首页 > 最新文献

11th IEEE International Conference on Network Protocols, 2003. Proceedings.最新文献

英文 中文
On the utility of distributed cryptography in P2P and MANETs: the case of membership control 论分布式密码学在P2P和manet中的应用:以成员控制为例
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249783
M. Narasimha, G. Tsudik, J. Yi
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Providing efficient security services in these systems is an active research topic which is receiving much attention in the security research community. In this paper, we explore the use of threshold cryptography in peer-to-peer settings (both Internet- and MANET-based) to provide, in a robust and fault tolerant fashion, security services such as authentication, certificate issuance and access control. Threshold cryptography provides high availability by distributing trust throughout the group and is, therefore, an attractive solution for secure peer-groups. Our work investigates the applicability of threshold cryptography for membership control in peer-to-peer systems. In the process, we discover that one interesting proposed scheme contains an unfortunate (yet serious) flaw. We then present an alternative solution and its performance measurements. More importantly, our preliminary work casts a certain degree of skepticism on the practicality and even viability of using (seemingly attractive) threshold cryptography in certain peer-to-peer settings.
点对点系统支持有效的资源聚合,并且具有固有的可扩展性,因为它们不依赖于任何集中的权威。然而,缺乏集中的权威会引发许多与安全相关的挑战。如何在这些系统中提供高效的安全服务是目前安全研究界关注的一个活跃的研究课题。在本文中,我们探索了在点对点设置(基于Internet和基于manet)中使用阈值密码学,以健壮和容错的方式提供安全服务,如身份验证,证书颁发和访问控制。阈值加密通过在整个组中分配信任来提供高可用性,因此是安全对等组的一个有吸引力的解决方案。我们的工作研究了阈值密码学在点对点系统中成员控制的适用性。在这个过程中,我们发现一个有趣的方案包含了一个不幸的(但严重的)缺陷。然后,我们提出了一个替代解决方案及其性能度量。更重要的是,我们的初步工作对在某些点对点设置中使用(看似有吸引力的)阈值加密的实用性甚至可行性提出了一定程度的怀疑。
{"title":"On the utility of distributed cryptography in P2P and MANETs: the case of membership control","authors":"M. Narasimha, G. Tsudik, J. Yi","doi":"10.1109/ICNP.2003.1249783","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249783","url":null,"abstract":"Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Providing efficient security services in these systems is an active research topic which is receiving much attention in the security research community. In this paper, we explore the use of threshold cryptography in peer-to-peer settings (both Internet- and MANET-based) to provide, in a robust and fault tolerant fashion, security services such as authentication, certificate issuance and access control. Threshold cryptography provides high availability by distributing trust throughout the group and is, therefore, an attractive solution for secure peer-groups. Our work investigates the applicability of threshold cryptography for membership control in peer-to-peer systems. In the process, we discover that one interesting proposed scheme contains an unfortunate (yet serious) flaw. We then present an alternative solution and its performance measurements. More importantly, our preliminary work casts a certain degree of skepticism on the practicality and even viability of using (seemingly attractive) threshold cryptography in certain peer-to-peer settings.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Stress resistant scheduling algorithms for CIOQ switches CIOQ交换机的抗应力调度算法
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249763
Prashanth Pappu, J. Turner
Practical crossbar scheduling algorithms for CIOQ switches such as PIM and i-SLIP, can perform poorly under extreme traffic conditions, frequently failing to be work-conserving. The common practice of evaluating crossbar scheduling algorithms according to the packet delay under random admissible traffic tends to obscure significant differences that affect the robustness of different algorithms when exposed to extreme conditions. On the other hand, algorithms such as LOOFA with provably good worst-case performance, don't lend themselves readily to high performance implementation. We advocate evaluating crossbar scheduling algorithms using targeted stress tests which seek to probe the performance boundaries of competing alternatives. Appropriately designed stress tests can reveal key-differences among algorithms and can provide the insight needed to spur the development of better solutions. In this paper, we introduce the use of stress testing for crossbar scheduling and use it to evaluate the performance of PIM, i-SLIP and LOOFA. Our results show that PlM and i-SLIP need large speedups in order to perform well on stress tests, while LOOFA can deliver excellent performance, even for speedups less than 1.5. We then develop improved versions of PIM and i-SLIP, which take output queue lengths into account, making them much more robust. We also develop an algorithm which closely approximates the behavior (and performance) of LOOFA, but which admits a straightforward, high performance hardware implementation.
PIM和i-SLIP等CIOQ交换机的交叉调度算法在极端交通条件下表现不佳,经常不能节省工作。根据随机可接受流量下的数据包延迟评估交叉排程算法的常见做法往往会掩盖在极端条件下影响不同算法鲁棒性的显著差异。另一方面,像LOOFA这样的算法虽然可以证明具有良好的最坏情况性能,但并不容易用于高性能实现。我们提倡使用有针对性的压力测试来评估交叉排程算法,该测试旨在探索竞争替代方案的性能边界。适当设计的压力测试可以揭示算法之间的关键差异,并可以提供刺激开发更好解决方案所需的见解。本文介绍了应力测试在横杆调度中的应用,并用它来评价PIM、i-SLIP和LOOFA的性能。我们的结果表明,PlM和i-SLIP需要较大的加速才能在压力测试中表现良好,而LOOFA即使在小于1.5的加速下也可以提供出色的性能。然后,我们开发了PIM和i-SLIP的改进版本,它们考虑了输出队列长度,使它们更加健壮。我们还开发了一种算法,它非常接近LOOFA的行为(和性能),但它允许一个简单的、高性能的硬件实现。
{"title":"Stress resistant scheduling algorithms for CIOQ switches","authors":"Prashanth Pappu, J. Turner","doi":"10.1109/ICNP.2003.1249763","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249763","url":null,"abstract":"Practical crossbar scheduling algorithms for CIOQ switches such as PIM and i-SLIP, can perform poorly under extreme traffic conditions, frequently failing to be work-conserving. The common practice of evaluating crossbar scheduling algorithms according to the packet delay under random admissible traffic tends to obscure significant differences that affect the robustness of different algorithms when exposed to extreme conditions. On the other hand, algorithms such as LOOFA with provably good worst-case performance, don't lend themselves readily to high performance implementation. We advocate evaluating crossbar scheduling algorithms using targeted stress tests which seek to probe the performance boundaries of competing alternatives. Appropriately designed stress tests can reveal key-differences among algorithms and can provide the insight needed to spur the development of better solutions. In this paper, we introduce the use of stress testing for crossbar scheduling and use it to evaluate the performance of PIM, i-SLIP and LOOFA. Our results show that PlM and i-SLIP need large speedups in order to perform well on stress tests, while LOOFA can deliver excellent performance, even for speedups less than 1.5. We then develop improved versions of PIM and i-SLIP, which take output queue lengths into account, making them much more robust. We also develop an algorithm which closely approximates the behavior (and performance) of LOOFA, but which admits a straightforward, high performance hardware implementation.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Matchmaker: signaling for dynamic publish/subscribe applications Matchmaker:用于动态发布/订阅应用程序的信令
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249773
Zihui Ge, P. Ji, J. Kurose, D. Towsley
The publish/subscribe (pub/sub) paradigm provides content-oriented data dissemination in which communication channels are established between content publishers and content subscribers based on a matching of subscribers interest in the published content provided - a process we refer to as "matchmaking". Once an interest match has been made, content forwarding state can be installed at intermediate nodes (e.g., active routers, application-level relay nodes) on the path between a content provider and an interested subscriber. In dynamic pub/sub applications, where published content and subscriber interest change frequently the signaling overhead needed to perform matchmaking can be a significant overhead. We first formalize the matchmaking process as an optimization problem, with the goal of minimizing the amount of matchmaking signaling messages. We consider this problem for both shared and per-source multicast data (content) distribution topologies. We characterize the fundamental complexity of the problem, and then describe several efficient solution approaches. The insights gained through our analysis are then embodied in a novel active matchmaker signaling protocol (AMSP). AMSP dynamically adapts to applications' changing publication and subscription requests through a link-marking approach. We simulate AMSP and two existing broadcast-based approaches for conducting matchmaking, and find that AMSP significantly reduces signaling overhead.
发布/订阅(pub/sub)范式提供面向内容的数据传播,其中内容发布者和内容订阅者之间基于订阅者对所提供的已发布内容的兴趣匹配建立通信通道——我们将此过程称为“配对”。一旦进行了兴趣匹配,就可以在内容提供者和感兴趣的订阅者之间的路径上的中间节点(例如活动路由器、应用程序级中继节点)上安装内容转发状态。在动态发布/订阅应用程序中,发布的内容和订阅者的兴趣经常变化,执行匹配所需的信令开销可能是很大的开销。我们首先将配对过程形式化为一个优化问题,目标是最小化配对信令消息的数量。我们考虑了共享和每源多播数据(内容)分布拓扑的这个问题。我们描述了问题的基本复杂性,然后描述了几种有效的解决方法。通过我们的分析获得的见解,然后体现在一种新的主动媒人信令协议(AMSP)中。AMSP通过链接标记方法动态适应应用程序不断变化的发布和订阅请求。我们模拟了AMSP和两种现有的基于广播的配对方法,发现AMSP显著降低了信令开销。
{"title":"Matchmaker: signaling for dynamic publish/subscribe applications","authors":"Zihui Ge, P. Ji, J. Kurose, D. Towsley","doi":"10.1109/ICNP.2003.1249773","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249773","url":null,"abstract":"The publish/subscribe (pub/sub) paradigm provides content-oriented data dissemination in which communication channels are established between content publishers and content subscribers based on a matching of subscribers interest in the published content provided - a process we refer to as \"matchmaking\". Once an interest match has been made, content forwarding state can be installed at intermediate nodes (e.g., active routers, application-level relay nodes) on the path between a content provider and an interested subscriber. In dynamic pub/sub applications, where published content and subscriber interest change frequently the signaling overhead needed to perform matchmaking can be a significant overhead. We first formalize the matchmaking process as an optimization problem, with the goal of minimizing the amount of matchmaking signaling messages. We consider this problem for both shared and per-source multicast data (content) distribution topologies. We characterize the fundamental complexity of the problem, and then describe several efficient solution approaches. The insights gained through our analysis are then embodied in a novel active matchmaker signaling protocol (AMSP). AMSP dynamically adapts to applications' changing publication and subscription requests through a link-marking approach. We simulate AMSP and two existing broadcast-based approaches for conducting matchmaking, and find that AMSP significantly reduces signaling overhead.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Data dissemination with ring-based index for wireless sensor networks 基于环索引的无线传感器网络数据传播
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249780
Wensheng Zhang, G. Cao, T. L. Porta
In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissemination techniques have been proposed for sensor networks. However, these techniques may not work well in a large scale sensor network where a huge amount of sensing data are generated, but only a small portion of them are queried. In this paper, we propose an index-based data dissemination scheme to address the problem. This scheme is based on the idea that sensing data are collected, processed and stored at the nodes close to the detecting nodes, and the location information of these storing nodes is pushed to some index nodes, which act as the rendezvous points for sinks and sources. We further extend the scheme with an adaptive ring-based index (ARI) technique, in which the index nodes for one event type form a ring surrounding the location which is determined by the event type, and the ring can be dynamically reconfigured for fault tolerance and load balance. Analysis and simulations are conducted to evaluate the performance of the proposed index-based scheme. The results show that the index-based scheme outperforms the external storage-based scheme, the DCS scheme, and the local storage-based schemes with flood-response style. The results also show that using ARI can tolerate clustering failures and achieve load balance.
在当前的传感器网络中,传感器节点不仅能够测量现实世界的现象,而且能够存储、处理和传输这些测量结果。针对传感器网络,人们提出了许多数据传播技术。然而,这些技术在大规模传感器网络中可能不太适用,因为在大规模传感器网络中,产生了大量的传感数据,但只有一小部分被查询。在本文中,我们提出了一个基于索引的数据分发方案来解决这个问题。该方案的思想是将传感数据收集、处理和存储在靠近检测节点的节点上,并将这些存储节点的位置信息推送到一些索引节点上,这些索引节点作为汇聚点和源点的交会点。我们进一步扩展了该方案,采用基于自适应环的索引(ARI)技术,其中一种事件类型的索引节点围绕由事件类型确定的位置形成一个环,并且该环可以动态地重新配置以实现容错和负载平衡。通过分析和仿真来评价所提出的基于索引的方案的性能。结果表明,基于索引的方案优于基于外部存储的方案、DCS方案和基于本地存储的洪水响应式方案。结果还表明,使用ARI可以容忍集群故障并实现负载平衡。
{"title":"Data dissemination with ring-based index for wireless sensor networks","authors":"Wensheng Zhang, G. Cao, T. L. Porta","doi":"10.1109/ICNP.2003.1249780","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249780","url":null,"abstract":"In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissemination techniques have been proposed for sensor networks. However, these techniques may not work well in a large scale sensor network where a huge amount of sensing data are generated, but only a small portion of them are queried. In this paper, we propose an index-based data dissemination scheme to address the problem. This scheme is based on the idea that sensing data are collected, processed and stored at the nodes close to the detecting nodes, and the location information of these storing nodes is pushed to some index nodes, which act as the rendezvous points for sinks and sources. We further extend the scheme with an adaptive ring-based index (ARI) technique, in which the index nodes for one event type form a ring surrounding the location which is determined by the event type, and the ring can be dynamically reconfigured for fault tolerance and load balance. Analysis and simulations are conducted to evaluate the performance of the proposed index-based scheme. The results show that the index-based scheme outperforms the external storage-based scheme, the DCS scheme, and the local storage-based schemes with flood-response style. The results also show that using ARI can tolerate clustering failures and achieve load balance.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128503561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
The AD-MIX protocol for encouraging participation in mobile ad hoc networks 用于鼓励参与移动自组织网络的ad - mix协议
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249765
Swaminathan Sundaramurthy, E. Belding-Royer
Mobile ad hoc networks are autonomous self-organized networks in which each node relies on the other nodes in the network to perform routing on its behalf. Proper functioning of the network is dependent on participation and cooperation of the nodes in routing and packet forwarding. Unfortunately, providing these services may not be in the best interest of a mobile node, since it results in the depletion of the node's resources. Selfish behavior by a node may result in degraded network performance due to denial of service, decrease in network throughput and partitioning of the network. Because it is in a node's interest to not forward traffic, nodes should be given some form of incentive for the services they provide. In this paper, we address the problem of selfishness in mobile ad hoc networks by proposing a protocol called AD-MIX that encourages participation. AD-MIX discourages selfishness by concealing the true destination of packets from intermediate nodes along the path, forcing a node to participate or risk dropping packets destined for itself. Simulation results show that employing AD-MIX encourages participation without a significant increase in overhead. In addition to encouraging participation, AD-MIX also facilitates anonymization and secure communication between nodes.
移动自组织网络是一种自治的自组织网络,其中每个节点都依赖网络中的其他节点代表自己执行路由。网络的正常运行依赖于节点在路由和数据包转发中的参与和合作。不幸的是,提供这些服务可能不符合移动节点的最佳利益,因为它会导致节点资源的耗尽。节点的自私行为可能导致网络性能下降,如拒绝服务、网络吞吐量下降、网络分区等。因为不转发流量符合节点的利益,所以应该对节点提供的服务给予某种形式的激励。在本文中,我们通过提出一种称为ad - mix的协议来解决移动自组织网络中的自私问题,该协议鼓励参与。AD-MIX通过隐藏来自路径中间节点的数据包的真实目的地来阻止自私,迫使节点参与或冒着丢失自己的数据包的风险。仿真结果表明,采用AD-MIX可以在不显著增加开销的情况下鼓励参与。除了鼓励参与之外,AD-MIX还促进了节点之间的匿名化和安全通信。
{"title":"The AD-MIX protocol for encouraging participation in mobile ad hoc networks","authors":"Swaminathan Sundaramurthy, E. Belding-Royer","doi":"10.1109/ICNP.2003.1249765","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249765","url":null,"abstract":"Mobile ad hoc networks are autonomous self-organized networks in which each node relies on the other nodes in the network to perform routing on its behalf. Proper functioning of the network is dependent on participation and cooperation of the nodes in routing and packet forwarding. Unfortunately, providing these services may not be in the best interest of a mobile node, since it results in the depletion of the node's resources. Selfish behavior by a node may result in degraded network performance due to denial of service, decrease in network throughput and partitioning of the network. Because it is in a node's interest to not forward traffic, nodes should be given some form of incentive for the services they provide. In this paper, we address the problem of selfishness in mobile ad hoc networks by proposing a protocol called AD-MIX that encourages participation. AD-MIX discourages selfishness by concealing the true destination of packets from intermediate nodes along the path, forcing a node to participate or risk dropping packets destined for itself. Simulation results show that employing AD-MIX encourages participation without a significant increase in overhead. In addition to encouraging participation, AD-MIX also facilitates anonymization and secure communication between nodes.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Packet classification using extended TCAMs 使用扩展tcam的数据包分类
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249762
Edward W. Spitznagel, David E. Taylor, J. Turner
CAMs are the most popular practical method for implementing packet classification in high performance routers. Their principal drawbacks are high power consumption and inefficient representation of filters with port ranges. A recent paper [Narlikar, et al., 2003] showed how partitioned TCAMs could be used to implement IP route lookup with dramatically lower power consumption. We extend the ideas in [Narlikar, et al., 2003] to address the more challenging problem of general packet classification. We describe two extensions to the standard TCAM architecture. The first organizes the TCAM as a two level hierarchy in which an index block is used to enable/disable the querying of the main storage blocks. The second incorporates circuits for range comparisons directly within the TCAM memory array. Extended TCAMs can deliver high performance (100 million lookups per second) for large filter sets (100,000 filters), while reducing power consumption by a factor of ten and improving space efficiency by a factor of three.
在高性能路由器中,CAMs是实现分组分类最常用的实用方法。它们的主要缺点是高功耗和端口范围滤波器的低效表示。最近的一篇论文[Narlikar, et al., 2003]展示了如何使用分区tcam来实现IP路由查找,同时显著降低功耗。我们扩展了[Narlikar, et ., 2003]中的思想,以解决更具有挑战性的一般数据包分类问题。我们描述了标准TCAM体系结构的两个扩展。第一个将TCAM组织为一个两级层次结构,其中索引块用于启用/禁用对主存储块的查询。第二种包括直接在TCAM存储器阵列内进行范围比较的电路。扩展tcam可以为大型滤波器集(100,000个滤波器)提供高性能(每秒1亿次查找),同时将功耗降低10倍,并将空间效率提高3倍。
{"title":"Packet classification using extended TCAMs","authors":"Edward W. Spitznagel, David E. Taylor, J. Turner","doi":"10.1109/ICNP.2003.1249762","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249762","url":null,"abstract":"CAMs are the most popular practical method for implementing packet classification in high performance routers. Their principal drawbacks are high power consumption and inefficient representation of filters with port ranges. A recent paper [Narlikar, et al., 2003] showed how partitioned TCAMs could be used to implement IP route lookup with dramatically lower power consumption. We extend the ideas in [Narlikar, et al., 2003] to address the more challenging problem of general packet classification. We describe two extensions to the standard TCAM architecture. The first organizes the TCAM as a two level hierarchy in which an index block is used to enable/disable the querying of the main storage blocks. The second incorporates circuits for range comparisons directly within the TCAM memory array. Extended TCAMs can deliver high performance (100 million lookups per second) for large filter sets (100,000 filters), while reducing power consumption by a factor of ten and improving space efficiency by a factor of three.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 268
A bidding protocol for deploying mobile sensors 用于部署移动传感器的招标协议
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249781
Guiling Wang, G. Cao, T. L. Porta
In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high coverage in these situations, we propose to deploy sensor networks composed of a mixture of mobile and static sensors in which mobile sensors can move from dense areas to sparse areas to improve the overall coverage. This paper presents a bidding protocol to assist the movement of mobile sensors. In the protocol, static sensors detect coverage holes locally by using Voronoi diagrams, and bid for mobile sensors based on the size of the detected hole. Mobile sensors choose coverage holes to heal based on the bid. Simulation results show that our algorithm provides suitable tradeoff between coverage and sensor cost.
在一些恶劣的环境中,手动部署传感器是不可能的。替代方法可能导致不精确的放置,从而导致覆盖孔。为了在这些情况下提供所需的高覆盖率,我们建议部署由移动和静态传感器混合组成的传感器网络,其中移动传感器可以从密集区域移动到稀疏区域,以提高整体覆盖率。本文提出了一种辅助移动传感器运动的竞标协议。在该协议中,静态传感器利用Voronoi图对局部覆盖孔进行检测,并根据检测到的孔大小对移动传感器进行竞价。移动传感器根据出价选择要修复的覆盖漏洞。仿真结果表明,该算法在覆盖范围和传感器成本之间取得了很好的平衡。
{"title":"A bidding protocol for deploying mobile sensors","authors":"Guiling Wang, G. Cao, T. L. Porta","doi":"10.1109/ICNP.2003.1249781","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249781","url":null,"abstract":"In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high coverage in these situations, we propose to deploy sensor networks composed of a mixture of mobile and static sensors in which mobile sensors can move from dense areas to sparse areas to improve the overall coverage. This paper presents a bidding protocol to assist the movement of mobile sensors. In the protocol, static sensors detect coverage holes locally by using Voronoi diagrams, and bid for mobile sensors based on the size of the detected hole. Mobile sensors choose coverage holes to heal based on the bid. Simulation results show that our algorithm provides suitable tradeoff between coverage and sensor cost.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122335208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 286
Systematic verification of safety properties of arbitrary network protocol compositions using CHAIN 使用CHAIN系统验证任意网络协议组合的安全特性
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249774
A. Bradley, Azer Bestavros, A. Kfoury
Formal correctness of complex multi-party protocols can be difficult to verify. While models of specific sign constraints, protocols which lend themselves to arbitrarily many compositions of agents -such as the chaining of proxies or the peering of routers- are more difficult to verify because they represent potentially infinite state spaces and may exhibit emergent behaviors which may not materialize under particular fixed compositions. We address this challenge by developing an algebraic approach that enables us to reduce arbitrary compositions of network agents into a behaviorally-equivalent (with respect to some correctness property) compact, conical representation, which is amenable to mechanical verification. Our approach consists of an algebra and a set of property-preserving rewrite rules for the canonical homomorphic abstraction of infinite network protocol composition (CHAIN). Using CHAIN, an expression over our algebra (i.e., a set of configurations of network protocol agents) can be reduced to another behaviorally-equivalent expression (i.e., a smaller set of configurations). Repeated applications of such rewrite rules produce a canonical expression which can be checked mechanically. We demonstrate our approach by characterizing deadlock-prone configurations of HTTP agents, as well as establishing useful properties of an overlay protocol for scheduling MPEG frames, and of a protocol for Web intracache consistency.
复杂的多方协议的正式正确性很难验证。而特定符号约束的模型,使其自身具有任意许多代理组合的协议(例如代理链或路由器对等连接)更难以验证,因为它们代表潜在的无限状态空间,并且可能表现出在特定固定组合下可能无法实现的紧急行为。我们通过开发一种代数方法来解决这一挑战,该方法使我们能够将网络代理的任意组合减少为行为等效(相对于某些正确性属性)紧凑的圆锥表示,该表示适用于机械验证。我们的方法由一个代数和一组保持属性的重写规则组成,用于无限网络协议组合(CHAIN)的规范同态抽象。使用CHAIN,我们代数上的表达式(即网络协议代理的一组配置)可以简化为另一个行为等效的表达式(即更小的配置集)。这种重写规则的重复应用产生一个可以机械地检查的规范表达式。我们通过描述HTTP代理的易死锁配置特征,以及建立用于调度MPEG帧的覆盖协议和用于Web缓存内一致性的协议的有用属性来演示我们的方法。
{"title":"Systematic verification of safety properties of arbitrary network protocol compositions using CHAIN","authors":"A. Bradley, Azer Bestavros, A. Kfoury","doi":"10.1109/ICNP.2003.1249774","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249774","url":null,"abstract":"Formal correctness of complex multi-party protocols can be difficult to verify. While models of specific sign constraints, protocols which lend themselves to arbitrarily many compositions of agents -such as the chaining of proxies or the peering of routers- are more difficult to verify because they represent potentially infinite state spaces and may exhibit emergent behaviors which may not materialize under particular fixed compositions. We address this challenge by developing an algebraic approach that enables us to reduce arbitrary compositions of network agents into a behaviorally-equivalent (with respect to some correctness property) compact, conical representation, which is amenable to mechanical verification. Our approach consists of an algebra and a set of property-preserving rewrite rules for the canonical homomorphic abstraction of infinite network protocol composition (CHAIN). Using CHAIN, an expression over our algebra (i.e., a set of configurations of network protocol agents) can be reduced to another behaviorally-equivalent expression (i.e., a smaller set of configurations). Repeated applications of such rewrite rules produce a canonical expression which can be checked mechanically. We demonstrate our approach by characterizing deadlock-prone configurations of HTTP agents, as well as establishing useful properties of an overlay protocol for scheduling MPEG frames, and of a protocol for Web intracache consistency.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An efficient algorithm for OSPF subnet aggregation 一种高效的OSPF子网聚合算法
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249771
A. Shaikh, Dongmei Wang, Guangzhi Li, J. Yates, C. Kalmanek
Multiple addresses within an OSPF area can be aggregated and advertised together to other areas. This process is known as address aggregation and is used to reduce router computational overheads and memory requirements and to reduce the network bandwidth consumed by OSPF messages. The downside of address aggregation is that it leads to information loss and consequently sub-optimal (non-shortest path) routing of data packets. The resulting difference (path selection error) between the length of the actual forwarding path and the shortest path varies between different sources and destinations. This paper proves that the path selection error from any source to any destination can be bounded using only parameters describing the destination area. Based on this, the paper presents an efficient algorithm that generates the minimum number of aggregates subject to a maximum allowed path selection error. A major operational benefit of our algorithm is that network administrators can select aggregates for an area based solely on the topology of the area without worrying about remaining areas of the OSPF network. The other benefit is that the algorithm enables trade-offs between the number of aggregates and the bound on the path selection error. The paper also evaluates the algorithm's performance on random topologies. Our results show that in some cases, the algorithm is capable of reducing the number of aggregates by as much as 50% with only a relatively small introduction of maximum path selection error.
OSPF区域内的多个地址可以聚合在一起发布到其他区域。这个过程被称为地址聚合,用于减少路由器的计算开销和内存需求,并减少OSPF消息消耗的网络带宽。地址聚合的缺点是它会导致信息丢失,从而导致数据包的次优(非最短路径)路由。实际转发路径长度与最短路径长度之间的差异(路径选择误差)在不同的源和目的之间是不同的。证明了从任意源到任意目标的路径选择误差可以只用描述目标区域的参数有界。在此基础上,本文提出了在最大允许的路径选择误差下生成最小聚合数的高效算法。我们的算法的一个主要操作优势是,网络管理员可以仅根据区域的拓扑结构为区域选择聚合,而不必担心OSPF网络的剩余区域。另一个好处是,该算法可以在聚合的数量和路径选择错误的界限之间进行权衡。本文还对该算法在随机拓扑上的性能进行了评价。我们的结果表明,在某些情况下,该算法能够在只引入相对较小的最大路径选择误差的情况下减少多达50%的聚合数量。
{"title":"An efficient algorithm for OSPF subnet aggregation","authors":"A. Shaikh, Dongmei Wang, Guangzhi Li, J. Yates, C. Kalmanek","doi":"10.1109/ICNP.2003.1249771","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249771","url":null,"abstract":"Multiple addresses within an OSPF area can be aggregated and advertised together to other areas. This process is known as address aggregation and is used to reduce router computational overheads and memory requirements and to reduce the network bandwidth consumed by OSPF messages. The downside of address aggregation is that it leads to information loss and consequently sub-optimal (non-shortest path) routing of data packets. The resulting difference (path selection error) between the length of the actual forwarding path and the shortest path varies between different sources and destinations. This paper proves that the path selection error from any source to any destination can be bounded using only parameters describing the destination area. Based on this, the paper presents an efficient algorithm that generates the minimum number of aggregates subject to a maximum allowed path selection error. A major operational benefit of our algorithm is that network administrators can select aggregates for an area based solely on the topology of the area without worrying about remaining areas of the OSPF network. The other benefit is that the algorithm enables trade-offs between the number of aggregates and the bound on the path selection error. The paper also evaluates the algorithm's performance on random topologies. Our results show that in some cases, the algorithm is capable of reducing the number of aggregates by as much as 50% with only a relatively small introduction of maximum path selection error.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach 在自组织网络中建立安全通信的成对密钥:一种概率方法
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249782
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, S. Jajodia
A prerequisite for a secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a scalable and distributed protocol that enables two nodes to establish a pairwise shared key on the fly, without requiring the use of any on-line key distribution center. The design of our protocol is based on a novel combination of two techniques - probabilistic key sharing and threshold secret sharing. Our protocol is scalable since every node only needs to possess a small number of keys, independent of the network size, and it is computationally efficient because it only relies on symmetric key cryptography based operations. We show that a pairwise key established between two nodes using our protocol is secure against a collusion attack by up to a certain number of compromised nodes. We also show through a set of simulations that our protocol can be parameterized to meet the desired levels of performance, security and storage for the application under consideration.
在自组织网络中,两个节点之间安全通信的先决条件是节点共享一个密钥来引导它们的信任关系。在本文中,我们提出了一个可扩展的分布式协议,该协议使两个节点能够动态地建立成对共享密钥,而无需使用任何在线密钥分发中心。我们的协议设计是基于两种技术的新颖组合-概率密钥共享和阈值秘密共享。我们的协议是可扩展的,因为每个节点只需要拥有少量的密钥,与网络大小无关,而且它的计算效率很高,因为它只依赖于基于对称密钥加密的操作。我们证明,使用我们的协议在两个节点之间建立的成对密钥是安全的,可以抵御多达一定数量的受损节点的共谋攻击。我们还通过一组模拟表明,我们的协议可以参数化,以满足所考虑的应用程序所需的性能、安全性和存储级别。
{"title":"Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach","authors":"Sencun Zhu, Shouhuai Xu, Sanjeev Setia, S. Jajodia","doi":"10.1109/ICNP.2003.1249782","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249782","url":null,"abstract":"A prerequisite for a secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a scalable and distributed protocol that enables two nodes to establish a pairwise shared key on the fly, without requiring the use of any on-line key distribution center. The design of our protocol is based on a novel combination of two techniques - probabilistic key sharing and threshold secret sharing. Our protocol is scalable since every node only needs to possess a small number of keys, independent of the network size, and it is computationally efficient because it only relies on symmetric key cryptography based operations. We show that a pairwise key established between two nodes using our protocol is secure against a collusion attack by up to a certain number of compromised nodes. We also show through a set of simulations that our protocol can be parameterized to meet the desired levels of performance, security and storage for the application under consideration.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 398
期刊
11th IEEE International Conference on Network Protocols, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1