首页 > 最新文献

2007 2nd International Conference on Communication Systems Software and Middleware最新文献

英文 中文
Controlled Dissemination Filter (CDF) for Integrated Link Selection Agents 集成链路选择代理的控制传播过滤器
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382584
M. Fecko, Ibrahim Hökelek, S. Samtani, A. Staikos
To perform optimizations as the network changes dynamically, distributed network agents rely on information that is dispersed in the network. A data dissemination service for the agents can benefit from data filtering at selected nodes in a data distribution tree. Controlled dissemination filter (CDF) offers an efficient filtering functionality such as sifting, collection, aggregation, and scoping. We defined a number of new objective functions for the data-flow channelization algorithms, and created both centralized and distributed algorithms to optimize filter placement in polynomial time. We also designed an application of the CDF to information flows relevant to the unicast routing control agent (URCA) and showed how the CDF reduces the bandwidth consumed by data dissemination without impairing the URCA decision-making functionalities.
为了在网络动态变化时执行优化,分布式网络代理依赖于分散在网络中的信息。代理的数据传播服务可以从数据分布树中选定节点的数据过滤中获益。受控传播过滤器(CDF)提供了高效的过滤功能,如筛选、收集、聚合和限定范围。我们为数据流信道化算法定义了许多新的目标函数,并创建了集中式和分布式算法,以在多项式时间内优化滤波器的放置。我们还设计了一个CDF应用于与单播路由控制代理(URCA)相关的信息流,并展示了CDF如何在不损害URCA决策功能的情况下减少数据传播消耗的带宽。
{"title":"Controlled Dissemination Filter (CDF) for Integrated Link Selection Agents","authors":"M. Fecko, Ibrahim Hökelek, S. Samtani, A. Staikos","doi":"10.1109/COMSWA.2007.382584","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382584","url":null,"abstract":"To perform optimizations as the network changes dynamically, distributed network agents rely on information that is dispersed in the network. A data dissemination service for the agents can benefit from data filtering at selected nodes in a data distribution tree. Controlled dissemination filter (CDF) offers an efficient filtering functionality such as sifting, collection, aggregation, and scoping. We defined a number of new objective functions for the data-flow channelization algorithms, and created both centralized and distributed algorithms to optimize filter placement in polynomial time. We also designed an application of the CDF to information flows relevant to the unicast routing control agent (URCA) and showed how the CDF reduces the bandwidth consumed by data dissemination without impairing the URCA decision-making functionalities.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks 一种有效的无线传感器网络成对密钥建立方案
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382459
Abhishek K. Gupta, P. Nuggehalli, J. Kuri
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxy-based scheme in the work of Ling and Znati (2005) and Li et al. (2005), we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably more than that of finding proxies, leading to lower communication overhead. Further, we prove that the friend-based scheme performs better than the proxy-based scheme both in terms of resilience against node capture as well as in energy consumption for pairwise key establishment, making our scheme more feasible.
本文研究了无线传感器网络中使用随机密钥预分配技术建立安全路径密钥的问题。受Ling和Znati(2005)以及Li等人(2005)最近基于代理的方案的启发,我们引入了一种基于朋友的方案,用于安全地建立成对密钥。我们表明,在邻居中找到朋友的机会比找到代理的机会要大得多,从而降低了通信开销。此外,我们证明了基于朋友的方案在抗节点捕获的弹性和配对密钥建立的能耗方面都优于基于代理的方案,使我们的方案更加可行。
{"title":"An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks","authors":"Abhishek K. Gupta, P. Nuggehalli, J. Kuri","doi":"10.1109/COMSWA.2007.382459","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382459","url":null,"abstract":"This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxy-based scheme in the work of Ling and Znati (2005) and Li et al. (2005), we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably more than that of finding proxies, leading to lower communication overhead. Further, we prove that the friend-based scheme performs better than the proxy-based scheme both in terms of resilience against node capture as well as in energy consumption for pairwise key establishment, making our scheme more feasible.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Agent Based Messaging Mechanism for Emergency Medical Data Transmission Over Cellular Networks 基于移动代理的蜂窝网络应急医疗数据传递机制
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382486
B. Arunachalan, J. Light, Ian Watson
Healthcare environment integrate several health care services through a high degree of mutual work, mobility and information access from many devices and artifacts. Sharing of information through a fast and reliable transmission media among the services will have a significant impact. The rapid developments in mobile communication technologies and new generations of mobile devices allow users access to stored data even when they travel. This capability has elicited emergency medical data transmission over cellular network. In this paper, we have proposed a message framework for emergency medical data transmission and an agent based implementation mechanism. The HL7 messaging format, a standard adopted for medical data transmission is discussed. The messaging mechanism is used in AMMA; an agent based mobile middleware architecture for reliable transmission of patient data from the ambulance to the hospital over code division multiple access (CDMA) cellular network.
医疗保健环境通过来自许多设备和工件的高度相互工作、移动性和信息访问来集成多个医疗保健服务。各军种之间通过快速可靠的传输媒介共享信息将产生重大影响。移动通信技术和新一代移动设备的快速发展使用户即使在旅行中也能访问存储的数据。这种能力引发了通过蜂窝网络传输紧急医疗数据。本文提出了一种紧急医疗数据传输的消息框架和基于agent的实现机制。讨论了用于医疗数据传输的标准HL7消息格式。在AMMA中使用消息传递机制;一种基于代理的移动中间件架构,用于通过码分多址(CDMA)蜂窝网络将患者数据从救护车可靠地传输到医院。
{"title":"Mobile Agent Based Messaging Mechanism for Emergency Medical Data Transmission Over Cellular Networks","authors":"B. Arunachalan, J. Light, Ian Watson","doi":"10.1109/COMSWA.2007.382486","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382486","url":null,"abstract":"Healthcare environment integrate several health care services through a high degree of mutual work, mobility and information access from many devices and artifacts. Sharing of information through a fast and reliable transmission media among the services will have a significant impact. The rapid developments in mobile communication technologies and new generations of mobile devices allow users access to stored data even when they travel. This capability has elicited emergency medical data transmission over cellular network. In this paper, we have proposed a message framework for emergency medical data transmission and an agent based implementation mechanism. The HL7 messaging format, a standard adopted for medical data transmission is discussed. The messaging mechanism is used in AMMA; an agent based mobile middleware architecture for reliable transmission of patient data from the ambulance to the hospital over code division multiple access (CDMA) cellular network.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Automatic Calibration Using Receiver Operating Characteristics Curves 使用接收机工作特性曲线的自动校准
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382484
Prakash Kolan, Ram Vaithilingam, R. Dantu
Application-level filters, such as e-mail and VoIP spam filters, that analyze dynamic behavior changes are replacing static signature-recognition filters. These application-level filters learn behavior and use that knowledge to filter unwanted requests. Because behavior of a service request's participating entities changes rapidly, filters must adapt quickly by using end user's preferences about receiving that service request message. Many adaptive filters learn from the participating entities' behavior; however, none configure themselves automatically to an end user's changing tolerance levels. Also, filter administrators cannot manually change the threshold for each service request in real time. Traditional adaptive filters fail when administrators must optimize multiple filter thresholds manually and often. Thus, to improve a filter's learning, we must automate its threshold-update process. We propose an automatic threshold-calibration mechanism using Receiver Operating Characteristics (ROC) curves that updates the threshold based on an end user's feedback. To demonstrate the mechanism's real-time applicability, we integrated it in a Voice over IP (VoIP) spam filter that analyzes incoming Spam over IP Telephony (SPIT) calls. Using this mechanism, we observed good improvement in the VoIP spam filter's accuracy. Further, computing and updating the optimum threshold in realtime does not impede the filter's temporal performance because we update thresholds after each call's completion. Because we reach an optimum threshold for any initial setting, this mechanism works efficiently when we cannot predict end-user behavior. Furthermore, automatic calibration proves efficient when using multiple threshold values.
分析动态行为变化的应用程序级过滤器(如电子邮件和VoIP垃圾邮件过滤器)正在取代静态签名识别过滤器。这些应用程序级过滤器学习行为并使用这些知识来过滤不需要的请求。由于服务请求参与实体的行为变化很快,因此过滤器必须通过使用最终用户关于接收该服务请求消息的首选项来快速适应。许多自适应滤波器从参与实体的行为中学习;但是,它们都不会自动配置自己以适应最终用户不断变化的容忍级别。此外,过滤器管理员无法实时手动更改每个服务请求的阈值。当管理员必须经常手动优化多个过滤器阈值时,传统的自适应过滤器会失败。因此,为了提高过滤器的学习能力,我们必须使其阈值更新过程自动化。我们提出了一种使用接收者工作特征(ROC)曲线的自动阈值校准机制,该机制根据最终用户的反馈更新阈值。为了演示该机制的实时适用性,我们将其集成到IP语音(VoIP)垃圾邮件过滤器中,该过滤器分析IP电话(SPIT)呼叫传入的垃圾邮件。使用这种机制,我们观察到VoIP垃圾邮件过滤器的准确性有了很好的提高。此外,实时计算和更新最佳阈值不会影响过滤器的时间性能,因为我们在每次调用完成后更新阈值。因为我们达到了任何初始设置的最佳阈值,所以当我们无法预测最终用户行为时,这种机制有效地工作。此外,当使用多个阈值时,自动校准证明是有效的。
{"title":"Automatic Calibration Using Receiver Operating Characteristics Curves","authors":"Prakash Kolan, Ram Vaithilingam, R. Dantu","doi":"10.1109/COMSWA.2007.382484","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382484","url":null,"abstract":"Application-level filters, such as e-mail and VoIP spam filters, that analyze dynamic behavior changes are replacing static signature-recognition filters. These application-level filters learn behavior and use that knowledge to filter unwanted requests. Because behavior of a service request's participating entities changes rapidly, filters must adapt quickly by using end user's preferences about receiving that service request message. Many adaptive filters learn from the participating entities' behavior; however, none configure themselves automatically to an end user's changing tolerance levels. Also, filter administrators cannot manually change the threshold for each service request in real time. Traditional adaptive filters fail when administrators must optimize multiple filter thresholds manually and often. Thus, to improve a filter's learning, we must automate its threshold-update process. We propose an automatic threshold-calibration mechanism using Receiver Operating Characteristics (ROC) curves that updates the threshold based on an end user's feedback. To demonstrate the mechanism's real-time applicability, we integrated it in a Voice over IP (VoIP) spam filter that analyzes incoming Spam over IP Telephony (SPIT) calls. Using this mechanism, we observed good improvement in the VoIP spam filter's accuracy. Further, computing and updating the optimum threshold in realtime does not impede the filter's temporal performance because we update thresholds after each call's completion. Because we reach an optimum threshold for any initial setting, this mechanism works efficiently when we cannot predict end-user behavior. Furthermore, automatic calibration proves efficient when using multiple threshold values.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Location Estimation Scheme using Connectivity Constraints for Wireless Ad Hoc Sensor Networks 基于连接约束的无线自组织传感器网络位置估计方案
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382581
N. Sundaram, P. Ramanathan
The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware. The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware.
提出了一种估计传感器网络中节点位置的方法。这个网络有几个节点,它们的位置是精确已知的。其他节点根据它们通过无线自组织网络上的消息交换收集的邻居关系来估计它们的位置。本文表明,与仅利用邻居关系相比,通过引入非邻居约束可以大大提高位置估计的精度。分析了某一规则部署的期望位置估计误差。对于其他部署,经验评估表明,该方案可以准确地估计节点位置,而不需要任何专门的硬件。提出了一种估计传感器网络中节点位置的方法。这个网络有几个节点,它们的位置是精确已知的。其他节点根据它们通过无线自组织网络上的消息交换收集的邻居关系来估计它们的位置。本文表明,与仅利用邻居关系相比,通过引入非邻居约束可以大大提高位置估计的精度。分析了某一规则部署的期望位置估计误差。对于其他部署,经验评估表明,该方案可以准确地估计节点位置,而不需要任何专门的硬件。
{"title":"Location Estimation Scheme using Connectivity Constraints for Wireless Ad Hoc Sensor Networks","authors":"N. Sundaram, P. Ramanathan","doi":"10.1109/COMSWA.2007.382581","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382581","url":null,"abstract":"The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware. The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Distributed Agreement Protocols for Information Assurance Applications 信息保障应用的安全分布式协议协议
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382482
A. Sabbir, K. Ravindran, K. Kwiat
Distributed agreement protocols among a group of application processes are often built upon atomic multicast message delivery guarantees. Issues arise however when agreement protocols are realized in Information Assurance (IA) settings where extreme failure behaviors such as send-omission of processes and message timeliness violations are likely. The issues are compounded by security weaknesses in the communication software that make it easier for intruders to stage attacks. These issues impact the design of agreement protocols, which have hitherto assumed only benign failures such as process crash and network message loss/delay. In this paper, we revisit the distributed agreement problem, taking into account the IA dimension as well. Our study reveals the need for a secure centralized entity to realize the group decision-making and state coordination functions. Two functions are studied: dynamic group membership management to exclude non-cooperating members from the group and security-reinforced communications to enforce mutual anonymity of members. Our paper walks through a state-machine based realization of distributed agreements using secure atomic multicast protocol as an underlying communication substrate. The use of our approach in IA applications is also described.
一组应用程序进程之间的分布式协议通常建立在原子多播消息传递保证的基础上。然而,当在信息保证(IA)设置中实现协议协议时,问题就出现了,在这些设置中,可能出现极端的失败行为,例如发送遗漏过程和消息时效性违规。通信软件的安全漏洞使问题更加复杂,这使得入侵者更容易发动攻击。这些问题影响了协议协议的设计,迄今为止,协议协议只假定良性故障,如进程崩溃和网络消息丢失/延迟。在本文中,我们重新审视了分布式协议问题,同时也考虑了IA维度。我们的研究表明,需要一个安全的集中实体来实现群体决策和国家协调功能。研究了动态组成员管理和安全增强通信两种功能,前者可以将不合作的组成员排除在组成员之外,后者可以增强组成员之间的相互匿名性。本文介绍了一种基于状态机的分布式协议的实现,使用安全原子多播协议作为底层通信基板。本文还描述了我们的方法在IA应用程序中的使用。
{"title":"Secure Distributed Agreement Protocols for Information Assurance Applications","authors":"A. Sabbir, K. Ravindran, K. Kwiat","doi":"10.1109/COMSWA.2007.382482","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382482","url":null,"abstract":"Distributed agreement protocols among a group of application processes are often built upon atomic multicast message delivery guarantees. Issues arise however when agreement protocols are realized in Information Assurance (IA) settings where extreme failure behaviors such as send-omission of processes and message timeliness violations are likely. The issues are compounded by security weaknesses in the communication software that make it easier for intruders to stage attacks. These issues impact the design of agreement protocols, which have hitherto assumed only benign failures such as process crash and network message loss/delay. In this paper, we revisit the distributed agreement problem, taking into account the IA dimension as well. Our study reveals the need for a secure centralized entity to realize the group decision-making and state coordination functions. Two functions are studied: dynamic group membership management to exclude non-cooperating members from the group and security-reinforced communications to enforce mutual anonymity of members. Our paper walks through a state-machine based realization of distributed agreements using secure atomic multicast protocol as an underlying communication substrate. The use of our approach in IA applications is also described.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro 一种用于WLAN和WiBro无缝切换的快速高效认证协议
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382495
Sun-Hee Lim, Okyeon Yi, Chang-Hoon Jung, Ki-Seok Bang
A wireless network has a handover problem between heterogeneous or homogeneous network entitles. We describe in this paper a handover scenario between a WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover between a WLAN and a WiBro. In the scheme, a Serving Network(SN) plays a key distribution center role so that the Mobile Node (MN) can be quickly associated to a Target Nerwork(TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved.
无线网络存在异构或同构网络权限之间的切换问题。本文描述了无线局域网与WiBro网络之间的切换场景,并提出了一种快速有效的无线局域网与WiBro网络之间切换的认证方案。在该方案中,SN (service Network)扮演密钥分发中心的角色,以便在启动涉及远端AC (authentication center)的完整认证方案之前,将MN (Mobile Node)快速关联到TN (Target Network)。
{"title":"A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro","authors":"Sun-Hee Lim, Okyeon Yi, Chang-Hoon Jung, Ki-Seok Bang","doi":"10.1109/COMSWA.2007.382495","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382495","url":null,"abstract":"A wireless network has a handover problem between heterogeneous or homogeneous network entitles. We describe in this paper a handover scenario between a WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover between a WLAN and a WiBro. In the scheme, a Serving Network(SN) plays a key distribution center role so that the Mobile Node (MN) can be quickly associated to a Target Nerwork(TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"23 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach 基于贝叶斯激励兼容的自组织无线网络广播
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382618
Ramasuri Narayanam, Y. Narahari
We consider the incentive compatible broadcast (ICB) problem in ad hoc wireless networks with selfish nodes. We design a Bayesian incentive compatible broadcast (BIC-B) protocol to address this problem. VCG mechanism based schemes have been popularly used in the literature to design dominant strategy incentive compatible (DSIC) protocols for ad hoc wireless networks. VCG based mechanisms have two critical limitations: (i) the network is required to be bi-connected, (ii) the resulting protocol is not budget balanced. Our proposed BIC-B protocol overcomes these difficulties. We also prove the optimality of the proposed scheme.
研究了具有自利节点的自组织无线网络中的激励兼容广播(ICB)问题。我们设计了一个贝叶斯激励兼容广播(BIC-B)协议来解决这个问题。基于VCG机制的方案已在文献中广泛用于设计自组织无线网络的优势策略激励兼容(DSIC)协议。基于VCG的机制有两个关键限制:(i)网络需要双连接,(ii)生成的协议不平衡预算。我们提出的BIC-B协议克服了这些困难。我们还证明了所提方案的最优性。
{"title":"Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach","authors":"Ramasuri Narayanam, Y. Narahari","doi":"10.1109/COMSWA.2007.382618","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382618","url":null,"abstract":"We consider the incentive compatible broadcast (ICB) problem in ad hoc wireless networks with selfish nodes. We design a Bayesian incentive compatible broadcast (BIC-B) protocol to address this problem. VCG mechanism based schemes have been popularly used in the literature to design dominant strategy incentive compatible (DSIC) protocols for ad hoc wireless networks. VCG based mechanisms have two critical limitations: (i) the network is required to be bi-connected, (ii) the resulting protocol is not budget balanced. Our proposed BIC-B protocol overcomes these difficulties. We also prove the optimality of the proposed scheme.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient Design of End-to-End Probes for Source-Routed Networks 源路由网络端到端探针的高效设计
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382610
S. Parthasarathy, R. Rastogi, M. Thottan
Migration to a converged network has caused service providers to deploy real time applications such as voice over an IP (VoIP) network. From the provider's perspective, the success of such emerging multimedia services over IP networks depend on mechanisms which help understand the network-wide end-to-end performance dynamics. In this work, we present a mechanism to design efficient probes for measuring end-to-end performance impairments such as network delay and loss for a specific service in the provider network. We address two main issues related to deploying network probes: (1) the need for correlating the topology data with the measured values and (2) reducing the amount of probe traffic. We use explicitly routed probe packets to alleviate the need for correlation with topology measurements. We also present a 3.5-approximation algorithm for designing probe-sets which cover all the edges in the network. Further, we explore techniques for using observed performance degradations in a given set of probes to isolate the miscreant-edge which caused the degradations. We state a precise characterization for probe-sets which isolate miscreant edges in the network; this also suggests a natural heuristic for miscreant-edge detection. Simulations on ISP topologies obtained from the RocketFuel project show that our algorithms perform much better than the analytically guaranteed bounds and are near-optimal in practice with respect to probe costs.
向融合网络的迁移导致服务提供商部署实时应用程序,例如IP (VoIP)网络语音。从提供商的角度来看,这种新兴的多媒体服务在IP网络上的成功取决于有助于理解网络范围内端到端性能动态的机制。在这项工作中,我们提出了一种机制来设计有效的探针,用于测量端到端性能损害,例如提供商网络中特定服务的网络延迟和丢失。我们解决了与部署网络探针相关的两个主要问题:(1)需要将拓扑数据与测量值关联起来;(2)减少探针流量。我们使用显式路由的探测数据包来减轻与拓扑测量相关的需要。我们还提出了一种3.5近似算法,用于设计覆盖网络中所有边的探测集。此外,我们探索了在给定的一组探针中使用观察到的性能下降来隔离导致性能下降的不良边缘的技术。我们描述了一个精确的特征,它可以隔离网络中的不良边;这也提出了一种自然的启发式的边缘检测。对RocketFuel项目获得的ISP拓扑的模拟表明,我们的算法比解析保证的边界要好得多,并且在实践中对于探针成本接近最优。
{"title":"Efficient Design of End-to-End Probes for Source-Routed Networks","authors":"S. Parthasarathy, R. Rastogi, M. Thottan","doi":"10.1109/COMSWA.2007.382610","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382610","url":null,"abstract":"Migration to a converged network has caused service providers to deploy real time applications such as voice over an IP (VoIP) network. From the provider's perspective, the success of such emerging multimedia services over IP networks depend on mechanisms which help understand the network-wide end-to-end performance dynamics. In this work, we present a mechanism to design efficient probes for measuring end-to-end performance impairments such as network delay and loss for a specific service in the provider network. We address two main issues related to deploying network probes: (1) the need for correlating the topology data with the measured values and (2) reducing the amount of probe traffic. We use explicitly routed probe packets to alleviate the need for correlation with topology measurements. We also present a 3.5-approximation algorithm for designing probe-sets which cover all the edges in the network. Further, we explore techniques for using observed performance degradations in a given set of probes to isolate the miscreant-edge which caused the degradations. We state a precise characterization for probe-sets which isolate miscreant edges in the network; this also suggests a natural heuristic for miscreant-edge detection. Simulations on ISP topologies obtained from the RocketFuel project show that our algorithms perform much better than the analytically guaranteed bounds and are near-optimal in practice with respect to probe costs.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Augmenting Smart Items With Business Intelligence 用商业智能增强智能项目
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382480
A. Puder, Thomas Odenwald
A Smart Item in the context of this paper is a non-human entity or section of the real world, augmented with IT functionality to support different kinds of information. Communication and discrimination are mandatory, while additional capabilities like computing, sensing and actuating are optional. Integrating Smart Items into the overall business processes by propagating data and services to these new edges of the IT landscape allows for better enterprise-wide integration, improved performance, scalability, and local decision making. This paper provides examples how under service-oriented architecture aspects a business process can be decomposed and partially propagated to lower layers, taking the full capabilities of Smart Items into consideration.
在本文的上下文中,智能物品是一个非人类实体或现实世界的一部分,通过IT功能增强以支持不同类型的信息。通信和识别是强制性的,而计算、传感和驱动等附加功能是可选的。通过将数据和服务传播到IT环境的这些新边缘,将Smart Items集成到整个业务流程中,从而实现更好的企业范围集成、改进的性能、可伸缩性和本地决策制定。本文提供了如何在面向服务的体系结构方面分解业务流程并将其部分传播到较低层次的示例,同时考虑到Smart Items的全部功能。
{"title":"Augmenting Smart Items With Business Intelligence","authors":"A. Puder, Thomas Odenwald","doi":"10.1109/COMSWA.2007.382480","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382480","url":null,"abstract":"A Smart Item in the context of this paper is a non-human entity or section of the real world, augmented with IT functionality to support different kinds of information. Communication and discrimination are mandatory, while additional capabilities like computing, sensing and actuating are optional. Integrating Smart Items into the overall business processes by propagating data and services to these new edges of the IT landscape allows for better enterprise-wide integration, improved performance, scalability, and local decision making. This paper provides examples how under service-oriented architecture aspects a business process can be decomposed and partially propagated to lower layers, taking the full capabilities of Smart Items into consideration.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 2nd International Conference on Communication Systems Software and Middleware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1