首页 > 最新文献

2009 First International Conference on Communications and Networking最新文献

英文 中文
Analytical jitter model for IP network planning and design IP网络规划设计中的解析抖动模型
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373565
H. Dahmouni, A. Girard, B. Sansò
Traditionally, IP Network planning and design is mostly based on average delay or loss constraints which can often be easily calculated. Jitter, on the other hand, is much more difficult to evaluate but this is particularly important to manage the QoS of real-time and interactive services such as VoIP and streaming video. In this paper, we propose a simple model for the delay jitter that is fast enough to be used in networks design algorithms. It takes into account the packets delay correlation and also the correlation of tandem queues that have a significant impact on the end-to-end jitter. We present simple formulas for the jitter of Poisson traffic in a single queue that can be calculated quickly. We then extend them to the end-to-end jitter of a tagged stream based on a tandem queueing network. The results given by the model are then compared with event-driven simulations. We find that they are very accurate for Poisson traffic over a wide range of traffic loads and more importantly, that they yield conservative values for the jitter so that they can be used in network design procedures.
传统的IP网络规划和设计主要基于平均延迟或损失约束,这些约束通常很容易计算。另一方面,抖动更难评估,但这对于管理实时和交互式服务(如VoIP和流媒体视频)的QoS尤为重要。在本文中,我们提出了一个简单的延迟抖动模型,该模型足够快,可以用于网络设计算法。它考虑了对端到端抖动有重要影响的分组延迟相关性和串列相关性。给出了单队列泊松流量抖动的简单计算公式。然后,我们将它们扩展到基于串联排队网络的标记流的端到端抖动。然后将模型给出的结果与事件驱动的模拟结果进行比较。我们发现它们对于泊松流量在很大的流量负载范围内是非常准确的,更重要的是,它们产生的抖动值是保守的,因此它们可以用于网络设计过程。
{"title":"Analytical jitter model for IP network planning and design","authors":"H. Dahmouni, A. Girard, B. Sansò","doi":"10.1109/COMNET.2009.5373565","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373565","url":null,"abstract":"Traditionally, IP Network planning and design is mostly based on average delay or loss constraints which can often be easily calculated. Jitter, on the other hand, is much more difficult to evaluate but this is particularly important to manage the QoS of real-time and interactive services such as VoIP and streaming video. In this paper, we propose a simple model for the delay jitter that is fast enough to be used in networks design algorithms. It takes into account the packets delay correlation and also the correlation of tandem queues that have a significant impact on the end-to-end jitter. We present simple formulas for the jitter of Poisson traffic in a single queue that can be calculated quickly. We then extend them to the end-to-end jitter of a tagged stream based on a tandem queueing network. The results given by the model are then compared with event-driven simulations. We find that they are very accurate for Poisson traffic over a wide range of traffic loads and more importantly, that they yield conservative values for the jitter so that they can be used in network design procedures.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127609184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Vertical handover based on IEEE802.21 and Mobile IPv6 in UMTS/WLAN networks UMTS/WLAN网络中基于IEEE802.21和移动IPv6的垂直切换
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373564
Sarra Benoubira, M. Frikha, S. Tabbane, Khobeib Ayadi
The internetworking among heterogeneous networks is in demand to provide "always-on" connectivity services. A widespread vision of the fourth generation (4G) mobile networks includes coexistence of current wireless technologies such as WLAN, WiMAX, General Packet Radio Service (GPRS) and Universal Mobile Telecommunications System (UMTS). The major problem that faces next generation wireless networks (NGWN) is vertical handoff management. The existing handoff management protocols are not sufficient to guarantee handoff support that is transparent to the applications in NGWS. In this paper we propose an approach based on IEEE 802.21 MIH and Mobile IPv6 to optimize vertical handover management for multi-interface MN.
异构网络之间的互连是提供“永远在线”连接服务的需求。第四代(4G)移动网络的广泛愿景包括当前无线技术的共存,如WLAN、WiMAX、通用分组无线业务(GPRS)和通用移动通信系统(UMTS)。下一代无线网络(NGWN)面临的主要问题是垂直切换管理。现有的切换管理协议不足以保证对NGWS中的应用透明的切换支持。本文提出了一种基于IEEE 802.21 MIH和移动IPv6的多接口MN垂直切换管理优化方法。
{"title":"Vertical handover based on IEEE802.21 and Mobile IPv6 in UMTS/WLAN networks","authors":"Sarra Benoubira, M. Frikha, S. Tabbane, Khobeib Ayadi","doi":"10.1109/COMNET.2009.5373564","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373564","url":null,"abstract":"The internetworking among heterogeneous networks is in demand to provide \"always-on\" connectivity services. A widespread vision of the fourth generation (4G) mobile networks includes coexistence of current wireless technologies such as WLAN, WiMAX, General Packet Radio Service (GPRS) and Universal Mobile Telecommunications System (UMTS). The major problem that faces next generation wireless networks (NGWN) is vertical handoff management. The existing handoff management protocols are not sufficient to guarantee handoff support that is transparent to the applications in NGWS. In this paper we propose an approach based on IEEE 802.21 MIH and Mobile IPv6 to optimize vertical handover management for multi-interface MN.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129632826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Asynchronous DS-UWB communication using spatiotemporal chaotic waveforms and sequences 利用时空混沌波形和序列的异步DS-UWB通信
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373551
Ali Kotti, S. Meherzi, S. Marcos, S. Belghith
It is known that in a direct-sequence (DS) ultrawideband (UWB) system, a single type of UWB pulse is used in all bits for all users. In this paper, we address a method to generate varying waveforms based on spatiotemporal chaotic approach. Regarding spreading sequences, we consider the two cases of short and long sequences. In particular, we propose the use of a family of spatiotemporal chaotic systems, namely Piecewise Coupled Map Lattices (PCML), as spatiotemporal chaotic waveforms and spreading sequences. Such sequences are shown to reduce the multi-user interference (MUI) variance with regard to i.i.d. and Gold sequences for both short and long cases. On the other hand, we evaluate and compare the DS-UWB system performance by using conventional waveform such as Gaussian monocycle pulse and PCML pulses. Finally, we show that the use of long PCML codes with PCML pulses, results in an improvement of the system average BER, hence an increase of the system capacity in terms of number of active users.
众所周知,在直接序列(DS)超宽带(UWB)系统中,所有用户在所有比特上使用单一类型的超宽带脉冲。本文提出了一种基于时空混沌方法的变波形生成方法。对于扩展序列,我们考虑了短序列和长序列两种情况。特别地,我们建议使用一组时空混沌系统,即分段耦合映射格(PCML),作为时空混沌波形和扩展序列。这样的序列在短和长情况下都可以减少与i.i.d和Gold序列相关的多用户干扰(MUI)方差。另一方面,我们用传统的波形如高斯单周期脉冲和PCML脉冲来评估和比较DS-UWB系统的性能。最后,我们证明了使用带有PCML脉冲的长PCML编码可以改善系统的平均误码率,从而增加系统的活跃用户数量。
{"title":"Asynchronous DS-UWB communication using spatiotemporal chaotic waveforms and sequences","authors":"Ali Kotti, S. Meherzi, S. Marcos, S. Belghith","doi":"10.1109/COMNET.2009.5373551","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373551","url":null,"abstract":"It is known that in a direct-sequence (DS) ultrawideband (UWB) system, a single type of UWB pulse is used in all bits for all users. In this paper, we address a method to generate varying waveforms based on spatiotemporal chaotic approach. Regarding spreading sequences, we consider the two cases of short and long sequences. In particular, we propose the use of a family of spatiotemporal chaotic systems, namely Piecewise Coupled Map Lattices (PCML), as spatiotemporal chaotic waveforms and spreading sequences. Such sequences are shown to reduce the multi-user interference (MUI) variance with regard to i.i.d. and Gold sequences for both short and long cases. On the other hand, we evaluate and compare the DS-UWB system performance by using conventional waveform such as Gaussian monocycle pulse and PCML pulses. Finally, we show that the use of long PCML codes with PCML pulses, results in an improvement of the system average BER, hence an increase of the system capacity in terms of number of active users.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient backward compatible allocation mechanism for multi-user CSMA/CA schemes 多用户CSMA/CA方案的高效向后兼容分配机制
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373561
M. Kamoun, L. Mazet, S. Gault
With the increase of the number of Wireless Local Area Network devices (laptop PC, PDA, cellphones and set-top boxes) multi-user communication get a great interest for future versions of IEEE 802.11 standard. However, current CSMA/CA WLAN protocols do not support multiple transmissions on the same time frequency resource. This hinders these systems from taking a potential increase of the available throughput in dense deployments. In this contribution we propose a new RTS/CTS mechanism destined for WLAN SDMA/OFDMA access. We provide a capacity based analytical framework to assess the performance of these PHY layer techniques from MAC perspective in a multi-user context. Taking into account the MAC overhead it is shown that SDMA provides a substantial gain for multi-user throughput.
随着无线局域网设备(笔记本电脑、PDA、手机和机顶盒)数量的增加,多用户通信得到了IEEE 802.11标准未来版本的极大关注。然而,目前的CSMA/CA无线局域网协议不支持在同一时间频率资源上进行多次传输。这阻碍了这些系统在密集部署中获得可用吞吐量的潜在增长。在这篇文章中,我们提出了一种新的RTS/CTS机制,用于WLAN SDMA/OFDMA访问。我们提供了一个基于容量的分析框架,以在多用户环境中从MAC角度评估这些物理层技术的性能。考虑到MAC开销,SDMA为多用户吞吐量提供了可观的增益。
{"title":"Efficient backward compatible allocation mechanism for multi-user CSMA/CA schemes","authors":"M. Kamoun, L. Mazet, S. Gault","doi":"10.1109/COMNET.2009.5373561","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373561","url":null,"abstract":"With the increase of the number of Wireless Local Area Network devices (laptop PC, PDA, cellphones and set-top boxes) multi-user communication get a great interest for future versions of IEEE 802.11 standard. However, current CSMA/CA WLAN protocols do not support multiple transmissions on the same time frequency resource. This hinders these systems from taking a potential increase of the available throughput in dense deployments. In this contribution we propose a new RTS/CTS mechanism destined for WLAN SDMA/OFDMA access. We provide a capacity based analytical framework to assess the performance of these PHY layer techniques from MAC perspective in a multi-user context. Taking into account the MAC overhead it is shown that SDMA provides a substantial gain for multi-user throughput.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127267027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Achieving broadcasting efficiency in V2X networks with a distance-based protocol 利用基于距离的协议实现V2X网络的广播效率
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373556
F. Hrizi, F. Filali
Vehicular wireless networks are prospective tools which contribute to safer and more efficient roads. Therefore, they require the design and development of new communication protocols that should constitute the building blocks of future vehicular communication architecture. Many works have been carried out in this wide research area. In this paper, we propose a reliable distance-based broadcast protocol to deliver safety information to nodes located in a geographical area when an emergency event occurs. Simulation results show that the proposed protocol achieves its design goal of delivering information in a rapid and efficient manner. Furthermore, we conclude that our proposal performs better in terms of information reception delay as well as redundancy factor as compared to a scheme inspired from previous proposed schemes.
车载无线网络是一种有前景的工具,它有助于提高道路的安全性和效率。因此,它们需要设计和开发新的通信协议,这些协议应该构成未来车辆通信架构的构建块。在这一广泛的研究领域开展了许多工作。本文提出了一种可靠的基于距离的广播协议,用于在突发事件发生时向地理区域内的节点传递安全信息。仿真结果表明,该协议实现了快速、高效地传递信息的设计目标。此外,我们得出结论,与先前提出的方案相比,我们的方案在信息接收延迟和冗余系数方面表现更好。
{"title":"Achieving broadcasting efficiency in V2X networks with a distance-based protocol","authors":"F. Hrizi, F. Filali","doi":"10.1109/COMNET.2009.5373556","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373556","url":null,"abstract":"Vehicular wireless networks are prospective tools which contribute to safer and more efficient roads. Therefore, they require the design and development of new communication protocols that should constitute the building blocks of future vehicular communication architecture. Many works have been carried out in this wide research area. In this paper, we propose a reliable distance-based broadcast protocol to deliver safety information to nodes located in a geographical area when an emergency event occurs. Simulation results show that the proposed protocol achieves its design goal of delivering information in a rapid and efficient manner. Furthermore, we conclude that our proposal performs better in terms of information reception delay as well as redundancy factor as compared to a scheme inspired from previous proposed schemes.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127805492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Overlay routing efficiency during Internet outages 互联网中断时的覆盖路由效率
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373562
Simon Delamare, M. Riguidel
Internet communications may have strong reliability requirements and outages may thus have serious consequences. Recovery mechanisms are therefore deployed in networks to mitigate the effects of incidents that hit Internet. This paper proposes to study recovery mechanisms based on overlay routing. We are focusing on the ability for such systems to recover a failing communication, compared to traditional IP routing systems. We propose a model of these mechanisms behaviour deployed in several interconnected networks in reaction to different incidents. Our results point out that overlay routing can increase communications reliability and emphasize the importance of overlay nodes deployment.
Internet通信可能有很强的可靠性要求,因此中断可能会产生严重的后果。因此,在网络中部署了恢复机制,以减轻攻击Internet的事件的影响。本文提出研究基于叠加路由的恢复机制。与传统的IP路由系统相比,我们关注的是这种系统恢复通信故障的能力。我们提出了一个这些机制的行为模型,部署在几个相互连接的网络中,以应对不同的事件。研究结果表明,覆盖路由可以提高通信可靠性,并强调了覆盖节点部署的重要性。
{"title":"Overlay routing efficiency during Internet outages","authors":"Simon Delamare, M. Riguidel","doi":"10.1109/COMNET.2009.5373562","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373562","url":null,"abstract":"Internet communications may have strong reliability requirements and outages may thus have serious consequences. Recovery mechanisms are therefore deployed in networks to mitigate the effects of incidents that hit Internet. This paper proposes to study recovery mechanisms based on overlay routing. We are focusing on the ability for such systems to recover a failing communication, compared to traditional IP routing systems. We propose a model of these mechanisms behaviour deployed in several interconnected networks in reaction to different incidents. Our results point out that overlay routing can increase communications reliability and emphasize the importance of overlay nodes deployment.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative strategy learning for distributed network self-configuring 分布式网络自配置的协同策略学习
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373555
M. Mbaye, F. Krief, H. Soldano
Self-configuration is one of the most important functions of autonomic networks because it determines optimal use of resources during network's operation. However, this task is very complex as it must be performed according to service contracts between users and operators, network's infrastructure and workload. Knowledge Plane is a recently proposed concept to address this complexity by using cognitive tools (learning and reasoning). In this paper, we propose a Knowledge Plane including a distributed and collaborative machine learning method based on inductive logic programming (ILP). The main objective is to achieve distributed self-configuring by learning collaboratively best configuration strategies. We apply it in a practical context (DiffServ) and evaluate effects of this proposal on network's performances and occupation rate.
自配置是自主网络最重要的功能之一,它决定了网络运行过程中资源的最优利用。然而,这项任务非常复杂,因为它必须根据用户和运营商之间的服务合同、网络基础设施和工作量来执行。知识平面是最近提出的一个概念,通过使用认知工具(学习和推理)来解决这种复杂性。本文提出了一种基于归纳逻辑编程(ILP)的分布式协同机器学习方法的知识平面。主要目标是通过协作学习最佳配置策略来实现分布式自配置。我们将其应用于实际环境(DiffServ),并评估了该建议对网络性能和占用率的影响。
{"title":"Collaborative strategy learning for distributed network self-configuring","authors":"M. Mbaye, F. Krief, H. Soldano","doi":"10.1109/COMNET.2009.5373555","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373555","url":null,"abstract":"Self-configuration is one of the most important functions of autonomic networks because it determines optimal use of resources during network's operation. However, this task is very complex as it must be performed according to service contracts between users and operators, network's infrastructure and workload. Knowledge Plane is a recently proposed concept to address this complexity by using cognitive tools (learning and reasoning). In this paper, we propose a Knowledge Plane including a distributed and collaborative machine learning method based on inductive logic programming (ILP). The main objective is to achieve distributed self-configuring by learning collaboratively best configuration strategies. We apply it in a practical context (DiffServ) and evaluate effects of this proposal on network's performances and occupation rate.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123099270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An adaptive control algorithm in intelligent home networks 智能家庭网络中的自适应控制算法
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373563
Kaouthar Sethom Ben Reguiga, N. Aitsaadi, G. Pujolle
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definition rendering systems, home gateways, wired and wireless controllable equipments are now available. Many protocols enable connectivity and interaction between devices. However, some challenges remain such as a smart routing protocol. In this paper, we propose an adaptive control algorithm for intelligent routing inside home. Our work is divided on two parts: first, we try to adjust Access router routing zone radius dynamically via a fuzzy inference system for load balancing. Then an energy efficient algorithm to find and maintain routes is proposed.
家庭环境已准备好承载分布式设备,动态适应服务可用性,并对用户位置和用户活动做出反应。传感器,高清渲染系统,家庭网关,有线和无线可控设备现在可用。许多协议支持设备之间的连接和交互。然而,仍然存在一些挑战,例如智能路由协议。本文提出了一种用于家庭内部智能路由的自适应控制算法。我们的工作分为两部分:首先,我们尝试通过模糊推理系统动态调整接入路由器路由区域半径,以实现负载均衡。在此基础上,提出了一种高效节能的路由查找和维护算法。
{"title":"An adaptive control algorithm in intelligent home networks","authors":"Kaouthar Sethom Ben Reguiga, N. Aitsaadi, G. Pujolle","doi":"10.1109/COMNET.2009.5373563","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373563","url":null,"abstract":"The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definition rendering systems, home gateways, wired and wireless controllable equipments are now available. Many protocols enable connectivity and interaction between devices. However, some challenges remain such as a smart routing protocol. In this paper, we propose an adaptive control algorithm for intelligent routing inside home. Our work is divided on two parts: first, we try to adjust Access router routing zone radius dynamically via a fuzzy inference system for load balancing. Then an energy efficient algorithm to find and maintain routes is proposed.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124502360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SeGCom: A secure group communication mechanism in cluster-tree wireless sensor networks SeGCom:集群树无线传感器网络中的安全组通信机制
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373554
Olfa Gaddour, A. Koubâa, M. Abid
Security is a challenging issue in Wireless Sensor Networks (WSNs) due to the dual impact of their inherent constraints and their operation in open and harsh environments. The problem of securing a WSN becomes even more complex when considering group communications. In this paper, we address this problem and propose a new security mechanism for group communications in cluster-tree WSNs. We define a group as a set of sensor nodes in the cluster-tree network sharing the same sensory information (e.g. temperature, pressure, etc.). Our objective is to limit the access to the group data exclusively to the members that have securely joined the group. The main contributions of the paper are (1) the proposal of an efficient and secure group management mechanism for cluster-tree networks, and (2) a secure key distribution between group members. Finally, our security analysis shows that the proposed scheme is efficient and secure.
无线传感器网络(WSNs)的安全性是一个具有挑战性的问题,由于其固有的约束和其在开放和恶劣环境中的运行的双重影响。在考虑组通信时,保护WSN的问题变得更加复杂。本文针对这一问题,提出了一种新的簇树WSNs组通信安全机制。我们将组定义为簇树网络中共享相同感官信息(例如温度,压力等)的一组传感器节点。我们的目标是将对组数据的访问限制为只允许安全加入组的成员访问。本文的主要贡献有:(1)提出了一种高效、安全的簇树网络组管理机制,(2)在组成员之间安全分发密钥。最后,我们的安全性分析表明了该方案的有效性和安全性。
{"title":"SeGCom: A secure group communication mechanism in cluster-tree wireless sensor networks","authors":"Olfa Gaddour, A. Koubâa, M. Abid","doi":"10.1109/COMNET.2009.5373554","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373554","url":null,"abstract":"Security is a challenging issue in Wireless Sensor Networks (WSNs) due to the dual impact of their inherent constraints and their operation in open and harsh environments. The problem of securing a WSN becomes even more complex when considering group communications. In this paper, we address this problem and propose a new security mechanism for group communications in cluster-tree WSNs. We define a group as a set of sensor nodes in the cluster-tree network sharing the same sensory information (e.g. temperature, pressure, etc.). Our objective is to limit the access to the group data exclusively to the members that have securely joined the group. The main contributions of the paper are (1) the proposal of an efficient and secure group management mechanism for cluster-tree networks, and (2) a secure key distribution between group members. Finally, our security analysis shows that the proposed scheme is efficient and secure.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
S-Promela: An executable specification security policies language S-Promela:一种可执行规范安全策略语言
Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373568
Ryma Abbassi, S. Fatmi
Security Policy constitutes the main basis of a secured system but can be its main vulnerability also since a wrongly configured policy or an inadequate one can be fatal for the system. Even if the network administrator is a high qualified person, the human interventions are error prone. Nevertheless, a formal specification can avoid such problem. This paper aims to give a first step towards a framework allowing to specify and to verify a given policy with respect to an expected one. Hence, we propose in this paper a new all-purpose security policy modeling based on the concepts of processes, channels, constraints, events and actions. This modeling is called all-purpose because it can be easily used to represent the several kinds of security rules i.e. authorization, obligation and prohibition. Moreover, it constitutes the first step towards the proposition of a new executable security specification language. This language, called S-Promela has a syntax supporting authorization, obligation and prohibition rules and a semantics facilitating the validation task.
安全策略构成了受保护系统的主要基础,但也可能是其主要漏洞,因为错误配置的策略或不适当的策略可能对系统造成致命的影响。即使网络管理员是一个高素质的人,人为干预也很容易出错。然而,正式的规范可以避免这样的问题。本文的目的是向一个框架迈出第一步,该框架允许指定和验证给定策略相对于预期策略。因此,本文提出了一种基于过程、通道、约束、事件和动作等概念的通用安全策略模型。这种建模被称为万能的,因为它可以很容易地用于表示几种安全规则,即授权、义务和禁止。此外,它构成了提出新的可执行安全规范语言的第一步。这种称为S-Promela的语言具有支持授权、义务和禁止规则的语法,以及促进验证任务的语义。
{"title":"S-Promela: An executable specification security policies language","authors":"Ryma Abbassi, S. Fatmi","doi":"10.1109/COMNET.2009.5373568","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373568","url":null,"abstract":"Security Policy constitutes the main basis of a secured system but can be its main vulnerability also since a wrongly configured policy or an inadequate one can be fatal for the system. Even if the network administrator is a high qualified person, the human interventions are error prone. Nevertheless, a formal specification can avoid such problem. This paper aims to give a first step towards a framework allowing to specify and to verify a given policy with respect to an expected one. Hence, we propose in this paper a new all-purpose security policy modeling based on the concepts of processes, channels, constraints, events and actions. This modeling is called all-purpose because it can be easily used to represent the several kinds of security rules i.e. authorization, obligation and prohibition. Moreover, it constitutes the first step towards the proposition of a new executable security specification language. This language, called S-Promela has a syntax supporting authorization, obligation and prohibition rules and a semantics facilitating the validation task.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2009 First International Conference on Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1