首页 > 最新文献

22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)最新文献

英文 中文
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination 预测用户目的地的汽车导航系统地图匹配算法
K. Miyashita, T. Terada, S. Nishio
In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predicts user purpose and destination to present various information based on predicted purpose without user interaction. It requires the correct road where the car drives in real time, and it also need to know the route from the start point to the current point correctly. The proposal map matching method divides the trajectory into equal intervals and calculates the shortest path score for each one. Testing using GPS data for actual car trips showed that its use results in better destination prediction than with conventional methods in most cases. The results were the best for intervals of 5 minutes.
在本文中,我们提出了一种地图匹配算法,用于汽车导航系统预测用户目的地。该汽车导航系统是一种新颖的系统,它可以自动预测用户的目的和目的地,并根据预测的目的呈现各种信息,而无需用户交互。它需要汽车实时行驶的正确道路,还需要正确地知道从起点到当前点的路线。建议映射匹配方法将轨迹划分为等间隔,并计算每个间隔的最短路径得分。使用GPS数据对实际汽车行程进行的测试表明,在大多数情况下,使用GPS预测目的地的效果比传统方法更好。间隔5分钟的效果最好。
{"title":"A Map Matching Algorithm for Car Navigation Systems that Predict User Destination","authors":"K. Miyashita, T. Terada, S. Nishio","doi":"10.1109/WAINA.2008.242","DOIUrl":"https://doi.org/10.1109/WAINA.2008.242","url":null,"abstract":"In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predicts user purpose and destination to present various information based on predicted purpose without user interaction. It requires the correct road where the car drives in real time, and it also need to know the route from the start point to the current point correctly. The proposal map matching method divides the trajectory into equal intervals and calculates the shortest path score for each one. Testing using GPS data for actual car trips showed that its use results in better destination prediction than with conventional methods in most cases. The results were the best for intervals of 5 minutes.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Authentication Method with Distributed Hash Table for P2P Network 基于分布式哈希表的P2P网络认证新方法
Atsushi Takeda, K. Hashimoto, G. Kitagata, S. Zabir, Tetsuo Kinoshita, N. Shiratori
In recent years, P2P networks have been evolving at a rapid pace. Authentication of nodes in P2P networks, however, remains a difficult task to conduct efficiently. In this paper, we therefore propose a new authentication method called hash-based distributed authentication method (HDAM). HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network. It performs a distributed management of public keys by using Web of trust and distributed hash table. Our proposal significantly reduces both the memory size requirement and the overhead of communication data sent by the nodes.
近年来,P2P网络发展迅速。然而,P2P网络中节点的身份验证仍然是一个难以有效进行的任务。因此,本文提出了一种新的身份验证方法,称为基于哈希的分布式身份验证方法(HDAM)。HDAM为P2P网络中的每对节点实现了一种分散高效的相互认证机制。采用信任网络和分布式哈希表对公钥进行分布式管理。我们的建议大大降低了内存大小需求和节点发送通信数据的开销。
{"title":"A New Authentication Method with Distributed Hash Table for P2P Network","authors":"Atsushi Takeda, K. Hashimoto, G. Kitagata, S. Zabir, Tetsuo Kinoshita, N. Shiratori","doi":"10.1109/WAINA.2008.203","DOIUrl":"https://doi.org/10.1109/WAINA.2008.203","url":null,"abstract":"In recent years, P2P networks have been evolving at a rapid pace. Authentication of nodes in P2P networks, however, remains a difficult task to conduct efficiently. In this paper, we therefore propose a new authentication method called hash-based distributed authentication method (HDAM). HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network. It performs a distributed management of public keys by using Web of trust and distributed hash table. Our proposal significantly reduces both the memory size requirement and the overhead of communication data sent by the nodes.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Virtual Reality Interaction System between User and Avatar with Distributed Processing 基于分布式处理的虚拟现实用户与虚拟角色交互系统
Shunji Uchino, N. Abe, Hiroshi Takada, T. Yagi, H. Taki, Shoujie He
In this research, a dialog environment between human and virtual agent has been constructed. With the commercial off-the-shelf VR technologies, special devices such as data glove have to be used for the interaction. But this is difficult to manipulate objects. If there is a helper who has direct access to objects in a virtual space, we may ask him. The question, however, is how to communicate with the helper. This paper presents a solution to the question. The basic idea is to utilize speech recognition and gesture recognition systems. Experimental results have proved the effectiveness of the approach in terms of facilitating man-machine interaction and communication. The environment constructed in this research allows a user to communicate by talking and showing gestures to a personified agent in virtual environment. A user can use his/her finger to point at a virtual object and ask the agent to manipulate the virtual object.
在本研究中,构建了一个人与虚拟代理之间的对话环境。在商用的现成VR技术中,必须使用数据手套等特殊设备进行交互。但这很难操作对象。如果有一个助手可以直接访问虚拟空间中的对象,我们可能会问他。然而,问题是如何与助手沟通。本文提出了解决这一问题的方法。其基本思想是利用语音识别和手势识别系统。实验结果证明了该方法在促进人机交互和通信方面的有效性。本研究构建的环境允许用户在虚拟环境中通过说话和手势与拟人化代理进行交流。用户可以用他/她的手指指向一个虚拟对象,并要求代理操作虚拟对象。
{"title":"Virtual Reality Interaction System between User and Avatar with Distributed Processing","authors":"Shunji Uchino, N. Abe, Hiroshi Takada, T. Yagi, H. Taki, Shoujie He","doi":"10.1109/WAINA.2008.124","DOIUrl":"https://doi.org/10.1109/WAINA.2008.124","url":null,"abstract":"In this research, a dialog environment between human and virtual agent has been constructed. With the commercial off-the-shelf VR technologies, special devices such as data glove have to be used for the interaction. But this is difficult to manipulate objects. If there is a helper who has direct access to objects in a virtual space, we may ask him. The question, however, is how to communicate with the helper. This paper presents a solution to the question. The basic idea is to utilize speech recognition and gesture recognition systems. Experimental results have proved the effectiveness of the approach in terms of facilitating man-machine interaction and communication. The environment constructed in this research allows a user to communicate by talking and showing gestures to a personified agent in virtual environment. A user can use his/her finger to point at a virtual object and ask the agent to manipulate the virtual object.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131863993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain 具有跨管理域高可用性、支持sso的分布式RBAC模型
S. Juntapremjitt, S. Fugkeaw, P. Manpanpanich
This paper proposes a novel design and implementation of distributed RBAC (dRBAC) and single sign-on (SSO) system that spans over multiple administrative domains with high availability. The core idea is based on multi-agent systems (MAS) technique owing to its modularity, autonomy, distributedness, flexibility, and scalability. All agents serve their specific purposes. Leveraging agents simplifies high availability. PKI is used for trust enablement between intra- and inter-domain agent communications. The security assertion markup language (SAML) is adopted for supporting the exchange of authentication and authorization information in the architecture. The approach supports strong two-factor authentication with X.509 digital certificate. The authorization scheme is based on the privilege management infrastructure (PMI). Finally, we reported our extended implementation status and demonstrated that our proposed model is efficient and flexible to implement in the multiple SSO and PKI domains.
本文提出了一种跨多个管理域、具有高可用性的分布式RBAC (dRBAC)和单点登录(SSO)系统的新设计和实现。其核心思想是基于多智能体系统(MAS)技术,具有模块化、自主性、分布式、灵活性和可扩展性。所有代理都有其特定的用途。利用代理简化了高可用性。PKI用于实现域内和域间代理通信之间的信任。采用安全断言标记语言(SAML)来支持体系结构中身份验证和授权信息的交换。该方法支持使用X.509数字证书的强双因素身份验证。授权方案基于特权管理基础设施(PMI)。最后,我们报告了我们的扩展实现状态,并证明了我们提出的模型在多个SSO和PKI域中的实现是高效和灵活的。
{"title":"An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain","authors":"S. Juntapremjitt, S. Fugkeaw, P. Manpanpanich","doi":"10.1109/WAINA.2008.175","DOIUrl":"https://doi.org/10.1109/WAINA.2008.175","url":null,"abstract":"This paper proposes a novel design and implementation of distributed RBAC (dRBAC) and single sign-on (SSO) system that spans over multiple administrative domains with high availability. The core idea is based on multi-agent systems (MAS) technique owing to its modularity, autonomy, distributedness, flexibility, and scalability. All agents serve their specific purposes. Leveraging agents simplifies high availability. PKI is used for trust enablement between intra- and inter-domain agent communications. The security assertion markup language (SAML) is adopted for supporting the exchange of authentication and authorization information in the architecture. The approach supports strong two-factor authentication with X.509 digital certificate. The authorization scheme is based on the privilege management infrastructure (PMI). Finally, we reported our extended implementation status and demonstrated that our proposed model is efficient and flexible to implement in the multiple SSO and PKI domains.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Service Level Agreement Model for Best-Effort Traffics in IP over WDM IP over WDM中最努力业务的新服务水平协议模型
Hung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee
In this paper, we propose a new SLA model for best effort IP traffic over WDM networks. This model jointly considers two QoS metrics, workable traffic volume and availability, as SLA parameters. We devise an algorithm of integer programming to minimize operation cost for the incremental traffic.
在本文中,我们提出了一种新的SLA模型,用于WDM网络上的最佳努力IP流量。该模型将可用流量和可用性两个QoS指标作为SLA参数。我们设计了一种整数规划算法来最小化增量流量的运行成本。
{"title":"A New Service Level Agreement Model for Best-Effort Traffics in IP over WDM","authors":"Hung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee","doi":"10.1109/WAINA.2008.104","DOIUrl":"https://doi.org/10.1109/WAINA.2008.104","url":null,"abstract":"In this paper, we propose a new SLA model for best effort IP traffic over WDM networks. This model jointly considers two QoS metrics, workable traffic volume and availability, as SLA parameters. We devise an algorithm of integer programming to minimize operation cost for the incremental traffic.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault Tolerant HAWAII Protocol for IP services in Wireless Networks 无线网络中IP服务的夏威夷容错协议
R. Gunasundari, S. Shanmugavel, K. Bakyalakshmi
The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability. Recent efforts are focusing on providing seamless handover, fault tolerance, reliability and continuous end-to-end service connectivity on the move minimizing the delay and disruption period for real time applications and hence, failures that inhibit communications or result in loss of critical data will not be tolerated. The goal of this paper is to develop a Fault Tolerant HA WAII (FT- HA WAII) protocol and investigate the performance in Tree and partial Mesh routing topologies. Simulation results show that FT- HA WAII can effectively resolve the fault tolerant problem in domain based wireless access networks.
下一代无线网络的成功将在很大程度上依赖于新兴异构技术之间无缝移动支持的先进机制。目前,移动IP是互联网中最有前途的移动管理解决方案。为了提高移动IP的性能,人们提出了几种IP微移动方法,以支持服务质量、最小的数据包丢失、有限的切换延迟和可扩展性。最近的工作重点是提供无缝切换、容错、可靠性和持续的端到端移动服务连接,最大限度地减少实时应用程序的延迟和中断时间,因此,禁止通信或导致关键数据丢失的故障将是不可容忍的。本文的目标是开发一种容错HA WAII (FT- HA WAII)协议,并研究其在Tree和partial Mesh路由拓扑结构中的性能。仿真结果表明,该算法能有效地解决基于域的无线接入网中的容错问题。
{"title":"Fault Tolerant HAWAII Protocol for IP services in Wireless Networks","authors":"R. Gunasundari, S. Shanmugavel, K. Bakyalakshmi","doi":"10.1109/WAINA.2008.200","DOIUrl":"https://doi.org/10.1109/WAINA.2008.200","url":null,"abstract":"The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability. Recent efforts are focusing on providing seamless handover, fault tolerance, reliability and continuous end-to-end service connectivity on the move minimizing the delay and disruption period for real time applications and hence, failures that inhibit communications or result in loss of critical data will not be tolerated. The goal of this paper is to develop a Fault Tolerant HA WAII (FT- HA WAII) protocol and investigate the performance in Tree and partial Mesh routing topologies. Simulation results show that FT- HA WAII can effectively resolve the fault tolerant problem in domain based wireless access networks.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scheduling Strategy of Subtask Decomposed 子任务分解调度策略
Benting Wan
The scheduling strategy of subtask decomposed (sub- DC) is presented in this article, which includes two parts. The first part is layered transaction of DAG (directed acyclic graph), which all subtasks are divided into different layers according to precedence relation; The second part is task assignation, in the first, min-min scheduling strategy is used to assign subtasks of one layer to each computer of system; after subtasks of one layer are assigned, load balancing strategy is used to dynamically adjusted system load, which makes use of character of subtasks decomposed and makes one layer subtasks are assigned better reason; then layer-by-layer subtasks are assigned using the same method. The Sub-DC not only makes subtasks of each layer be executed as quickly as possible, but also makes the application be executed in shorter time. The implement result shows that the Sub-DC is better than the level-by-level scheduling strategy (sub-Lev).
本文提出了子任务分解(sub- DC)调度策略,主要包括两个部分。第一部分是DAG(有向无环图)的分层处理,根据优先级关系将所有子任务划分到不同的层;第二部分是任务分配,首先采用最小最小调度策略,将一层的子任务分配给系统的每台计算机;在分配一层子任务后,利用分解子任务的特点,采用负载均衡策略对系统负载进行动态调整,使一层子任务的分配更加合理;然后使用相同的方法逐层分配子任务。Sub-DC不仅可以使每一层的子任务尽可能快地执行,而且可以使应用程序在更短的时间内执行。实施结果表明,Sub-DC策略优于逐级调度策略(sub-Lev)。
{"title":"Scheduling Strategy of Subtask Decomposed","authors":"Benting Wan","doi":"10.1109/WAINA.2008.77","DOIUrl":"https://doi.org/10.1109/WAINA.2008.77","url":null,"abstract":"The scheduling strategy of subtask decomposed (sub- DC) is presented in this article, which includes two parts. The first part is layered transaction of DAG (directed acyclic graph), which all subtasks are divided into different layers according to precedence relation; The second part is task assignation, in the first, min-min scheduling strategy is used to assign subtasks of one layer to each computer of system; after subtasks of one layer are assigned, load balancing strategy is used to dynamically adjusted system load, which makes use of character of subtasks decomposed and makes one layer subtasks are assigned better reason; then layer-by-layer subtasks are assigned using the same method. The Sub-DC not only makes subtasks of each layer be executed as quickly as possible, but also makes the application be executed in shorter time. The implement result shows that the Sub-DC is better than the level-by-level scheduling strategy (sub-Lev).","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130369851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Mobile Applications into RFID Based B2B Systems 将移动应用集成到基于RFID的B2B系统中
T. Cerlinca, C. Turcu, M. Cerlinca
This paper presents the principles governing the design and development of a mobile application, as well as various aspects regarding its integration into a more complex RFID_B2B (radio frequency identification - business to business) system. Extending the applicability of RFID_B2B systems represents the main goal of such applications, which are generally expected to handle large amount of data, to operate in stand-alone mode and to allow their easy integration into complex RFID_B2B systems. The paper proposes new solutions and ideas regarding the design and development of a secure and very fast method for the communication and synchronization between the B2B servers and a mobile application running on various mobile devices.
本文介绍了控制移动应用程序设计和开发的原则,以及将其集成到更复杂的RFID_B2B(射频识别-企业对企业)系统中的各个方面。扩展RFID_B2B系统的适用性代表了此类应用程序的主要目标,这些应用程序通常期望处理大量数据,以独立模式运行,并允许它们轻松集成到复杂的RFID_B2B系统中。本文针对B2B服务器与运行在各种移动设备上的移动应用程序之间安全、快速的通信和同步方法的设计和开发,提出了新的解决方案和思路。
{"title":"Integrating Mobile Applications into RFID Based B2B Systems","authors":"T. Cerlinca, C. Turcu, M. Cerlinca","doi":"10.1109/WAINA.2008.233","DOIUrl":"https://doi.org/10.1109/WAINA.2008.233","url":null,"abstract":"This paper presents the principles governing the design and development of a mobile application, as well as various aspects regarding its integration into a more complex RFID_B2B (radio frequency identification - business to business) system. Extending the applicability of RFID_B2B systems represents the main goal of such applications, which are generally expected to handle large amount of data, to operate in stand-alone mode and to allow their easy integration into complex RFID_B2B systems. The paper proposes new solutions and ideas regarding the design and development of a secure and very fast method for the communication and synchronization between the B2B servers and a mobile application running on various mobile devices.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124876061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Monitoring Network Traffic to Detect Stepping-Stone Intrusion 监控网络流量检测踏脚石入侵
Jianhua Yang, Byong Lee, Stephen S. H. Huang
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed to detect stepping-stone since 1995. One of those approaches proposed by A. Blum detects stepping-stone by checking if the difference between the number of the send packets of an incoming connection and the one of an outgoing connection is bounded. One weakness of this method is in resisting intruders' evasion, such as chaff perturbation. In this paper, we propose a method based on random walk theory to detect stepping-stone intrusion. Our theoretical analysis shows that the proposed method is more effective than Blum's approach in terms of resisting intruders' chaff perturbation.
大多数网络入侵者倾向于使用踏脚石攻击或入侵其他主机,以降低被发现的风险。自1995年以来,已经提出了许多方法来检测踏脚石。A. Blum提出的其中一种方法是通过检查传入连接和传出连接的发送数据包数量之间的差异是否有界来检测踏脚石。这种方法的一个缺点是不能抵抗入侵者的逃避,如箔条摄动。本文提出了一种基于随机游走理论的踏脚石入侵检测方法。理论分析表明,该方法比Blum方法更有效地抵抗了干扰的箔条扰动。
{"title":"Monitoring Network Traffic to Detect Stepping-Stone Intrusion","authors":"Jianhua Yang, Byong Lee, Stephen S. H. Huang","doi":"10.1109/WAINA.2008.30","DOIUrl":"https://doi.org/10.1109/WAINA.2008.30","url":null,"abstract":"Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed to detect stepping-stone since 1995. One of those approaches proposed by A. Blum detects stepping-stone by checking if the difference between the number of the send packets of an incoming connection and the one of an outgoing connection is bounded. One weakness of this method is in resisting intruders' evasion, such as chaff perturbation. In this paper, we propose a method based on random walk theory to detect stepping-stone intrusion. Our theoretical analysis shows that the proposed method is more effective than Blum's approach in terms of resisting intruders' chaff perturbation.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Efficient Cross-Layer Based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor Networks 基于重传节点选择的高效跨层泛洪无线传感器网络算法
Seung-Joon Choi, Ki-Hyuk Kwon, S. Yoo
In this paper, we propose a flooding algorithm with retransmission node selection (FARNS) for wireless sensor networks. It is an efficient cross-layer based flooding technique to solve a broadcast storm problem that is produced by simple flooding of nodes in wireless sensor networks. FARNS can decrease waste of unnecessary energy by controlling retransmission action of whole network nodes by deciding retransmission candidate nodes that are selected by identifier information of neighbor nodes in MAC and distance with neighborhood nodes through received signal strength information in PHY. In simulation results show that FARNS has excellent performance than the other flooding schemes in terms of broadcast forwarding ratio, broadcast delivery ratio, and the number of redundancy packets and overhead.
本文提出了一种无线传感器网络的重传节点选择泛洪算法(FARNS)。它是一种有效的跨层泛洪技术,用于解决无线传感器网络中节点简单泛洪产生的广播风暴问题。FARNS通过MAC中邻居节点的标识信息选择重传候选节点,通过PHY中接收到的信号强度信息确定与邻居节点的距离,从而控制全网节点的重传动作,从而减少不必要的能量浪费。仿真结果表明,FARNS在广播转发率、广播发送率、冗余包数和开销等方面都优于其他泛洪方案。
{"title":"An Efficient Cross-Layer Based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor Networks","authors":"Seung-Joon Choi, Ki-Hyuk Kwon, S. Yoo","doi":"10.1109/WAINA.2008.32","DOIUrl":"https://doi.org/10.1109/WAINA.2008.32","url":null,"abstract":"In this paper, we propose a flooding algorithm with retransmission node selection (FARNS) for wireless sensor networks. It is an efficient cross-layer based flooding technique to solve a broadcast storm problem that is produced by simple flooding of nodes in wireless sensor networks. FARNS can decrease waste of unnecessary energy by controlling retransmission action of whole network nodes by deciding retransmission candidate nodes that are selected by identifier information of neighbor nodes in MAC and distance with neighborhood nodes through received signal strength information in PHY. In simulation results show that FARNS has excellent performance than the other flooding schemes in terms of broadcast forwarding ratio, broadcast delivery ratio, and the number of redundancy packets and overhead.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115870362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1