首页 > 最新文献

2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
A review of cloud deployment models for e-learning systems 电子学习系统的云部署模型综述
Engin Leloglu, Tolga Ayav, B. Aslan
With the significant growth in the cloud-based systems, many industries give their attention to cloud computing solutions. E-learning is a promising application area since its typical requirements such as dynamically allocation of computation and storage resources, coincide well with cloud characteristics. This paper presents some possible cloud solutions in e-learning environments by emphasizing its pros and cons. It is of paramount importance to choose the most suitable cloud model for an e-learning application or an educational organization in terms of scalability, portability and security. We distinguish various deployment alternatives of cloud computing and discuss their benefits against typical e-learning requirements.
随着基于云的系统的显著增长,许多行业开始关注云计算解决方案。电子学习是一个很有前景的应用领域,因为它的典型需求,如计算和存储资源的动态分配,与云的特点非常吻合。本文介绍了电子学习环境中一些可能的云解决方案,并强调了其优缺点。从可扩展性、可移植性和安全性方面为电子学习应用程序或教育组织选择最合适的云模型是至关重要的。我们区分了云计算的各种部署替代方案,并讨论了它们对典型电子学习需求的好处。
{"title":"A review of cloud deployment models for e-learning systems","authors":"Engin Leloglu, Tolga Ayav, B. Aslan","doi":"10.1109/DSN.2013.6575331","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575331","url":null,"abstract":"With the significant growth in the cloud-based systems, many industries give their attention to cloud computing solutions. E-learning is a promising application area since its typical requirements such as dynamically allocation of computation and storage resources, coincide well with cloud characteristics. This paper presents some possible cloud solutions in e-learning environments by emphasizing its pros and cons. It is of paramount importance to choose the most suitable cloud model for an e-learning application or an educational organization in terms of scalability, portability and security. We distinguish various deployment alternatives of cloud computing and discuss their benefits against typical e-learning requirements.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A view on the past and future of fault injection 断层注入的过去和未来
N. Silva, R. Barbosa, J. Cunha, M. Vieira
Fault injection is a well-known technology that enables assessing dependability attributes of computer systems. Many works on fault injection have been developed in the past, and fault injection has been used in different application domains. This fast abstract briefly revises previous applications of fault injection, especially for embedded systems, and puts forward ideas on its future use, both in terms of application areas and business markets.
故障注入是一种众所周知的评估计算机系统可靠性属性的技术。过去已经有很多关于故障注入的研究,故障注入在不同的应用领域得到了应用。本文简要介绍了故障注入技术在以往的应用,特别是在嵌入式系统中的应用,并从应用领域和商业市场两方面对其未来的应用提出了设想。
{"title":"A view on the past and future of fault injection","authors":"N. Silva, R. Barbosa, J. Cunha, M. Vieira","doi":"10.1109/DSN.2013.6575332","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575332","url":null,"abstract":"Fault injection is a well-known technology that enables assessing dependability attributes of computer systems. Many works on fault injection have been developed in the past, and fault injection has been used in different application domains. This fast abstract briefly revises previous applications of fault injection, especially for embedded systems, and puts forward ideas on its future use, both in terms of application areas and business markets.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Reading between the lines of failure logs: Understanding how HPC systems fail 阅读故障日志的字里行间:了解HPC系统是如何失败的
Nosayba El-Sayed, Bianca Schroeder
As the component count in supercomputing installations continues to increase, system reliability is becoming one of the major issues in designing HPC systems. These issues will become more challenging in future Exascale systems, which are predicted to include millions of CPU cores. Even with relatively reliable individual components, the sheer number of components will increase failure rates to unprecedented levels. Efficiently running those systems will require a good understanding of how different factors impact system reliability. In this paper we use a decade worth of field data made available by Los Alamos National Lab to study the impact of a diverse set of factors on the reliability of HPC systems. We provide insights into the nature of correlations between failures, and investigate the impact of factors, such as the power quality, temperature, fan and chiller reliability, system usage and utilization, and external factors, such as cosmic radiation, on system reliability.
随着超级计算装置中组件数量的不断增加,系统可靠性成为设计高性能计算系统的主要问题之一。在未来的百亿亿级系统中,这些问题将变得更具挑战性,预计将包括数百万个CPU内核。即使使用相对可靠的单个组件,组件的数量也会将故障率提高到前所未有的水平。有效地运行这些系统需要很好地理解不同因素如何影响系统可靠性。在本文中,我们使用洛斯阿拉莫斯国家实验室提供的十年现场数据来研究各种因素对高性能计算系统可靠性的影响。我们提供对故障之间相关性本质的见解,并调查因素的影响,如电能质量,温度,风扇和冷却器可靠性,系统使用和利用率,以及外部因素,如宇宙辐射,对系统可靠性的影响。
{"title":"Reading between the lines of failure logs: Understanding how HPC systems fail","authors":"Nosayba El-Sayed, Bianca Schroeder","doi":"10.1109/DSN.2013.6575356","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575356","url":null,"abstract":"As the component count in supercomputing installations continues to increase, system reliability is becoming one of the major issues in designing HPC systems. These issues will become more challenging in future Exascale systems, which are predicted to include millions of CPU cores. Even with relatively reliable individual components, the sheer number of components will increase failure rates to unprecedented levels. Efficiently running those systems will require a good understanding of how different factors impact system reliability. In this paper we use a decade worth of field data made available by Los Alamos National Lab to study the impact of a diverse set of factors on the reliability of HPC systems. We provide insights into the nature of correlations between failures, and investigate the impact of factors, such as the power quality, temperature, fan and chiller reliability, system usage and utilization, and external factors, such as cosmic radiation, on system reliability.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Towards secure monitoring and control systems: Diversify! 迈向安全的监控系统:多样化!
Domenico Cotroneo, A. Pecchia, S. Russo
Cyber attacks have become surprisingly sophisticated over the past fifteen years. While early infections mostly targeted individual machines, recent threats leverage the widespread network connectivity to develop complex and highly coordinated attacks involving several distributed nodes [1]. Attackers are currently targeting very diverse domains, e.g., e-commerce systems, corporate networks, datacenter facilities and industrial systems, to achieve a variety of objectives, which range from credentials compromise to sabotage of physical devices, by means of smarter and smarter worms and rootkits. Stuxnet is a recent worm that well emphasizes the strong technical advances achieved by the attackers' community. It was discovered in July 2010 and firstly affected Iranian nuclear plants [2]. Stuxnet compromises the regular behavior of the supervisory control and data acquisition (SCADA) system by reprogramming the code of programmable logic controllers (PLC). Once compromised, PLCs can progressively destroy a device (e.g., components of a centrifuge, such as the case of the Iranian plant) by sending malicious control signals. Stuxnet combines a relevant number of challenging features: it exploits zero-days vulnerabilities of the Windows OS to affect the nodes connected to the PLC; it propagates either locally (e.g., by means of USB sticks) or remotely (e.g., via shared folders or the print spooler vulnerability); it is able to modify its behavior during the progression of the attack, and communicates with a remote command and control server. More importantly, Stuxnet can remain undetected for many months [3] because it is able to fool the SCADA system by emulating regular monitoring signals.
在过去的15年里,网络攻击变得惊人的复杂。虽然早期感染主要针对单个机器,但最近的威胁利用广泛的网络连接来开发涉及多个分布式节点的复杂且高度协调的攻击[1]。攻击者目前的目标是非常多样化的领域,例如,电子商务系统,企业网络,数据中心设施和工业系统,以实现各种各样的目标,从凭证妥协到破坏物理设备,通过越来越智能的蠕虫和rootkit。Stuxnet是最近的一种蠕虫病毒,它很好地强调了攻击者社区取得的强大技术进步。它于2010年7月被发现,并首先影响了伊朗的核电站[2]。Stuxnet通过重新编程可编程逻辑控制器(PLC)的代码,破坏了监控和数据采集(SCADA)系统的常规行为。一旦受到攻击,plc可以通过发送恶意控制信号逐步摧毁设备(例如,离心机的组件,如伊朗工厂的情况)。Stuxnet结合了一些具有挑战性的特性:它利用Windows操作系统的零日漏洞来影响连接到PLC的节点;它要么在本地传播(例如,通过USB棒),要么远程传播(例如,通过共享文件夹或打印假脱机漏洞);它能够在攻击过程中修改其行为,并与远程命令和控制服务器通信。更重要的是,Stuxnet可以在几个月内不被发现[3],因为它能够通过模拟常规监测信号来欺骗SCADA系统。
{"title":"Towards secure monitoring and control systems: Diversify!","authors":"Domenico Cotroneo, A. Pecchia, S. Russo","doi":"10.1109/DSN.2013.6575341","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575341","url":null,"abstract":"Cyber attacks have become surprisingly sophisticated over the past fifteen years. While early infections mostly targeted individual machines, recent threats leverage the widespread network connectivity to develop complex and highly coordinated attacks involving several distributed nodes [1]. Attackers are currently targeting very diverse domains, e.g., e-commerce systems, corporate networks, datacenter facilities and industrial systems, to achieve a variety of objectives, which range from credentials compromise to sabotage of physical devices, by means of smarter and smarter worms and rootkits. Stuxnet is a recent worm that well emphasizes the strong technical advances achieved by the attackers' community. It was discovered in July 2010 and firstly affected Iranian nuclear plants [2]. Stuxnet compromises the regular behavior of the supervisory control and data acquisition (SCADA) system by reprogramming the code of programmable logic controllers (PLC). Once compromised, PLCs can progressively destroy a device (e.g., components of a centrifuge, such as the case of the Iranian plant) by sending malicious control signals. Stuxnet combines a relevant number of challenging features: it exploits zero-days vulnerabilities of the Windows OS to affect the nodes connected to the PLC; it propagates either locally (e.g., by means of USB sticks) or remotely (e.g., via shared folders or the print spooler vulnerability); it is able to modify its behavior during the progression of the attack, and communicates with a remote command and control server. More importantly, Stuxnet can remain undetected for many months [3] because it is able to fool the SCADA system by emulating regular monitoring signals.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130773467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mitigating access-driven timing channels in clouds using StopWatch 使用StopWatch减轻云中的访问驱动的定时通道
Peng Li, Debin Gao, M. Reiter
This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. StopWatch uses the timing of I/O events at a VM's replicas collectively to determine the timings observed by each one or by an external observer, so that observable timing behaviors are similarly likely in the absence of any other individual, coresident VM. We detail the design and implementation of StopWatch in Xen, evaluate the factors that influence its performance, and address the problem of placing VM replicas in a cloud under the constraints of StopWatch so as to still enable adequate cloud utilization.
本文介绍了StopWatch,这是一个防御基于时间的侧信道攻击的系统,这种攻击是由基础设施即服务云中的受害者和攻击者共同居住而产生的。StopWatch将每个驻留在云上的客户虚拟机(VM)复制三份,并放置副本,以便一个客户虚拟机的三个副本与其他虚拟机的不重叠的副本集共存。StopWatch使用VM副本上的I/O事件的时间来确定每个副本或外部观察者观察到的时间,因此在没有任何其他单独的驻留VM的情况下,观察到的计时行为类似。我们详细介绍了StopWatch在Xen中的设计和实现,评估了影响其性能的因素,并解决了在StopWatch的约束下将VM副本放置在云中的问题,从而仍然能够充分利用云。
{"title":"Mitigating access-driven timing channels in clouds using StopWatch","authors":"Peng Li, Debin Gao, M. Reiter","doi":"10.1109/DSN.2013.6575299","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575299","url":null,"abstract":"This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. StopWatch uses the timing of I/O events at a VM's replicas collectively to determine the timings observed by each one or by an external observer, so that observable timing behaviors are similarly likely in the absence of any other individual, coresident VM. We detail the design and implementation of StopWatch in Xen, evaluate the factors that influence its performance, and address the problem of placing VM replicas in a cloud under the constraints of StopWatch so as to still enable adequate cloud utilization.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013 第三届云、数据中心和虚拟机技术可靠性国际研讨会(DCDV 2013)
J. Muppala, M. Hiltunen, R. Campbell, P. Veríssimo
The Third International Workshop on Dependability of Clouds, Data Centers, and Virtual Machine Technology (DCDV 2013) features papers covering various aspects of dependability and security in Clouds and Data Centers. Four sessions covering Cloud and Data Center Networking, Dependability Evaluation, Mobile and Cloud Computing, and Virtualization and Cloud include eleven papers.
第三届云、数据中心和虚拟机技术可靠性国际研讨会(DCDV 2013)的特色论文涵盖了云和数据中心的可靠性和安全性的各个方面。四场会议涵盖云与数据中心网络、可靠性评估、移动与云计算、虚拟化与云计算,共11篇论文。
{"title":"The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013","authors":"J. Muppala, M. Hiltunen, R. Campbell, P. Veríssimo","doi":"10.1109/DSN.2013.6575319","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575319","url":null,"abstract":"The Third International Workshop on Dependability of Clouds, Data Centers, and Virtual Machine Technology (DCDV 2013) features papers covering various aspects of dependability and security in Clouds and Data Centers. Four sessions covering Cloud and Data Center Networking, Dependability Evaluation, Mobile and Cloud Computing, and Virtualization and Cloud include eleven papers.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"160 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performability analysis of RAID10 versus RAID6 RAID10与RAID6的性能分析
F. Machida, Jianwen Xiang, Kumiko Tadano, Y. Maeno, T. Horikawa
Design of storage system configuration is one of the key issues for providing dependable IT systems. An appropriate RAID storage configuration should consider both performance and availability. To assist the design, this paper presents the performability models for RAID10 and RAID6 that can be used to compare the configuration quantitatively. A performability advantage of RAID6 over RAID10 in sequential read access is discovered by the numerical study in conjunction with performance benchmark results.
存储系统的配置设计是提供可靠的IT系统的关键问题之一。适当的RAID存储配置应该同时考虑性能和可用性。为了辅助设计,本文给出了RAID10和RAID6的性能模型,可以用于定量比较配置。数值研究结合性能基准测试结果发现RAID6在顺序读访问方面优于RAID10的性能优势。
{"title":"Performability analysis of RAID10 versus RAID6","authors":"F. Machida, Jianwen Xiang, Kumiko Tadano, Y. Maeno, T. Horikawa","doi":"10.1109/DSN.2013.6575339","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575339","url":null,"abstract":"Design of storage system configuration is one of the key issues for providing dependable IT systems. An appropriate RAID storage configuration should consider both performance and availability. To assist the design, this paper presents the performability models for RAID10 and RAID6 that can be used to compare the configuration quantitatively. A performability advantage of RAID6 over RAID10 in sequential read access is discovered by the numerical study in conjunction with performance benchmark results.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An empirical investigation of fault repairs and mitigations in space mission system software 空间任务系统软件故障修复与缓解的实证研究
Javier Alonso, Michael Grottke, A. Nikora, Kishor S. Trivedi
Faults in software systems can have different characteristics. In an earlier paper, the anomaly reports for a number of JPL/NASA missions were analyzed and the underlying faults were classified as Bohrbugs, non-aging-related Mandelbugs, and aging-related bugs. In another paper the times to failure for each of these fault types were examined to identify trends within missions as well as across the missions. The results of those papers are now starting to provide guidance to improve the dependability of space mission software. Just as there are different types of faults, there are different kinds of mitigations of faults and failures. This paper analyzes the mitigations associated with each fault studied in our previous papers. We identify trends of mitigation type proportions within missions as well as from mission to mission. We also look for relationships between fault types and mitigation types. The results will be used to increase the reliability of space mission software.
软件系统中的故障可能具有不同的特征。在早期的一篇论文中,对JPL/NASA的一些任务的异常报告进行了分析,并将潜在的故障分类为Bohrbugs、非老化相关的Mandelbugs和老化相关的bug。在另一篇论文中,对每一种故障类型的失效时间进行了检查,以确定任务内部以及任务之间的趋势。这些论文的结果现在开始为提高太空任务软件的可靠性提供指导。正如存在不同类型的故障一样,存在不同类型的故障和故障缓解。本文分析了与我们以前的论文中研究的每个故障相关的缓解措施。我们确定了特派团内部以及特派团之间缓解类型比例的趋势。我们还寻找故障类型和缓解类型之间的关系。研究结果将用于提高空间任务软件的可靠性。
{"title":"An empirical investigation of fault repairs and mitigations in space mission system software","authors":"Javier Alonso, Michael Grottke, A. Nikora, Kishor S. Trivedi","doi":"10.1109/DSN.2013.6575355","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575355","url":null,"abstract":"Faults in software systems can have different characteristics. In an earlier paper, the anomaly reports for a number of JPL/NASA missions were analyzed and the underlying faults were classified as Bohrbugs, non-aging-related Mandelbugs, and aging-related bugs. In another paper the times to failure for each of these fault types were examined to identify trends within missions as well as across the missions. The results of those papers are now starting to provide guidance to improve the dependability of space mission software. Just as there are different types of faults, there are different kinds of mitigations of faults and failures. This paper analyzes the mitigations associated with each fault studied in our previous papers. We identify trends of mitigation type proportions within missions as well as from mission to mission. We also look for relationships between fault types and mitigation types. The results will be used to increase the reliability of space mission software.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Uniform node sampling service robust against collusions of malicious nodes 统一节点采样服务对恶意节点合谋具有鲁棒性
E. Anceaume, Yann Busnel, B. Sericola
We consider the problem of achieving uniform node sampling in large scale systems in presence of a strong adversary. We first propose an omniscient strategy that processes on the fly an unbounded and arbitrarily biased input stream made of node identifiers exchanged within the system, and outputs a stream that preserves Uniformity and Freshness properties. We show through Markov chains analysis that both properties hold despite any arbitrary bias introduced by the adversary. We then propose a knowledge-free strategy and show through extensive simulations that this strategy accurately approximates the omniscient one. We also evaluate its resilience against a strong adversary by studying two representative attacks (flooding and targeted attacks). We quantify the minimum number of identifiers that the adversary must insert in the input stream to prevent uniformity. To our knowledge, such an analysis has never been proposed before.
我们考虑了在存在强对手的大型系统中实现均匀节点采样的问题。我们首先提出了一种全知策略,该策略可以动态处理由系统内交换的节点标识符组成的无界和任意偏差的输入流,并输出一个保留一致性和新鲜度属性的流。我们通过马尔可夫链分析表明,尽管对手引入了任意偏见,但这两种性质都保持不变。然后,我们提出了一种无知识策略,并通过广泛的模拟表明,该策略准确地接近全知策略。我们还通过研究两种典型攻击(洪水攻击和目标攻击)来评估其对强大对手的恢复能力。我们量化了攻击者必须在输入流中插入的标识符的最小数量,以防止一致性。据我们所知,以前从未有人提出过这样的分析。
{"title":"Uniform node sampling service robust against collusions of malicious nodes","authors":"E. Anceaume, Yann Busnel, B. Sericola","doi":"10.1109/DSN.2013.6575363","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575363","url":null,"abstract":"We consider the problem of achieving uniform node sampling in large scale systems in presence of a strong adversary. We first propose an omniscient strategy that processes on the fly an unbounded and arbitrarily biased input stream made of node identifiers exchanged within the system, and outputs a stream that preserves Uniformity and Freshness properties. We show through Markov chains analysis that both properties hold despite any arbitrary bias introduced by the adversary. We then propose a knowledge-free strategy and show through extensive simulations that this strategy accurately approximates the omniscient one. We also evaluate its resilience against a strong adversary by studying two representative attacks (flooding and targeted attacks). We quantify the minimum number of identifiers that the adversary must insert in the input stream to prevent uniformity. To our knowledge, such an analysis has never been proposed before.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Lightweight message tracing for debugging wireless sensor networks 用于调试无线传感器网络的轻量级消息跟踪
V. Sundaram, P. Eugster
Wireless sensor networks (WSNs) deployments are subjected not infrequently to complex runtime failures that are difficult to diagnose. Alas, debugging techniques for traditional distributed systems are inapplicable because of extreme resource constraints in WSNs, and existing WSN-specific debugging solutions address either only specific types of failures, focus on individual nodes, or exhibit high overheads hampering their scalability. Message tracing is a core issue underlying the efficient and effective debugging of WSNs. We propose a message tracing solution which addresses key challenges in WSNs - besides stringent resource constraints, these include out-of-order message arrivals and message losses - while being streamlined for the common case of successful in-order message transmission. Our approach reduces energy overhead significantly (up to 95% and on average 59% smaller) compared to state-of-the-art message tracing approaches making use of Lamport clocks. We demonstrate the effectiveness of our approach through case studies of several complex faults in three well-known distributed protocols.
无线传感器网络(wsn)的部署经常会遇到难以诊断的复杂运行时故障。遗憾的是,传统分布式系统的调试技术并不适用,因为wsn中存在极端的资源限制,而且现有的特定于wsn的调试解决方案要么只处理特定类型的故障,要么关注单个节点,要么表现出阻碍其可扩展性的高开销。消息跟踪是实现无线传感器网络高效调试的核心问题。我们提出了一种消息跟踪解决方案,该解决方案解决了wsn中的关键挑战-除了严格的资源限制,这些挑战包括无序消息到达和消息丢失-同时简化了成功有序消息传输的常见情况。与使用Lamport时钟的最新消息跟踪方法相比,我们的方法显著降低了能源开销(最高可降低95%,平均降低59%)。我们通过对三个知名分布式协议中几个复杂故障的案例研究证明了我们方法的有效性。
{"title":"Lightweight message tracing for debugging wireless sensor networks","authors":"V. Sundaram, P. Eugster","doi":"10.1109/DSN.2013.6575302","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575302","url":null,"abstract":"Wireless sensor networks (WSNs) deployments are subjected not infrequently to complex runtime failures that are difficult to diagnose. Alas, debugging techniques for traditional distributed systems are inapplicable because of extreme resource constraints in WSNs, and existing WSN-specific debugging solutions address either only specific types of failures, focus on individual nodes, or exhibit high overheads hampering their scalability. Message tracing is a core issue underlying the efficient and effective debugging of WSNs. We propose a message tracing solution which addresses key challenges in WSNs - besides stringent resource constraints, these include out-of-order message arrivals and message losses - while being streamlined for the common case of successful in-order message transmission. Our approach reduces energy overhead significantly (up to 95% and on average 59% smaller) compared to state-of-the-art message tracing approaches making use of Lamport clocks. We demonstrate the effectiveness of our approach through case studies of several complex faults in three well-known distributed protocols.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124549045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1