首页 > 最新文献

2016 IEEE Symposium on Computers and Communication (ISCC)最新文献

英文 中文
Measuring the users and conversations of a vibrant online emotional support system 测量一个充满活力的在线情感支持系统的用户和对话
Pub Date : 2016-08-18 DOI: 10.1109/ISCC.2016.7543898
M. Calzarossa, L. Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glendon L. Moriarty
Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how, and when users utilize emotional support systems, this paper examines user and conversation characteristics on 7 Cups of Tea. 7 Cups of Tea is a massive, vibrant emotional support system with a community of listeners ready to help those with any number of emotional issues. Intriguing insights, including evidence of world-wide adoption of the service, the need to seek immediate support from many others, and a rich-get-richer phenomenon underscore a growing need for online emotional support systems and highlight important aspects to promote their long-term viability.
在线社交系统已经成为社会上人们相互交流的流行媒介。人们交流的最重要原因之一是分享情感问题,但大多数在线社交系统都是不舒服或不安全的空间。这导致了在线情感支持系统的兴起,需要与某人交谈的用户可以匿名连接到一群训练有素的听众,进行一对一的对话。为了更好地了解用户是谁、如何以及何时使用情感支持系统,本文研究了7杯茶的用户和对话特征。7杯茶是一个庞大的、充满活力的情感支持系统,有一个听众社区,随时准备帮助那些有任何情感问题的人。有趣的见解,包括全球范围内采用这项服务的证据,寻求许多其他人的即时支持的需要,以及富人变得更富的现象,都强调了对在线情感支持系统日益增长的需求,并强调了促进其长期可行性的重要方面。
{"title":"Measuring the users and conversations of a vibrant online emotional support system","authors":"M. Calzarossa, L. Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glendon L. Moriarty","doi":"10.1109/ISCC.2016.7543898","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543898","url":null,"abstract":"Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how, and when users utilize emotional support systems, this paper examines user and conversation characteristics on 7 Cups of Tea. 7 Cups of Tea is a massive, vibrant emotional support system with a community of listeners ready to help those with any number of emotional issues. Intriguing insights, including evidence of world-wide adoption of the service, the need to seek immediate support from many others, and a rich-get-richer phenomenon underscore a growing need for online emotional support systems and highlight important aspects to promote their long-term viability.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Joint power control and sub-channel allocation for co-channel OFDMA femtocells 同信道OFDMA飞基站的联合功率控制与子信道分配
Pub Date : 2016-08-18 DOI: 10.1109/ISCC.2016.7543895
S. Kazemi, M. Rasti
Two-tier networks consisting of macrocell and femtocells are provided as a solution to increase capacity and improve indoor coverage of cellular networks. In two-tier networks, when the spectrum is shared by macrocell and all of femtocells, the cross-tier and co-tier interference should be taken into account. In this paper, we investigate the power control problem of minimizing the aggregate transmit power for macro-tier and the joint power control and sub-channel allocation problem of maximizing the total rate for femto-tier, both in uplink transmission, while the cross-tier and co-tier interference are both taken into account. Then, to solve these problems, we propose distributed sub-optimal algorithms for both macro and femto-tier. Finally, simulation results are presented to confirm out performance of our proposed algorithm and to compare with the existing algorithm.
提出了一种由宏蜂窝和飞蜂窝组成的两层网络的解决方案,以增加蜂窝网络的容量和改善室内覆盖。在两层网络中,当宏蜂窝和所有飞蜂窝共享频谱时,应考虑跨层和共层干扰。本文研究了在考虑跨层和协层干扰的情况下,宏观层以最小总发射功率为目标的功率控制问题和飞向层以最大总速率为目标的联合功率控制和子信道分配问题。然后,为了解决这些问题,我们提出了宏观层和飞层的分布式次优算法。最后给出了仿真结果,验证了本文算法的性能,并与现有算法进行了比较。
{"title":"Joint power control and sub-channel allocation for co-channel OFDMA femtocells","authors":"S. Kazemi, M. Rasti","doi":"10.1109/ISCC.2016.7543895","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543895","url":null,"abstract":"Two-tier networks consisting of macrocell and femtocells are provided as a solution to increase capacity and improve indoor coverage of cellular networks. In two-tier networks, when the spectrum is shared by macrocell and all of femtocells, the cross-tier and co-tier interference should be taken into account. In this paper, we investigate the power control problem of minimizing the aggregate transmit power for macro-tier and the joint power control and sub-channel allocation problem of maximizing the total rate for femto-tier, both in uplink transmission, while the cross-tier and co-tier interference are both taken into account. Then, to solve these problems, we propose distributed sub-optimal algorithms for both macro and femto-tier. Finally, simulation results are presented to confirm out performance of our proposed algorithm and to compare with the existing algorithm.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crowdsensing and proximity services for impaired mobility 为行动不便人士提供的群众感应和邻近服务
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543712
Jacopo Cortellazzi, L. Foschini, Carlos Roberto de Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, G. D. Alperstedt
New sensors embedded into modern smartphones has led into a new data collection prospective in which people directly collect all the sensitive data. This feature has found different applications, in particular in the Smart Cities area, in order to establish dynamic communications between the citizens and the city government. This category of application is nestled into the Mobile Crowd Sensing (MCS) application group, due to their final purpose of sharing sensing data to an open platform that includes a huge number of people. This paper presents an extension of the general-purpose ParticipAct platform, a MCS application developed by the University of Bologna, focused on the needs of people with impaired mobility. The goal is specializing ParticipAct to enable a crowdsourcing platform that guarantees a solid support for their lifetime allowing reviewing and sharing opinions regarding public and private places and architectonic barriers of a city area. Showed results confirm the effectiveness of the developed application in terms of both its viability via integration with existing and widely diffused Geographical Information Systems (GIS), and its feasibility in terms of system and user-perceived performances.
嵌入现代智能手机的新型传感器导致了人们直接收集所有敏感数据的新数据收集前景。这一功能已经找到了不同的应用,特别是在智慧城市领域,以建立公民和市政府之间的动态通信。这类应用程序属于移动人群传感(MCS)应用程序组,因为它们的最终目的是将传感数据共享到一个包括大量人员的开放平台。本文介绍了博洛尼亚大学开发的通用ParticipAct平台MCS应用程序的扩展,主要关注行动不便人士的需求。我们的目标是让ParticipAct成为一个众包平台,保证他们一生都能得到坚实的支持,允许他们对公共和私人场所以及城市地区的建筑障碍进行审查和分享意见。所显示的结果证实了开发的应用程序的有效性,无论是通过与现有和广泛传播的地理信息系统(GIS)集成的可行性,还是在系统和用户感知性能方面的可行性。
{"title":"Crowdsensing and proximity services for impaired mobility","authors":"Jacopo Cortellazzi, L. Foschini, Carlos Roberto de Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, G. D. Alperstedt","doi":"10.1109/ISCC.2016.7543712","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543712","url":null,"abstract":"New sensors embedded into modern smartphones has led into a new data collection prospective in which people directly collect all the sensitive data. This feature has found different applications, in particular in the Smart Cities area, in order to establish dynamic communications between the citizens and the city government. This category of application is nestled into the Mobile Crowd Sensing (MCS) application group, due to their final purpose of sharing sensing data to an open platform that includes a huge number of people. This paper presents an extension of the general-purpose ParticipAct platform, a MCS application developed by the University of Bologna, focused on the needs of people with impaired mobility. The goal is specializing ParticipAct to enable a crowdsourcing platform that guarantees a solid support for their lifetime allowing reviewing and sharing opinions regarding public and private places and architectonic barriers of a city area. Showed results confirm the effectiveness of the developed application in terms of both its viability via integration with existing and widely diffused Geographical Information Systems (GIS), and its feasibility in terms of system and user-perceived performances.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Food and gastronomic heritage: Telling a story of eyes and hands 食物和美食遗产:讲述眼睛和手的故事
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543705
S. Mirri, Catia Prandi, M. Roccetti, P. Salomoni
A multimedia application (termed Di Piazza in Piazza) has been designed and developed that allows people to enjoy a narrative experience based on food and culinary traditions. Several kinds of digital content narrating the gastronomic culture of the Emilia Romagna region has been made available through a gestural interface within an installation to be exhibited in public spaces. The idea of using hands to access content came after the consideration that hands play a primary role in the relationship between humans and food. Our multimedia installation has gone on tour through several cities in Italy allowing to gather a huge amount of data whose analysis provides some important results. Among those: (a) the use of hands was mostly appreciated by visitors and (b) regional products and gastronomic traditions raised interest in visitors, thus confirming that a strong cultural relationship exists among people and food, in cultural terms.
设计和开发了一个多媒体应用程序(称为dipiazza in Piazza),使人们能够享受基于食物和烹饪传统的叙事体验。介绍艾米利亚罗马涅地区美食文化的几种数字内容通过手势界面在公共空间展示。在考虑到手在人类与食物的关系中起着主要作用之后,人们想到了用手来获取内容的想法。我们的多媒体装置已经在意大利的几个城市巡回演出,收集了大量的数据,这些数据的分析提供了一些重要的结果。其中包括:(a)游客对双手的使用大多表示赞赏;(b)地区产品和美食传统提高了游客的兴趣,从而证实了在文化方面,人与食物之间存在着牢固的文化关系。
{"title":"Food and gastronomic heritage: Telling a story of eyes and hands","authors":"S. Mirri, Catia Prandi, M. Roccetti, P. Salomoni","doi":"10.1109/ISCC.2016.7543705","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543705","url":null,"abstract":"A multimedia application (termed Di Piazza in Piazza) has been designed and developed that allows people to enjoy a narrative experience based on food and culinary traditions. Several kinds of digital content narrating the gastronomic culture of the Emilia Romagna region has been made available through a gestural interface within an installation to be exhibited in public spaces. The idea of using hands to access content came after the consideration that hands play a primary role in the relationship between humans and food. Our multimedia installation has gone on tour through several cities in Italy allowing to gather a huge amount of data whose analysis provides some important results. Among those: (a) the use of hands was mostly appreciated by visitors and (b) regional products and gastronomic traditions raised interest in visitors, thus confirming that a strong cultural relationship exists among people and food, in cultural terms.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An architecture for securing federated cloud networks with Service Function Chaining 一种使用服务功能链保护联邦云网络的体系结构
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543711
Philippe Massonet, S. Dupont, Arnaud Michot, A. Levin, M. Villari
Capacity, availability or resilience of clouds can be increased by interconnecting two or more cloud computing environments to form a cloud federation and share resources. Shared resources include compute and storage resources but also networking resources. By integrating software defined networks/ virtual networks (SDN), network function virtualization (NFV) and network function chaining (SFC) technologies into cloud management platforms it is possible to create more advanced and flexible cloud federation mechanisms. In this paper we show how to secure federated cloud networks and how to customise the security of each individual federated cloud network running in a cloud federation. We propose an architecture for securing federated cloud networks by enforcing a global security policy to all network segments of a federation, and local security policies on each network of the federation. Cloud stakeholders can specify the required security virtual network functions (VNF), how to configure them, and how to chain them in a service manifest. The proposed architecture is illustrated with a deep packet inspection case study. Future work on implementing the proposed architecture in an OpenStack federation is briefly discussed.
通过连接两个或多个云计算环境,形成云联盟并共享资源,可以提高云的容量、可用性或弹性。共享资源不仅包括计算资源、存储资源,还包括网络资源。通过将软件定义网络/虚拟网络(SDN)、网络功能虚拟化(NFV)和网络功能链(SFC)技术集成到云管理平台中,可以创建更先进、更灵活的云联合机制。在本文中,我们将展示如何保护联邦云网络,以及如何自定义在云联邦中运行的每个单独的联邦云网络的安全性。我们提出了一种架构,通过对联邦的所有网段实施全局安全策略,并对联邦的每个网络实施本地安全策略,来保护联邦云网络。云利益相关者可以指定所需的安全虚拟网络功能(VNF)、如何配置它们以及如何将它们链接到服务清单中。通过一个深度包检测案例研究说明了所提出的体系结构。简要讨论了在OpenStack联邦中实现所建议架构的未来工作。
{"title":"An architecture for securing federated cloud networks with Service Function Chaining","authors":"Philippe Massonet, S. Dupont, Arnaud Michot, A. Levin, M. Villari","doi":"10.1109/ISCC.2016.7543711","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543711","url":null,"abstract":"Capacity, availability or resilience of clouds can be increased by interconnecting two or more cloud computing environments to form a cloud federation and share resources. Shared resources include compute and storage resources but also networking resources. By integrating software defined networks/ virtual networks (SDN), network function virtualization (NFV) and network function chaining (SFC) technologies into cloud management platforms it is possible to create more advanced and flexible cloud federation mechanisms. In this paper we show how to secure federated cloud networks and how to customise the security of each individual federated cloud network running in a cloud federation. We propose an architecture for securing federated cloud networks by enforcing a global security policy to all network segments of a federation, and local security policies on each network of the federation. Cloud stakeholders can specify the required security virtual network functions (VNF), how to configure them, and how to chain them in a service manifest. The proposed architecture is illustrated with a deep packet inspection case study. Future work on implementing the proposed architecture in an OpenStack federation is briefly discussed.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance comparison of non Delay Tolerant VANET routing protocols 非容延迟VANET路由协议的性能比较
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543746
Ilker K. Basaran, Hasan Bulut
As an emerging technology, Vehicular ad hoc networks (VANETs) aim to increase safety and comfort of driving in highways and urban streets. The conventional measures taken have a positive effect on the decline of casualties and injuries incurred by the accidents. But the number of incidents in the traffic still remains stable. VANETs intend to overcome this problem by providing additional information to the driver, thus allowing him to react faster and better in adverse situations. In order to achieve this, VANETs require efficient routing protocols for message transmission among vehicles. In this paper, we explore the performances of four prominent non-delay tolerant routing protocols, namely GPSR, GPSR+AGF, GSR, and GPSRJ+. Although relatively outdated, these protocols are initial inspiration to many routing methods and commonly used as comparison benchmark when a new routing protocol is to be introduced. The evaluation metrics that are used are Packet Delivery Ratio, Average Delay, Traffic Control Overhead, and Average Hop Count.
作为一项新兴技术,车辆自组织网络(VANETs)旨在提高在高速公路和城市街道上驾驶的安全性和舒适性。采取的常规措施对减少事故造成的人员伤亡起到了积极的作用。但是交通事故的数量仍然保持稳定。VANETs打算通过向驾驶员提供额外信息来克服这一问题,从而使驾驶员在不利情况下做出更快更好的反应。为了实现这一点,VANETs需要有效的路由协议来实现车辆之间的信息传输。本文探讨了GPSR、GPSR+AGF、GSR和GPSRJ+四种主要的非容错路由协议的性能。虽然相对过时,但这些协议是许多路由方法的最初灵感,并且在引入新的路由协议时通常用作比较基准。评估指标包括:报文投递率、平均时延、流量控制开销和平均跳数。
{"title":"Performance comparison of non Delay Tolerant VANET routing protocols","authors":"Ilker K. Basaran, Hasan Bulut","doi":"10.1109/ISCC.2016.7543746","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543746","url":null,"abstract":"As an emerging technology, Vehicular ad hoc networks (VANETs) aim to increase safety and comfort of driving in highways and urban streets. The conventional measures taken have a positive effect on the decline of casualties and injuries incurred by the accidents. But the number of incidents in the traffic still remains stable. VANETs intend to overcome this problem by providing additional information to the driver, thus allowing him to react faster and better in adverse situations. In order to achieve this, VANETs require efficient routing protocols for message transmission among vehicles. In this paper, we explore the performances of four prominent non-delay tolerant routing protocols, namely GPSR, GPSR+AGF, GSR, and GPSRJ+. Although relatively outdated, these protocols are initial inspiration to many routing methods and commonly used as comparison benchmark when a new routing protocol is to be introduced. The evaluation metrics that are used are Packet Delivery Ratio, Average Delay, Traffic Control Overhead, and Average Hop Count.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114505340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards mitigating Link Flooding Attack via incremental SDN deployment 通过SDN增量部署缓解链路泛洪攻击
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543772
Lei Wang, Qing Li, Yong Jiang, Jianping Wu
Link flooding attack (LFA), as a new type of DDoS attack, can degrade or even cut off network connectivity of a target area. This attack employs legitimate, low-density flows to flood a group of selected links. Therefore, these malicious flows can hardly be distinguished by traditional schemes. In this paper, we propose a scheme called Woodpecker, which makes the LFA more difficult to take effect. First, we select M routers and upgrade them into SDN switches that can maximize the network connectivity. Second, we propose a proactive probe approach to quickly locate the congested links and judge whether LFA occurs. Finally, Woodpecker employs centralized traffic engineering based on the upgraded nodes, which can make the traffic balanced enough to eliminate the routing bottlenecks likely to be utilized by the adversary. We evaluate our scheme by comprehensive experiments. The results show that: 1) the bandwidth utilization of LFA-attacked links can be reduced by around 50%; 2) the average packet loss rate and jitter can be effectively mitigated under LFA attacks.
链路泛洪攻击(Link flooding attack, LFA)是一种新型的DDoS攻击,可以降低甚至切断目标区域的网络连通性。这种攻击使用合法的低密度流来淹没一组选定的链接。因此,传统的方案很难区分这些恶意流。在本文中,我们提出了一种称为啄木鸟的方案,使LFA更难生效。首先,我们选择M台路由器,升级为SDN交换机,使网络连通性最大化。其次,我们提出了一种主动探测方法来快速定位拥塞链路并判断是否发生LFA。最后,啄木鸟采用基于升级节点的集中式流量工程,使流量足够均衡,消除了可能被对手利用的路由瓶颈。我们通过综合实验来评价我们的方案。结果表明:1)lfa攻击的链路带宽利用率可降低50%左右;2)在LFA攻击下,平均丢包率和抖动可以得到有效的缓解。
{"title":"Towards mitigating Link Flooding Attack via incremental SDN deployment","authors":"Lei Wang, Qing Li, Yong Jiang, Jianping Wu","doi":"10.1109/ISCC.2016.7543772","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543772","url":null,"abstract":"Link flooding attack (LFA), as a new type of DDoS attack, can degrade or even cut off network connectivity of a target area. This attack employs legitimate, low-density flows to flood a group of selected links. Therefore, these malicious flows can hardly be distinguished by traditional schemes. In this paper, we propose a scheme called Woodpecker, which makes the LFA more difficult to take effect. First, we select M routers and upgrade them into SDN switches that can maximize the network connectivity. Second, we propose a proactive probe approach to quickly locate the congested links and judge whether LFA occurs. Finally, Woodpecker employs centralized traffic engineering based on the upgraded nodes, which can make the traffic balanced enough to eliminate the routing bottlenecks likely to be utilized by the adversary. We evaluate our scheme by comprehensive experiments. The results show that: 1) the bandwidth utilization of LFA-attacked links can be reduced by around 50%; 2) the average packet loss rate and jitter can be effectively mitigated under LFA attacks.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
IacDroid: Preventing Inter-App Communication capability leaks in Android IacDroid:防止Android的应用间通信能力泄漏
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543779
Daojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao
Inter-App Communication (IAC) plays an important role in Android platform to share data and services among applications. However, the existence of IAC capability leaks could lead to the unauthorized privileged operations. In this paper, we first investigate the usage of IAC in Android applications to show the prevalence of IAC in the Android development model. To mitigate the threat caused by IAC capability leaks in Android, we develop a real-time monitoring and control system, called IacDroid, which distinguishes and prevents the IAC capability leak accurately in both third-party and in-rom applications at runtime. IacDroid extends the Binder IPC mechanism and the system service to construct context-based component call chains between multiple applications. By leveraging the call chains, the permission system is extended to detect and prevent the IAC capability leaks. IacDroid also presents an intuitive client-side solution to help users control the IAC capability leaks. We implement the prototype in Android 4.3, and present a comprehensive assessment with 500 Google Play applications and 36 malicious applications. The experimental results demonstrate that IacDroid can effectively prevent the IAC capability leaks with a negligible performance overhead.
应用程序间通信(IAC)在Android平台中起着重要的作用,用于在应用程序之间共享数据和服务。但是,IAC功能泄漏的存在可能导致未经授权的特权操作。在本文中,我们首先调查了IAC在Android应用程序中的使用情况,以显示IAC在Android开发模型中的流行程度。为了减轻Android中IAC能力泄漏带来的威胁,我们开发了一个实时监控系统IacDroid,该系统能够在运行时准确识别和防止第三方和内部应用中的IAC能力泄漏。IacDroid扩展了Binder IPC机制和系统服务,在多个应用程序之间构建基于上下文的组件调用链。通过利用调用链,扩展了权限系统以检测和防止IAC功能泄漏。IacDroid还提供了一个直观的客户端解决方案来帮助用户控制IAC功能泄漏。我们在Android 4.3中实现了原型,并对500个Google Play应用程序和36个恶意应用程序进行了全面评估。实验结果表明,IacDroid可以有效地防止IAC性能泄漏,而性能开销可以忽略不计。
{"title":"IacDroid: Preventing Inter-App Communication capability leaks in Android","authors":"Daojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao","doi":"10.1109/ISCC.2016.7543779","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543779","url":null,"abstract":"Inter-App Communication (IAC) plays an important role in Android platform to share data and services among applications. However, the existence of IAC capability leaks could lead to the unauthorized privileged operations. In this paper, we first investigate the usage of IAC in Android applications to show the prevalence of IAC in the Android development model. To mitigate the threat caused by IAC capability leaks in Android, we develop a real-time monitoring and control system, called IacDroid, which distinguishes and prevents the IAC capability leak accurately in both third-party and in-rom applications at runtime. IacDroid extends the Binder IPC mechanism and the system service to construct context-based component call chains between multiple applications. By leveraging the call chains, the permission system is extended to detect and prevent the IAC capability leaks. IacDroid also presents an intuitive client-side solution to help users control the IAC capability leaks. We implement the prototype in Android 4.3, and present a comprehensive assessment with 500 Google Play applications and 36 malicious applications. The experimental results demonstrate that IacDroid can effectively prevent the IAC capability leaks with a negligible performance overhead.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint analog network coding and channel allocation in the walking scenario for WBAN WBAN行走场景下联合模拟网络编码与信道分配
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543803
Hongyun Zhang, F. Safaei, Le Chung Tran
Wireless Body Area Network (WBAN) has been considered as a revolutionary technology to address current healthcare needs. However, before the extensive deployment of WBAN, one main challenge to be met is how to balance the trade-off between data transmission rate and energy efficiency. In this paper, we utilize WBAN's spatial correlation characteristics during movement and propose an efficient cross-layer scheme, named A3NC, which combines analog network coding (ANC) and MAC layer channel allocation. Our simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency compared to the conventional approaches. Meanwhile, our scheme also maintains a better balance between correlated sensors' upload throughput.
无线体域网络(WBAN)被认为是解决当前医疗保健需求的一项革命性技术。然而,在广泛部署无线宽带网络之前,一个主要的挑战是如何在数据传输速率和能源效率之间取得平衡。本文利用WBAN在移动过程中的空间相关特性,提出了一种高效的跨层方案A3NC,该方案将模拟网络编码(ANC)和MAC层信道分配相结合。仿真结果表明,与传统方法相比,A3NC方案在上传吞吐量和能效方面都有显著提高。同时,我们的方案在相关传感器的上传吞吐量之间保持了更好的平衡。
{"title":"Joint analog network coding and channel allocation in the walking scenario for WBAN","authors":"Hongyun Zhang, F. Safaei, Le Chung Tran","doi":"10.1109/ISCC.2016.7543803","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543803","url":null,"abstract":"Wireless Body Area Network (WBAN) has been considered as a revolutionary technology to address current healthcare needs. However, before the extensive deployment of WBAN, one main challenge to be met is how to balance the trade-off between data transmission rate and energy efficiency. In this paper, we utilize WBAN's spatial correlation characteristics during movement and propose an efficient cross-layer scheme, named A3NC, which combines analog network coding (ANC) and MAC layer channel allocation. Our simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency compared to the conventional approaches. Meanwhile, our scheme also maintains a better balance between correlated sensors' upload throughput.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile behaviometric framework for sociability assessment and identification of smartphone users 智能手机用户社交能力评估和识别的移动行为测量框架
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543880
Fazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, B. Kantarci, M. Erol-Kantarci, S. Schuckers
The widespread use of mobile technology has accelerated the popularity of social networking services, and has made these services convenient to access. This paper presents a behaviometric mobile application, namely TrackMaison (Track My activity in social networks). TrackMaison keeps track of social network service usage of smartphone users through data usage, location, usage frequency and session duration of five popular social network services. The data collected by the mobile application is presented to the smartphone user and is analyzed to aid in understanding mobile social network service usage. Furthermore, we introduce the social activity rate and sociability factor metrics where the former is a function of a user's relative data usage rate in social network services and the latter is a function of a user's relative session durations in social networks. By using TrackMaison tool, we identify three user behavior types. Those are active user profile, moderately active user profile and low active user profile. Through analysis of real data, we advocate that continuous identification/authentication of mobile device users is possible by using the introduced sociability metrics. We further present a case study on various Instagram user profiles, and show that low active profiles can be identified with negligible false acceptance rates (FAR) whereas a highly active user can be identified with a FAR as low as 3%.
移动技术的广泛使用加速了社交网络服务的普及,并使这些服务易于访问。本文介绍了一个行为测量移动应用程序,即TrackMaison(跟踪我在社交网络中的活动)。TrackMaison通过五种流行的社交网络服务的数据使用、位置、使用频率和会话持续时间来跟踪智能手机用户的社交网络服务使用情况。移动应用程序收集的数据呈现给智能手机用户,并进行分析,以帮助理解移动社交网络服务的使用情况。此外,我们引入了社交活动率和社交性因素指标,其中前者是用户在社交网络服务中的相对数据使用率的函数,后者是用户在社交网络中的相对会话持续时间的函数。通过使用TrackMaison工具,我们确定了三种用户行为类型。它们分别是活跃用户,中度活跃用户和低活跃用户。通过对真实数据的分析,我们主张使用引入的社交性指标可以对移动设备用户进行持续识别/认证。我们进一步提出了一个关于各种Instagram用户配置文件的案例研究,并表明低活跃配置文件可以被忽略不计的错误接受率(FAR)识别,而高活跃用户的错误接受率可以低至3%。
{"title":"Mobile behaviometric framework for sociability assessment and identification of smartphone users","authors":"Fazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, B. Kantarci, M. Erol-Kantarci, S. Schuckers","doi":"10.1109/ISCC.2016.7543880","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543880","url":null,"abstract":"The widespread use of mobile technology has accelerated the popularity of social networking services, and has made these services convenient to access. This paper presents a behaviometric mobile application, namely TrackMaison (Track My activity in social networks). TrackMaison keeps track of social network service usage of smartphone users through data usage, location, usage frequency and session duration of five popular social network services. The data collected by the mobile application is presented to the smartphone user and is analyzed to aid in understanding mobile social network service usage. Furthermore, we introduce the social activity rate and sociability factor metrics where the former is a function of a user's relative data usage rate in social network services and the latter is a function of a user's relative session durations in social networks. By using TrackMaison tool, we identify three user behavior types. Those are active user profile, moderately active user profile and low active user profile. Through analysis of real data, we advocate that continuous identification/authentication of mobile device users is possible by using the introduced sociability metrics. We further present a case study on various Instagram user profiles, and show that low active profiles can be identified with negligible false acceptance rates (FAR) whereas a highly active user can be identified with a FAR as low as 3%.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"33 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2016 IEEE Symposium on Computers and Communication (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1