首页 > 最新文献

J. Networks最新文献

英文 中文
A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags 基于部分标识符的EPCglobal类-1 Gen-2标签轻量级认证协议
Pub Date : 2015-06-29 DOI: 10.4304/jnw.10.6.369-375
Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang
RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags. These tags have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. Lightweight authentication protocols are considered as an effective method to solve the security and privacy of low-cost RFID tags. We propose a novel lightweight authentication protocol by means of some functions provided by EPCglobal Class-1 Gen-2 tags. The protocol enhances the difficulty to reveal the tag’s secrecy by using the tag’s partial identifier to generate the session messages between the tag and the reader. The tag’s partial identifier is generated randomly for each authentication. Otherwise, the tag’s identifier is randomly divided into two separate parts so as to avoid colliding from the 16-bit cyclic redundancy coding function. Some random numbers, which are generated by the tag and the reader respectively, randomize the session messages between the tag and the reader so as to resist against tracing attack and replay attack. Our proposed protocol can assure forward security and it can resist against de-synchronized attack. This protocol only uses some lightweight functions and it is very suitable to low-cost RFID tags
RFID是一项关键技术,可以用来创造无处不在的社会。标签是RFID系统的重要组成部分,目前最流行的标签是一些低成本的无源标签。这些标签的计算和存储资源有限,安全性和隐私性也没有得到更多的关注。所以这些标签的应用是不安全的。轻量级认证协议被认为是解决低成本RFID标签安全性和保密性的有效方法。我们利用EPCglobal Class-1 Gen-2标签提供的一些功能,提出了一种新的轻量级认证协议。该协议利用标签的部分标识符生成标签与阅读器之间的会话消息,提高了标签保密的难度。标记的部分标识符是为每个身份验证随机生成的。否则,标签的标识符被随机分成两个独立的部分,以避免16位循环冗余编码功能的碰撞。标签和读写器分别生成一些随机数,将标签和读写器之间的会话消息随机化,以抵御跟踪攻击和重放攻击。所提出的协议既能保证转发安全性,又能抵抗去同步攻击。该协议只使用了一些轻量级的功能,非常适用于低成本的RFID标签
{"title":"A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags","authors":"Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang","doi":"10.4304/jnw.10.6.369-375","DOIUrl":"https://doi.org/10.4304/jnw.10.6.369-375","url":null,"abstract":"RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags. These tags have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. Lightweight authentication protocols are considered as an effective method to solve the security and privacy of low-cost RFID tags. We propose a novel lightweight authentication protocol by means of some functions provided by EPCglobal Class-1 Gen-2 tags. The protocol enhances the difficulty to reveal the tag’s secrecy by using the tag’s partial identifier to generate the session messages between the tag and the reader. The tag’s partial identifier is generated randomly for each authentication. Otherwise, the tag’s identifier is randomly divided into two separate parts so as to avoid colliding from the 16-bit cyclic redundancy coding function. Some random numbers, which are generated by the tag and the reader respectively, randomize the session messages between the tag and the reader so as to resist against tracing attack and replay attack. Our proposed protocol can assure forward security and it can resist against de-synchronized attack. This protocol only uses some lightweight functions and it is very suitable to low-cost RFID tags","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"57 1","pages":"369-375"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74790379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fair Relay Selection Based on Mapping Functions in the Dual Hop DF Cooperative Networks 双跳DF合作网络中基于映射函数的公平中继选择
Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.302-310
Kun Xiao, Cailing Qin, C. Tan, Lili Liao, Chong Dang
We address the load balance, referred as “fairness” in our work, in the relay selection procedure of the dual hop decode-and-forward (DF) cooperative networks. Firstly, the unfairness caused by the known best-path relay selection (BRS) scheme is analyzed by the metric of blocking probability at the relays with equal relay channels. Secondly, aiming to improve the fairness while keeping a satisfied and comparable outage performance, we propose a fair relay selection algorithm based on mapping functions, including the signal to noise ratio (SNR) mapping functions and load mapping functions. It is worth mentioning that BRS scheme can be viewed as a special case of the proposed algorithm. Afterwards, the outage probability of the proposed algorithm is derived. During the derivation, the mixture Gamma distribution is used to model SNRs of wireless fading channels, so this kind of derivation is valid for different fading channels, e.g. Rayleigh, Nakagami-m etc.. Finally, taking the average load and outage probability as performance metrics, we simulated the proposed algorithm and compared it with the proportional fair cooperation (PFC) algorithm in the literature. As observed in the simulation results, the proposed algorithm guarantees fairness well among the relays, especially when the network is heavily burdened
在双跳解码转发(DF)合作网络的中继选择过程中,我们解决了负载平衡问题,在我们的工作中称为“公平性”。首先,利用等信道中继的阻塞概率度量分析了已知最优路径中继选择(BRS)方案的不公平性;其次,为了提高公平性,同时保持满意的可比较的中断性能,我们提出了一种基于映射函数的公平中继选择算法,包括信噪比映射函数和负载映射函数。值得一提的是,BRS方案可以看作是该算法的一个特例。然后,推导了该算法的中断概率。在推导过程中,采用混合伽玛分布对无线衰落信道的信噪比进行建模,因此这种推导对不同的衰落信道(如Rayleigh、Nakagami-m等)都是有效的。最后,以平均负载和中断概率为性能指标,对所提算法进行仿真,并与文献中的比例公平合作(PFC)算法进行比较。仿真结果表明,该算法能够很好地保证中继之间的公平性,特别是在网络负荷较大的情况下
{"title":"A Fair Relay Selection Based on Mapping Functions in the Dual Hop DF Cooperative Networks","authors":"Kun Xiao, Cailing Qin, C. Tan, Lili Liao, Chong Dang","doi":"10.4304/jnw.10.5.302-310","DOIUrl":"https://doi.org/10.4304/jnw.10.5.302-310","url":null,"abstract":"We address the load balance, referred as “fairness” in our work, in the relay selection procedure of the dual hop decode-and-forward (DF) cooperative networks. Firstly, the unfairness caused by the known best-path relay selection (BRS) scheme is analyzed by the metric of blocking probability at the relays with equal relay channels. Secondly, aiming to improve the fairness while keeping a satisfied and comparable outage performance, we propose a fair relay selection algorithm based on mapping functions, including the signal to noise ratio (SNR) mapping functions and load mapping functions. It is worth mentioning that BRS scheme can be viewed as a special case of the proposed algorithm. Afterwards, the outage probability of the proposed algorithm is derived. During the derivation, the mixture Gamma distribution is used to model SNRs of wireless fading channels, so this kind of derivation is valid for different fading channels, e.g. Rayleigh, Nakagami-m etc.. Finally, taking the average load and outage probability as performance metrics, we simulated the proposed algorithm and compared it with the proportional fair cooperation (PFC) algorithm in the literature. As observed in the simulation results, the proposed algorithm guarantees fairness well among the relays, especially when the network is heavily burdened","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"95 1","pages":"302-310"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73141193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers 云计算数据中心节能多级网络资源管理
Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.273-280
Y. Jararweh, H. Ababneh, M. Alhammouri, L. Tawalbeh
Energy efficiency is a major issue in Cloud computing infrastructure. The large power consumption is mainly attributed to the large number of modern data centers operating within. Developing these data centers includes dynamically expanding their infrastructures to meet the ever-increasing demand for huge computation, large storage, and massive communication. Energy conservation through optimization of resources and management policies in the Cloud are a viable solution. Using virtualization to save power and employing such practices as using Virtual Machines (VMs), Server Consolidation, and VM Live Migration. This paper investigates the opportunities for Green Cloud Computing (GCC) to obtain a more comprehensive prospect towards achieving energy efficient Cloud Computing, and presents an energy efficient network resources management approach in an Infrastructure as a Service (IaaS) Cloud model. We focus on developing an energy efficient algorithm by proposing a practical multi-level Cloud Resource-Network Management (CRNM) algorithm, which is implemented in a virtual Cloud environment using Snooze framework as the Cloud energy efficiency manager. The optimization focuses on the utilization of network bandwidth as main resource under test, while also taking into account the other resources, such as CPU and memory, to get the desired performance. We choose a fat tree topology as a common three tier architecture for Cloud data canters. We conclude that our proposed algorithm will save up to 75% of power consumption in Cloud data centers, with an observed increase in efficiency compared to Non-Power Aware (NPA), Power aware(PA), and Greedy algorithms, where network elements consume about 30% of the total power of Cloud data centers.
能源效率是云计算基础设施中的一个主要问题。大量的电力消耗主要归因于大量的现代数据中心在其中运行。开发这些数据中心包括动态扩展其基础设施,以满足对巨大计算、大存储和海量通信不断增长的需求。通过优化云中的资源和管理策略来实现节能是一个可行的解决方案。使用虚拟化来节省电力,并采用诸如使用虚拟机(VM)、服务器整合和虚拟机热迁移等实践。本文研究了绿色云计算(GCC)在实现节能云计算方面获得更全面前景的机会,并在基础设施即服务(IaaS)云模型中提出了一种节能网络资源管理方法。我们通过提出一种实用的多级云资源网络管理(CRNM)算法,专注于开发一种节能算法,该算法使用snoze框架作为云能效管理器在虚拟云环境中实现。优化的重点是将网络带宽作为主要被测资源的利用率,同时也考虑到其他资源,如CPU和内存,以获得理想的性能。我们选择胖树拓扑作为云数据中心的通用三层架构。我们得出的结论是,我们提出的算法将在云数据中心节省高达75%的功耗,与非功率感知(NPA)、功率感知(PA)和贪婪算法相比,效率有所提高,其中网络元素消耗约占云数据中心总功耗的30%。
{"title":"Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers","authors":"Y. Jararweh, H. Ababneh, M. Alhammouri, L. Tawalbeh","doi":"10.4304/jnw.10.5.273-280","DOIUrl":"https://doi.org/10.4304/jnw.10.5.273-280","url":null,"abstract":"Energy efficiency is a major issue in Cloud computing infrastructure. The large power consumption is mainly attributed to the large number of modern data centers operating within. Developing these data centers includes dynamically expanding their infrastructures to meet the ever-increasing demand for huge computation, large storage, and massive communication. Energy conservation through optimization of resources and management policies in the Cloud are a viable solution. Using virtualization to save power and employing such practices as using Virtual Machines (VMs), Server Consolidation, and VM Live Migration. This paper investigates the opportunities for Green Cloud Computing (GCC) to obtain a more comprehensive prospect towards achieving energy efficient Cloud Computing, and presents an energy efficient network resources management approach in an Infrastructure as a Service (IaaS) Cloud model. We focus on developing an energy efficient algorithm by proposing a practical multi-level Cloud Resource-Network Management (CRNM) algorithm, which is implemented in a virtual Cloud environment using Snooze framework as the Cloud energy efficiency manager. The optimization focuses on the utilization of network bandwidth as main resource under test, while also taking into account the other resources, such as CPU and memory, to get the desired performance. We choose a fat tree topology as a common three tier architecture for Cloud data canters. We conclude that our proposed algorithm will save up to 75% of power consumption in Cloud data centers, with an observed increase in efficiency compared to Non-Power Aware (NPA), Power aware(PA), and Greedy algorithms, where network elements consume about 30% of the total power of Cloud data centers.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"45 1","pages":"273-280"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85108690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping 比较回顾:用于原型设计的精确OpenFlow仿真工具
Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.322-327
Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun
Several Simulation and emulation tools such as the OMNeT++ INET Framework and Mininet have been developed to evaluate the performance of Software-Defined Networking (SDN). A major challenge is how to analyse the obtained performance results of data transmission for these tools. These challenges include scaling to large networks, testing the correctness and evaluating the performance with the ability to easily migrate to a real system with minimal changes for deployment. Current methods for testing the functions and evaluating the performances of SDN include new programming languages, static analysis and debugging capability, and innovative frameworks of simulation tools. In this paper, we describe the implementation model of OpenFlow system in the INET framework for OMNeT++. The simulation approaches were designed for prototyping and evaluating new SDN-based applications accurately at low cost, while being flexible, scalable, controllable, and accessible to many users. We describe the design and the use of the simulation modules, and demonstrate its capability by carrying out a series of experiments. In addition, we compare the OpenFlow functions of OMNeT++ simulator with the popular Mininet emulator in identical traffic configurations. The measurement results derived from both tools show that they are correct, accurate, and repeatable regarding their capabilities, performance, and functionalities
一些仿真和仿真工具,如omnet++ INET框架和Mininet已经开发出来,以评估软件定义网络(SDN)的性能。一个主要的挑战是如何分析这些工具获得的数据传输性能结果。这些挑战包括扩展到大型网络,测试正确性和评估性能,以及通过最小的部署更改轻松迁移到实际系统的能力。目前测试SDN功能和评估SDN性能的方法包括新的编程语言、静态分析和调试能力以及创新的仿真工具框架。本文描述了OpenFlow系统在omnet++的INET框架下的实现模型。仿真方法旨在以低成本准确地对基于sdn的新应用进行原型设计和评估,同时具有灵活性、可扩展性、可控性和可访问性。本文描述了仿真模块的设计和使用,并通过一系列实验证明了其功能。此外,在相同的流量配置下,我们比较了omnet++模拟器的OpenFlow函数与流行的Mininet模拟器。从这两种工具得到的测量结果表明,它们在能力、性能和功能方面是正确的、准确的和可重复的
{"title":"A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping","authors":"Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun","doi":"10.4304/jnw.10.5.322-327","DOIUrl":"https://doi.org/10.4304/jnw.10.5.322-327","url":null,"abstract":"Several Simulation and emulation tools such as the OMNeT++ INET Framework and Mininet have been developed to evaluate the performance of Software-Defined Networking (SDN). A major challenge is how to analyse the obtained performance results of data transmission for these tools. These challenges include scaling to large networks, testing the correctness and evaluating the performance with the ability to easily migrate to a real system with minimal changes for deployment. Current methods for testing the functions and evaluating the performances of SDN include new programming languages, static analysis and debugging capability, and innovative frameworks of simulation tools. In this paper, we describe the implementation model of OpenFlow system in the INET framework for OMNeT++. The simulation approaches were designed for prototyping and evaluating new SDN-based applications accurately at low cost, while being flexible, scalable, controllable, and accessible to many users. We describe the design and the use of the simulation modules, and demonstrate its capability by carrying out a series of experiments. In addition, we compare the OpenFlow functions of OMNeT++ simulator with the popular Mininet emulator in identical traffic configurations. The measurement results derived from both tools show that they are correct, accurate, and repeatable regarding their capabilities, performance, and functionalities","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"17 1","pages":"322-327"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73245884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distance based Reliable and Energy Efficient (DREE) Routing Protocol for Underwater Acoustic Sensor Networks 基于距离的水声传感器网络可靠节能路由协议
Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.311-321
M. Tariq, M. Latif, M. Ayaz, Yahaya Coulibaly, Nadera Al-Areqi
The distinctive features of Underwater Acoustic Sensor Networks (UW-ASN) such as high propagation delay, asymmetric channels, high errors rates and limited bandwidth cause significant issues due to the use of acoustic medium as a method of communication. Therefore, designing an efficient underwater protocol that make efficient use of available battery resources and provides reliability in unreliable acoustic environment is a challenging task. In this paper, we therefore present a distance based reliable and energy efficient routing protocol (DREE). The contribution in this routing protocol is twofold 1) DREE actually takes in to account physical distance unlike similar protocol R-ERP 2 R where physical distance has not been utilized 2) DREE utilizes Fuzzy logic based link Quality Estimator (F-LQE) which has not been put on the test before in underwater networks. Moreover, DREE extends network lifetime not only by providing energy balancing but by reducing number of transmissions required to deliver a packet successfully. Experiments performed in NS2 simulator prove that DREE contributes to improve results in comparison with R-ERP 2 R which is the similar and only distance based reliable protocol present in literature and well known depth based routing protocol DBR
水声传感器网络(UW-ASN)的显著特征,如高传播延迟、非对称信道、高错误率和有限带宽,由于使用声学介质作为通信方法,导致了重大问题。因此,设计一种高效的水下协议,既能有效利用现有电池资源,又能在不可靠的声环境下提供可靠性,是一项具有挑战性的任务。因此,在本文中,我们提出了一种基于距离的可靠节能路由协议(ree)。该路由协议的贡献是双重的:1)DREE实际上考虑了物理距离,不像类似的协议R- erp 2r,物理距离没有被利用;2)DREE利用了基于模糊逻辑的链路质量估计器(F-LQE),这在水下网络中尚未进行过测试。此外,DREE不仅通过提供能量平衡,而且通过减少成功传递数据包所需的传输次数,延长了网络的生命周期。在NS2模拟器上进行的实验证明,与文献中唯一基于距离的可靠协议R- erp 2r和众所周知的基于深度的路由协议DBR相比,DREE有助于改善结果
{"title":"Distance based Reliable and Energy Efficient (DREE) Routing Protocol for Underwater Acoustic Sensor Networks","authors":"M. Tariq, M. Latif, M. Ayaz, Yahaya Coulibaly, Nadera Al-Areqi","doi":"10.4304/jnw.10.5.311-321","DOIUrl":"https://doi.org/10.4304/jnw.10.5.311-321","url":null,"abstract":"The distinctive features of Underwater Acoustic Sensor Networks (UW-ASN) such as high propagation delay, asymmetric channels, high errors rates and limited bandwidth cause significant issues due to the use of acoustic medium as a method of communication. Therefore, designing an efficient underwater protocol that make efficient use of available battery resources and provides reliability in unreliable acoustic environment is a challenging task. In this paper, we therefore present a distance based reliable and energy efficient routing protocol (DREE). The contribution in this routing protocol is twofold 1) DREE actually takes in to account physical distance unlike similar protocol R-ERP 2 R where physical distance has not been utilized 2) DREE utilizes Fuzzy logic based link Quality Estimator (F-LQE) which has not been put on the test before in underwater networks. Moreover, DREE extends network lifetime not only by providing energy balancing but by reducing number of transmissions required to deliver a packet successfully. Experiments performed in NS2 simulator prove that DREE contributes to improve results in comparison with R-ERP 2 R which is the similar and only distance based reliable protocol present in literature and well known depth based routing protocol DBR","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"31 1","pages":"311-321"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90688335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Forensics of Random-UDP Flooding Attacks 随机udp泛洪攻击取证
Pub Date : 2015-05-27 DOI: 10.4304/JNW.10.5.287-293
Anchit Bijalwan, M. Wazid, E. Pilli, R. Joshi
Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks are focused on confidentiality, integrity and availability of data or resources. Flooding attack is one such resource availability attack which is a great cause of concern. Hackers can use the flooding attacks and cause Distributed Denial of Service (DDoS) attack with ease. With the increase and variations in the attack mode makes the investigation of these attacks essential. Random-UDP flooding attack is a different type of attack in which the attacker sends multiple UDP datagrams of different sizes at a time. This causes denial of service to the system and its resources. In this paper, we have proposed a technique for the forensics of Random-UDP flooding attack. We have tried to get as close as possible to the source of such attacks. The proposed technique is capable to identify the source of Random-UDP flooding bot attack.
互联网对每个人生活的各个方面都有很大的影响。尽管因特网为全世界的用户提供了巨大的优势,但由于它所基于的协议栈,它也有一些固有的弱点。它可以很容易地被攻击者攻击,他们利用协议中的漏洞,破坏系统,并远程控制它们来做进一步的破坏。主要的攻击集中在数据或资源的机密性、完整性和可用性上。洪水攻击就是其中一种资源可用性攻击,引起了人们的广泛关注。黑客可以利用泛洪攻击,轻松实现分布式拒绝服务(DDoS)攻击。随着攻击方式的增加和变化,对这些攻击的研究变得至关重要。随机UDP泛洪攻击是一种不同类型的攻击,攻击者一次发送多个不同大小的UDP数据报。这会导致对系统及其资源的拒绝服务。在本文中,我们提出了一种随机udp泛洪攻击的取证技术。我们已经试图尽可能接近这类攻击的源头。提出的技术能够识别随机udp洪水僵尸攻击的来源。
{"title":"Forensics of Random-UDP Flooding Attacks","authors":"Anchit Bijalwan, M. Wazid, E. Pilli, R. Joshi","doi":"10.4304/JNW.10.5.287-293","DOIUrl":"https://doi.org/10.4304/JNW.10.5.287-293","url":null,"abstract":"Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks are focused on confidentiality, integrity and availability of data or resources. Flooding attack is one such resource availability attack which is a great cause of concern. Hackers can use the flooding attacks and cause Distributed Denial of Service (DDoS) attack with ease. With the increase and variations in the attack mode makes the investigation of these attacks essential. Random-UDP flooding attack is a different type of attack in which the attacker sends multiple UDP datagrams of different sizes at a time. This causes denial of service to the system and its resources. In this paper, we have proposed a technique for the forensics of Random-UDP flooding attack. We have tried to get as close as possible to the source of such attacks. The proposed technique is capable to identify the source of Random-UDP flooding bot attack.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"183 1","pages":"287-293"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80433633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Advance procedure for resource reservation QoSNSLP Signaling based 基于QoSNSLP信令的资源预留高级流程
Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.281-286
Abdelkarim Taam, Hjiaj Hassane, S. E. Ouatik, M. Oumsis, B. Raouyane
“Advance procedure for resource reservation QoSNSLP Signaling based” By TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim Journal of Networks Volume 10, Number 5, May 2015, Page(s): 281-286 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, the above paper has been found to be in violation of Academy Publisher’s Publication Principles. The first author (TAAM Abdelkarim) has taken full responsibility and this violation was done without the knowledge of the rest authors (HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim). This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original authors and/or paper title) and without permission: Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: Badr Benmammar, Francine Krief, “MQoS NSLP: a mobility profile management based approach for advance resource reservation in a mobile environment,” 7th IFIP IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2005) , Marrakech, Morocco, 2005.
作者:TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n oaluing mg SbIaSs eMdo, raouane Brahim Journal of Networks卷10,第5期,2015年5月,第(s)页:281-286经正式成立的专家委员会对本文的内容和作者身份进行仔细和仔细的审查,发现上述论文违反了学院出版出版原则。第一作者(TAAM Abdelkarim)已经承担了全部责任,并且在其他作者(HJIAJ Hassane, Said El Alaoui Oua Stiikg, oaluing mg SbIaSs eMdo, RAOUYANE Brahim)不知情的情况下进行了这种违规行为。这篇论文包含了下面引用的论文的重要部分原文。未经许可擅自复制原文,未注明出处(包括对原作者和/或论文标题的适当引用)。由于这一违规行为的性质,应尽合理努力删除过去对本文的所有引用,未来应引用以下文章:Badr benmamar, Francine Krief,“MQoS NSLP:移动环境中基于移动配置文件管理的预先资源预约方法,”第七届IFIP IEEE移动和无线通信网络国际会议(MWCN 2005),马拉喀什,摩洛哥,2005。
{"title":"Advance procedure for resource reservation QoSNSLP Signaling based","authors":"Abdelkarim Taam, Hjiaj Hassane, S. E. Ouatik, M. Oumsis, B. Raouyane","doi":"10.4304/jnw.10.5.281-286","DOIUrl":"https://doi.org/10.4304/jnw.10.5.281-286","url":null,"abstract":"“Advance procedure for resource reservation QoSNSLP Signaling based” By TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim Journal of Networks Volume 10, Number 5, May 2015, Page(s): 281-286 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, the above paper has been found to be in violation of Academy Publisher’s Publication Principles. The first author (TAAM Abdelkarim) has taken full responsibility and this violation was done without the knowledge of the rest authors (HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim). This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original authors and/or paper title) and without permission: Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: Badr Benmammar, Francine Krief, “MQoS NSLP: a mobility profile management based approach for advance resource reservation in a mobile environment,” 7th IFIP IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2005) , Marrakech, Morocco, 2005.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89699311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Downlink Interference Analysis in LTE-Femtocell Networks lte -飞蜂窝网络下行链路干扰分析
Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.294-301
Nirmala Sivaraj, P. Palanisamy
Aiming to cope up with relentless wireless traffic and improving link quality against high wall penetration loss, Third Generation Partnership Project proposed the heterogeneous deployment of low power indoor hot spots such as Femtocell Access Points (FAPs) over the existing cellular network topology. In this two-tier heterogeneous network (HetNet) where femtocells coexist with macrocell, the FAPs may spatially reuse the spectrum assigned to macrocell base station in an unplanned way and the mitigation of the generated co-channel interference becomes a major challenge. The problem is more severe with FAPs operating in a closed access mode, particularly in urban and sub-urban environment. In this work, the impact of interference in downlink on quality of service to macro user and femto user is analyzed by modeling the Signal-to-Interference and Noise Ratio and achieved user throughput. Simulation results show significant reduction of achieved user throughput and creation of coverage holes because of interference. It is clear that the performance of restricted access FAPs under co-channel operation need to be explicitly accounted for and optimized against both cross-tier and co-tier interference
第三代合作伙伴计划(Third Generation Partnership Project)提出了在现有蜂窝网络拓扑结构上异构部署Femtocell Access point (FAPs)等低功耗室内热点,以应对持续不断的无线流量和提高高墙透损的链路质量。在这种飞蜂窝与宏蜂窝共存的两层异构网络(HetNet)中,fap可能会以计划外的方式在空间上重用分配给宏蜂窝基站的频谱,从而减轻产生的同信道干扰成为一个主要挑战。在封闭存取模式下,特别是在城市和城郊环境中,FAPs的问题更为严重。本文通过对宏用户和femto用户的信噪比和实现的用户吞吐量建模,分析了下行链路干扰对宏用户和femto用户服务质量的影响。仿真结果表明,干扰显著降低了用户吞吐量,并造成了覆盖空洞。很明显,在同信道操作下限制接入fap的性能需要明确地考虑和优化跨层和同层干扰
{"title":"Downlink Interference Analysis in LTE-Femtocell Networks","authors":"Nirmala Sivaraj, P. Palanisamy","doi":"10.4304/jnw.10.5.294-301","DOIUrl":"https://doi.org/10.4304/jnw.10.5.294-301","url":null,"abstract":"Aiming to cope up with relentless wireless traffic and improving link quality against high wall penetration loss, Third Generation Partnership Project proposed the heterogeneous deployment of low power indoor hot spots such as Femtocell Access Points (FAPs) over the existing cellular network topology. In this two-tier heterogeneous network (HetNet) where femtocells coexist with macrocell, the FAPs may spatially reuse the spectrum assigned to macrocell base station in an unplanned way and the mitigation of the generated co-channel interference becomes a major challenge. The problem is more severe with FAPs operating in a closed access mode, particularly in urban and sub-urban environment. In this work, the impact of interference in downlink on quality of service to macro user and femto user is analyzed by modeling the Signal-to-Interference and Noise Ratio and achieved user throughput. Simulation results show significant reduction of achieved user throughput and creation of coverage holes because of interference. It is clear that the performance of restricted access FAPs under co-channel operation need to be explicitly accounted for and optimized against both cross-tier and co-tier interference","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"274 1","pages":"294-301"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80008810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Low Latency Software Routers 迈向低延迟软件路由器
Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.188-200
Torsten M. Runge, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle
Network devices based on commodity hardware are capable of high-speed packet processing while maintaining the programmability and extensibility of software. Thus, software-based network devices, like software routers, software-based firewalls, or monitoring systems, constitute a cost-efficient and flexible alternative to expensive, special purpose hardware. The overall packet processing performance in resource-constrained nodes can be strongly increased through parallel processing based on off-theshelf multi-core processors. However, synchronization and coordination of parallel processing may counteract the corresponding network node performance. We describe how multi-core software routers can be optimized for real-time traffic by utilizing the technologies available in commodity hardware. Furthermore, we propose a low latency extension for the Linux NAPI. For the analysis, we use our approach for modeling resource contention in resource-constrained nodes which is also implemented as a resource-management extension module for ns-3. Based on that, we derive a QoSaware software router model which we use to evaluate our performance optimizations. Our case study shows that the different scheduling strategies of a software router have significant influence on the performance of handling realtime traffic.
基于商用硬件的网络设备能够在保持软件可编程性和可扩展性的同时进行高速数据包处理。因此,基于软件的网络设备,如软件路由器、基于软件的防火墙或监视系统,构成了昂贵的专用硬件的一种经济高效且灵活的替代方案。通过基于现成多核处理器的并行处理,可以大大提高资源受限节点的整体数据包处理性能。然而,并行处理的同步和协调可能会影响相应的网络节点性能。我们描述了多核软件路由器如何通过利用商品硬件中可用的技术来优化实时流量。此外,我们为Linux NAPI提出了一个低延迟扩展。为了进行分析,我们使用我们的方法对资源约束节点中的资源争用进行建模,该方法也作为ns-3的资源管理扩展模块实现。在此基础上,我们推导了一个QoSaware软件路由器模型,用于评估我们的性能优化。实例研究表明,不同的调度策略对软件路由器处理实时流量的性能有显著影响。
{"title":"Towards Low Latency Software Routers","authors":"Torsten M. Runge, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle","doi":"10.4304/jnw.10.4.188-200","DOIUrl":"https://doi.org/10.4304/jnw.10.4.188-200","url":null,"abstract":"Network devices based on commodity hardware are capable of high-speed packet processing while maintaining the programmability and extensibility of software. Thus, software-based network devices, like software routers, software-based firewalls, or monitoring systems, constitute a cost-efficient and flexible alternative to expensive, special purpose hardware. The overall packet processing performance in resource-constrained nodes can be strongly increased through parallel processing based on off-theshelf multi-core processors. However, synchronization and coordination of parallel processing may counteract the corresponding network node performance. We describe how multi-core software routers can be optimized for real-time traffic by utilizing the technologies available in commodity hardware. Furthermore, we propose a low latency extension for the Linux NAPI. For the analysis, we use our approach for modeling resource contention in resource-constrained nodes which is also implemented as a resource-management extension module for ns-3. Based on that, we derive a QoSaware software router model which we use to evaluate our performance optimizations. Our case study shows that the different scheduling strategies of a software router have significant influence on the performance of handling realtime traffic.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"173 1","pages":"188-200"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77290626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Approach to Indoor Sensor Area Localization and Coverage 一种室内传感器区域定位与覆盖的混合方法
Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.209-221
M. Gai, A. Azadmanesh, A. Rezaeian
This study presents a hybrid approach to indoor object detection and tracking. A test area is partitioned into regions that are covered by sensors placed on the ceilings. The region location of an object is determined by these sensors using RSSI. The region determination is then followed by the exact localization of the object within the region using Building Information Modeling (BIM) and the 3D stereo image measurements. To determine the coverage ratio of a region for better placement of sensors, the 3D space is partitioned into 2D planes whose coverage points are determined by a newly developed software product called LOCOPac. Other than indoor localization, some simulation results of sensor distribution algorithms that are more suitable for outdoor applications will also be presented. Based on the experimental and simulation results, the proposed approach to indoor localization and LOCOPac has the potential to be used for real world applications.
提出了一种室内目标检测与跟踪的混合方法。测试区域被划分为由放置在天花板上的传感器覆盖的区域。物体的区域位置由这些传感器使用RSSI确定。区域确定之后,使用建筑信息模型(BIM)和3D立体图像测量对区域内的物体进行精确定位。为了确定一个区域的覆盖率,以便更好地放置传感器,将3D空间划分为2D平面,其覆盖点由新开发的软件产品LOCOPac确定。除了室内定位之外,还将展示一些更适合室外应用的传感器分布算法的仿真结果。基于实验和仿真结果,本文提出的室内定位和LOCOPac方法具有应用于现实世界的潜力。
{"title":"A Hybrid Approach to Indoor Sensor Area Localization and Coverage","authors":"M. Gai, A. Azadmanesh, A. Rezaeian","doi":"10.4304/jnw.10.4.209-221","DOIUrl":"https://doi.org/10.4304/jnw.10.4.209-221","url":null,"abstract":"This study presents a hybrid approach to indoor object detection and tracking. A test area is partitioned into regions that are covered by sensors placed on the ceilings. The region location of an object is determined by these sensors using RSSI. The region determination is then followed by the exact localization of the object within the region using Building Information Modeling (BIM) and the 3D stereo image measurements. To determine the coverage ratio of a region for better placement of sensors, the 3D space is partitioned into 2D planes whose coverage points are determined by a newly developed software product called LOCOPac. Other than indoor localization, some simulation results of sensor distribution algorithms that are more suitable for outdoor applications will also be presented. Based on the experimental and simulation results, the proposed approach to indoor localization and LOCOPac has the potential to be used for real world applications.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"62 1","pages":"209-221"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73503021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
J. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1