LTE-A小蜂窝网络中基于中断的合作资源竞争博弈
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876097
Chia-Lin Tsai, Pei-Rong Li, Kai-Ten Feng
To alleviate greenhouse effect, high network energy efficiency (EE) has increasingly become an important research target in wireless communication systems. In this paper, the investigation for resource blocks (RBs) and transmit power allocation to mitigate co-tier interference in small cell networks is provided. In view of the drawbacks for considerable computational loadings and the acquisition for global channel information under centralized control, this paper proposes a framework based on a cooperative game to distributively perform resource allocation with only limited information. Moreover, the outage probability analyses for both perfect and imperfect channel state information at the transmitter (CSIT) are discussed in this paper. Furthermore, a regret-based learning algorithm for the proposed outage-based cooperative resource competition game (OCRC) to reach the correlated equilibrium (CE) is adapted. Simulation results verify the convergence in proposed OCRC scheme. Additionally, the proposed OCRC scheme can maintain and provide better EE performance compared to equal power allocation (EPA) scheme with imperfect CSIT.
为了缓解温室效应,提高网络能效日益成为无线通信系统的重要研究方向。本文研究了小蜂窝网络中的资源块(RBs)和传输功率分配,以减少协同层干扰。针对集中控制下计算量大、获取全局信道信息的缺点,提出了一种基于合作博弈的框架,在有限信息下进行资源分配。此外,本文还讨论了发射机完全和不完全信道状态信息(CSIT)下的中断概率分析。在此基础上,提出了一种基于遗憾的学习算法来求解基于中断的资源竞争博弈(OCRC),以达到相关均衡(CE)。仿真结果验证了OCRC方案的收敛性。此外,与具有不完善CSIT的等功率分配(EPA)方案相比,所提出的OCRC方案能够保持并提供更好的能效性能。
{"title":"Outage-based cooperative resource competition game in LTE-A small cell networks","authors":"Chia-Lin Tsai, Pei-Rong Li, Kai-Ten Feng","doi":"10.1109/ICCNC.2017.7876097","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876097","url":null,"abstract":"To alleviate greenhouse effect, high network energy efficiency (EE) has increasingly become an important research target in wireless communication systems. In this paper, the investigation for resource blocks (RBs) and transmit power allocation to mitigate co-tier interference in small cell networks is provided. In view of the drawbacks for considerable computational loadings and the acquisition for global channel information under centralized control, this paper proposes a framework based on a cooperative game to distributively perform resource allocation with only limited information. Moreover, the outage probability analyses for both perfect and imperfect channel state information at the transmitter (CSIT) are discussed in this paper. Furthermore, a regret-based learning algorithm for the proposed outage-based cooperative resource competition game (OCRC) to reach the correlated equilibrium (CE) is adapted. Simulation results verify the convergence in proposed OCRC scheme. Additionally, the proposed OCRC scheme can maintain and provide better EE performance compared to equal power allocation (EPA) scheme with imperfect CSIT.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of beacon coverage on clustering strategies for fingerprinting localization system 信标覆盖对指纹定位系统聚类策略的影响
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876124
P. Sadhukhan, K. Dahal, Zeeshan Pervez
Among the various indoor localization systems, received signal strength (RSS) based fingerprinting localization provides most cost-effective solution as it uses the existing wireless network infrastructure. The positioning accuracy of such localization systems can be improved by incorporating huge number of training data, which in turn, increases the searching overhead of such localization systems. Several clustering strategies for fingerprinting localization have been proposed in literature in order to reduce the searching overhead. On the other hand, placement strategy of beacon nodes within the field of localization has significant influence on the performances of clustering strategies for fingerprinting localization. Two important factors associated with some beacon placement strategy are the degree of beacon coverage and the distribution of beacon nodes. In this paper, we present an optimal beacon placement strategy that meets a k-coverage visibility requirement for beacons at every point within the field of localization. Next, we demonstrate the impact of beacon coverage on the performance of several clustering strategies suitable for a large-scale fingerprinting localization system.
在各种室内定位系统中,基于接收信号强度(RSS)的指纹定位系统是最经济有效的解决方案,因为它利用了现有的无线网络基础设施。这种定位系统的定位精度可以通过纳入大量的训练数据来提高,但这反过来又增加了这种定位系统的搜索开销。为了减少搜索开销,文献中提出了几种用于指纹定位的聚类策略。另一方面,信标节点在定位区域内的放置策略对指纹定位聚类策略的性能有显著影响。与信标放置策略相关的两个重要因素是信标覆盖的程度和信标节点的分布。在本文中,我们提出了一种最优信标放置策略,该策略满足定位区域内每个点信标的k覆盖可见性要求。接下来,我们展示了信标覆盖对适合大规模指纹定位系统的几种聚类策略性能的影响。
{"title":"Impact of beacon coverage on clustering strategies for fingerprinting localization system","authors":"P. Sadhukhan, K. Dahal, Zeeshan Pervez","doi":"10.1109/ICCNC.2017.7876124","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876124","url":null,"abstract":"Among the various indoor localization systems, received signal strength (RSS) based fingerprinting localization provides most cost-effective solution as it uses the existing wireless network infrastructure. The positioning accuracy of such localization systems can be improved by incorporating huge number of training data, which in turn, increases the searching overhead of such localization systems. Several clustering strategies for fingerprinting localization have been proposed in literature in order to reduce the searching overhead. On the other hand, placement strategy of beacon nodes within the field of localization has significant influence on the performances of clustering strategies for fingerprinting localization. Two important factors associated with some beacon placement strategy are the degree of beacon coverage and the distribution of beacon nodes. In this paper, we present an optimal beacon placement strategy that meets a k-coverage visibility requirement for beacons at every point within the field of localization. Next, we demonstrate the impact of beacon coverage on the performance of several clustering strategies suitable for a large-scale fingerprinting localization system.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Duet: An adaptive algorithm for the coexistence of LTE-U and WiFi in Unlicensed spectrum Duet:一种LTE-U和WiFi在免授权频谱中共存的自适应算法
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876095
Yubing Jian, U. Moravapalle, Chao-Fang Shih, Raghupathy Sivakumar
LTE in Unlicensed band (LTE-U) has gained intensive attention recently due to its capability to offload mobile data to unlicensed bands. In order to use unlicensed band, LTE-U has to coexist with WiFi - another wireless technology that operates in unlicensed bands. This coexistence is riddled with several challenges as these technologies use different core networks, backhauls and deployment plans. Within this broad paradigm, we present Duet, a Medium Access Control (MAC) layer solution that enables both LTE-U and WiFi nodes to operate fairly and efficiently, with the following properties: (1) no changes in WiFi framework, (2) high performance of LTE-U and WiFi networks within static and dynamic load scenarios, and (3) robustness to fully and partially connected networks. Using ns-3, we simulate Duet in various scenarios and show that Duet can improve the overall network throughput by up to 74%.
LTE in unlicensing band (LTE- u)由于能够将移动数据卸载到非授权频段而受到了广泛关注。为了使用未授权频段,LTE-U必须与另一种在未授权频段上运行的无线技术WiFi共存。由于这些技术使用不同的核心网络、回程和部署计划,这种共存充满了一些挑战。在这个广泛的范例中,我们提出了Duet,一种介质访问控制(MAC)层解决方案,使LTE-U和WiFi节点能够公平有效地运行,具有以下特性:(1)WiFi框架没有变化,(2)LTE-U和WiFi网络在静态和动态负载场景下的高性能,以及(3)对完全和部分连接网络的鲁棒性。使用ns-3,我们在各种场景中模拟了Duet,并表明Duet可以将整体网络吞吐量提高高达74%。
{"title":"Duet: An adaptive algorithm for the coexistence of LTE-U and WiFi in Unlicensed spectrum","authors":"Yubing Jian, U. Moravapalle, Chao-Fang Shih, Raghupathy Sivakumar","doi":"10.1109/ICCNC.2017.7876095","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876095","url":null,"abstract":"LTE in Unlicensed band (LTE-U) has gained intensive attention recently due to its capability to offload mobile data to unlicensed bands. In order to use unlicensed band, LTE-U has to coexist with WiFi - another wireless technology that operates in unlicensed bands. This coexistence is riddled with several challenges as these technologies use different core networks, backhauls and deployment plans. Within this broad paradigm, we present Duet, a Medium Access Control (MAC) layer solution that enables both LTE-U and WiFi nodes to operate fairly and efficiently, with the following properties: (1) no changes in WiFi framework, (2) high performance of LTE-U and WiFi networks within static and dynamic load scenarios, and (3) robustness to fully and partially connected networks. Using ns-3, we simulate Duet in various scenarios and show that Duet can improve the overall network throughput by up to 74%.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Distributed cache for efficient content sharing in heterogeneous networks 有效的内容共享的分布式缓存异构网络
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876174
Jianbin Chuan, Li Wang, Shuangshuang Ma
Distributed cache at mobile user devices and small base stations (SBSs) can improve the efficiency and reduce the delay for content dissemination in heterogeneous cellular networks (HetNets). One major challenge lies in the limited storage capacity of the participating mobile devices and SBSs. This paper investigates the design of an effective distributed content cache policy with heterogeneity (DCP-H) based on erasure code in terms of SBSs and mobile devices by considering sociality characteristics and physical communication conditions. The key feature of our proposed scheme lies in the PageRank algorithm based design, in which the transmit power and delivery delay is optimized through optimizing the cache states of content items to maximize cache hit ratio. Numerical results demonstrate the performance and advantage of our proposed scheme.
在移动用户设备和小型基站(SBSs)上的分布式缓存可以提高异构蜂窝网络(HetNets)中内容分发的效率和减少延迟。一个主要挑战是参与的移动设备和sbs的存储容量有限。本文在考虑社交特性和物理通信条件的基础上,研究了一种基于擦除码的高效异构分布式内容缓存策略(DCP-H)的设计。该方案的关键特点在于基于PageRank算法的设计,通过优化内容项的缓存状态来优化发送功率和传递延迟,使缓存命中率最大化。数值结果验证了所提方案的性能和优越性。
{"title":"Distributed cache for efficient content sharing in heterogeneous networks","authors":"Jianbin Chuan, Li Wang, Shuangshuang Ma","doi":"10.1109/ICCNC.2017.7876174","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876174","url":null,"abstract":"Distributed cache at mobile user devices and small base stations (SBSs) can improve the efficiency and reduce the delay for content dissemination in heterogeneous cellular networks (HetNets). One major challenge lies in the limited storage capacity of the participating mobile devices and SBSs. This paper investigates the design of an effective distributed content cache policy with heterogeneity (DCP-H) based on erasure code in terms of SBSs and mobile devices by considering sociality characteristics and physical communication conditions. The key feature of our proposed scheme lies in the PageRank algorithm based design, in which the transmit power and delivery delay is optimized through optimizing the cache states of content items to maximize cache hit ratio. Numerical results demonstrate the performance and advantage of our proposed scheme.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure coded caching in wireless ad hoc networks 无线自组织网络中的安全编码缓存
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876159
Mohsen Karimzadeh Kiskani, H. Sadjadpour
A decentralized coded caching technique is introduced for wireless ad hoc networks in which all the existing contents are randomly combined and cached. The scaling behavior of the network is studied in terms of both capacity and security. Proactive and reactive routing techniques for coded caching are presented and the scaling capacity of the network for each case is derived. It has been shown that by using reactive routing, any content can be retrieved by selecting a random path while providing asymptotic optimum solution. The proposed coded caching significantly simplifies the routing protocol in cached networks. We further prove that asymptotic perfect secrecy can be achieved using proposed coded caching scheme.
针对无线自组织网络中所有现有内容的随机组合和缓存,提出了一种分散编码缓存技术。从容量和安全性两个方面研究了网络的扩展行为。提出了用于编码缓存的主动和被动路由技术,并推导了每种情况下网络的扩展容量。结果表明,利用无功路由,在提供渐近最优解的同时,可以通过选择随机路径来检索任意内容。所提出的编码缓存大大简化了缓存网络中的路由协议。进一步证明了所提出的编码缓存方案可以实现渐近完全保密。
{"title":"Secure coded caching in wireless ad hoc networks","authors":"Mohsen Karimzadeh Kiskani, H. Sadjadpour","doi":"10.1109/ICCNC.2017.7876159","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876159","url":null,"abstract":"A decentralized coded caching technique is introduced for wireless ad hoc networks in which all the existing contents are randomly combined and cached. The scaling behavior of the network is studied in terms of both capacity and security. Proactive and reactive routing techniques for coded caching are presented and the scaling capacity of the network for each case is derived. It has been shown that by using reactive routing, any content can be retrieved by selecting a random path while providing asymptotic optimum solution. The proposed coded caching significantly simplifies the routing protocol in cached networks. We further prove that asymptotic perfect secrecy can be achieved using proposed coded caching scheme.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Physical layer security of multiband communications under hostile jamming 敌对干扰下多波段通信物理层安全研究
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876152
Tianlong Song, Yuan Liang, Tongtong Li
This paper considers a game between a power-limited authorized user and a power-limited jammer, who operate independently over the same AWGN channel consisting of multiple bands. We explore the possibility for the authorized user or the jammer to randomly utilize part (or all) of the available spectrum and/or apply nonuniform power allocation. It is found that: either for the authorized user to maximize its capacity, or for the jammer to minimize the capacity of the authorized user, the best strategy for both of them is to distribute the transmission power or jamming power uniformly over all the available spectrum. The minimax capacity can be calculated based on the channel bandwidth and the signal to jamming and noise ratio, and it matches with the Shannon channel capacity formula. Numerical results are provided to illustrate the theoretical analysis.
本文考虑在由多个频带组成的同一AWGN信道上独立运行的功率受限授权用户和功率受限干扰机之间的博弈。我们探索授权用户或干扰者随机利用部分(或全部)可用频谱和/或应用非均匀功率分配的可能性。研究发现:无论是授权用户的容量最大化,还是干扰者的容量最小化,两者的最佳策略都是在所有可用频谱上均匀分配发射功率或干扰功率。根据信道带宽和信噪比计算出最小最大容量,与香农信道容量公式相匹配。给出了数值结果来说明理论分析。
{"title":"Physical layer security of multiband communications under hostile jamming","authors":"Tianlong Song, Yuan Liang, Tongtong Li","doi":"10.1109/ICCNC.2017.7876152","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876152","url":null,"abstract":"This paper considers a game between a power-limited authorized user and a power-limited jammer, who operate independently over the same AWGN channel consisting of multiple bands. We explore the possibility for the authorized user or the jammer to randomly utilize part (or all) of the available spectrum and/or apply nonuniform power allocation. It is found that: either for the authorized user to maximize its capacity, or for the jammer to minimize the capacity of the authorized user, the best strategy for both of them is to distribute the transmission power or jamming power uniformly over all the available spectrum. The minimax capacity can be calculated based on the channel bandwidth and the signal to jamming and noise ratio, and it matches with the Shannon channel capacity formula. Numerical results are provided to illustrate the theoretical analysis.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121924777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel single agent quantum bit commitment scheme 一种新颖的单agent量子比特承诺方案
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876114
Linxi Zhang, Nan Zhao, Changxing Pei, Long Wang
Quantum cryptography is believed to be unbreakable in theory because of the laws of quantum mechanics. Numerous experiments have demonstrated the feasibility of quantum cryptography and a complete proof of the unconditional security of some main schemes. However, in practice all devices need trusting by each other firstly during the process of quantum key distribution(QKD). For identifying the reliability, we propose a quantum bit commitment protocol that can be regarded as the primitive of authentication protocol in QKD networks. In this protocol we complete bit commitment merely by one agent, and prove the security of the schemes. Compared with other protocols, our schemes have less requirement for additional hardware and lower complexity in implementation.
由于量子力学的定律,量子密码学理论上被认为是牢不可破的。大量的实验证明了量子密码学的可行性,并完整地证明了一些主要方案的无条件安全性。然而,在实践中,在量子密钥分发(QKD)过程中,所有设备首先需要彼此信任。为了识别可靠性,我们提出了一个量子比特承诺协议,该协议可以看作是QKD网络中认证协议的原语。在该协议中,我们仅通过一个代理就完成了比特承诺,并证明了方案的安全性。与其他协议相比,我们的方案对附加硬件的需求较少,实现的复杂性也较低。
{"title":"A novel single agent quantum bit commitment scheme","authors":"Linxi Zhang, Nan Zhao, Changxing Pei, Long Wang","doi":"10.1109/ICCNC.2017.7876114","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876114","url":null,"abstract":"Quantum cryptography is believed to be unbreakable in theory because of the laws of quantum mechanics. Numerous experiments have demonstrated the feasibility of quantum cryptography and a complete proof of the unconditional security of some main schemes. However, in practice all devices need trusting by each other firstly during the process of quantum key distribution(QKD). For identifying the reliability, we propose a quantum bit commitment protocol that can be regarded as the primitive of authentication protocol in QKD networks. In this protocol we complete bit commitment merely by one agent, and prove the security of the schemes. Compared with other protocols, our schemes have less requirement for additional hardware and lower complexity in implementation.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1