首页 > 最新文献

2007 2nd International Conference on Communication Systems Software and Middleware最新文献

英文 中文
Optimal Dynamic Activation Policies in Sensor Networks 传感器网络的最优动态激活策略
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382435
T. Banerjee, Smruti Padhy, A. Kherani
We consider a sensor network where the nodes are capable of energy harvesting, i.e., can use energy from surrounding environment to recharge their battery. We consider the problem of controlling the activity of a sensor node. This problem is cast as controlling the service rate of a station in a closed three-queue system. We obtain the Norton's equivalent of the system and show the structure of the optimal rate control policy for various combinations of rate structures and utility function.
我们考虑一个传感器网络,其中节点能够收集能量,即可以利用周围环境的能量给电池充电。我们考虑了控制传感器节点活动的问题。这个问题被描述为在一个封闭的三队列系统中控制一个站点的服务速率。我们得到了系统的诺顿等价,并给出了费率结构和效用函数的各种组合的最优费率控制策略的结构。
{"title":"Optimal Dynamic Activation Policies in Sensor Networks","authors":"T. Banerjee, Smruti Padhy, A. Kherani","doi":"10.1109/COMSWA.2007.382435","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382435","url":null,"abstract":"We consider a sensor network where the nodes are capable of energy harvesting, i.e., can use energy from surrounding environment to recharge their battery. We consider the problem of controlling the activity of a sensor node. This problem is cast as controlling the service rate of a station in a closed three-queue system. We obtain the Norton's equivalent of the system and show the structure of the optimal rate control policy for various combinations of rate structures and utility function.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks 一种有效的无线传感器网络成对密钥建立方案
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382459
Abhishek K. Gupta, P. Nuggehalli, J. Kuri
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxy-based scheme in the work of Ling and Znati (2005) and Li et al. (2005), we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably more than that of finding proxies, leading to lower communication overhead. Further, we prove that the friend-based scheme performs better than the proxy-based scheme both in terms of resilience against node capture as well as in energy consumption for pairwise key establishment, making our scheme more feasible.
本文研究了无线传感器网络中使用随机密钥预分配技术建立安全路径密钥的问题。受Ling和Znati(2005)以及Li等人(2005)最近基于代理的方案的启发,我们引入了一种基于朋友的方案,用于安全地建立成对密钥。我们表明,在邻居中找到朋友的机会比找到代理的机会要大得多,从而降低了通信开销。此外,我们证明了基于朋友的方案在抗节点捕获的弹性和配对密钥建立的能耗方面都优于基于代理的方案,使我们的方案更加可行。
{"title":"An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks","authors":"Abhishek K. Gupta, P. Nuggehalli, J. Kuri","doi":"10.1109/COMSWA.2007.382459","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382459","url":null,"abstract":"This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxy-based scheme in the work of Ling and Znati (2005) and Li et al. (2005), we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably more than that of finding proxies, leading to lower communication overhead. Further, we prove that the friend-based scheme performs better than the proxy-based scheme both in terms of resilience against node capture as well as in energy consumption for pairwise key establishment, making our scheme more feasible.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Controlled Dissemination Filter (CDF) for Integrated Link Selection Agents 集成链路选择代理的控制传播过滤器
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382584
M. Fecko, Ibrahim Hökelek, S. Samtani, A. Staikos
To perform optimizations as the network changes dynamically, distributed network agents rely on information that is dispersed in the network. A data dissemination service for the agents can benefit from data filtering at selected nodes in a data distribution tree. Controlled dissemination filter (CDF) offers an efficient filtering functionality such as sifting, collection, aggregation, and scoping. We defined a number of new objective functions for the data-flow channelization algorithms, and created both centralized and distributed algorithms to optimize filter placement in polynomial time. We also designed an application of the CDF to information flows relevant to the unicast routing control agent (URCA) and showed how the CDF reduces the bandwidth consumed by data dissemination without impairing the URCA decision-making functionalities.
为了在网络动态变化时执行优化,分布式网络代理依赖于分散在网络中的信息。代理的数据传播服务可以从数据分布树中选定节点的数据过滤中获益。受控传播过滤器(CDF)提供了高效的过滤功能,如筛选、收集、聚合和限定范围。我们为数据流信道化算法定义了许多新的目标函数,并创建了集中式和分布式算法,以在多项式时间内优化滤波器的放置。我们还设计了一个CDF应用于与单播路由控制代理(URCA)相关的信息流,并展示了CDF如何在不损害URCA决策功能的情况下减少数据传播消耗的带宽。
{"title":"Controlled Dissemination Filter (CDF) for Integrated Link Selection Agents","authors":"M. Fecko, Ibrahim Hökelek, S. Samtani, A. Staikos","doi":"10.1109/COMSWA.2007.382584","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382584","url":null,"abstract":"To perform optimizations as the network changes dynamically, distributed network agents rely on information that is dispersed in the network. A data dissemination service for the agents can benefit from data filtering at selected nodes in a data distribution tree. Controlled dissemination filter (CDF) offers an efficient filtering functionality such as sifting, collection, aggregation, and scoping. We defined a number of new objective functions for the data-flow channelization algorithms, and created both centralized and distributed algorithms to optimize filter placement in polynomial time. We also designed an application of the CDF to information flows relevant to the unicast routing control agent (URCA) and showed how the CDF reduces the bandwidth consumed by data dissemination without impairing the URCA decision-making functionalities.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro 一种用于WLAN和WiBro无缝切换的快速高效认证协议
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382495
Sun-Hee Lim, Okyeon Yi, Chang-Hoon Jung, Ki-Seok Bang
A wireless network has a handover problem between heterogeneous or homogeneous network entitles. We describe in this paper a handover scenario between a WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover between a WLAN and a WiBro. In the scheme, a Serving Network(SN) plays a key distribution center role so that the Mobile Node (MN) can be quickly associated to a Target Nerwork(TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved.
无线网络存在异构或同构网络权限之间的切换问题。本文描述了无线局域网与WiBro网络之间的切换场景,并提出了一种快速有效的无线局域网与WiBro网络之间切换的认证方案。在该方案中,SN (service Network)扮演密钥分发中心的角色,以便在启动涉及远端AC (authentication center)的完整认证方案之前,将MN (Mobile Node)快速关联到TN (Target Network)。
{"title":"A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro","authors":"Sun-Hee Lim, Okyeon Yi, Chang-Hoon Jung, Ki-Seok Bang","doi":"10.1109/COMSWA.2007.382495","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382495","url":null,"abstract":"A wireless network has a handover problem between heterogeneous or homogeneous network entitles. We describe in this paper a handover scenario between a WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover between a WLAN and a WiBro. In the scheme, a Serving Network(SN) plays a key distribution center role so that the Mobile Node (MN) can be quickly associated to a Target Nerwork(TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"23 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach 基于贝叶斯激励兼容的自组织无线网络广播
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382618
Ramasuri Narayanam, Y. Narahari
We consider the incentive compatible broadcast (ICB) problem in ad hoc wireless networks with selfish nodes. We design a Bayesian incentive compatible broadcast (BIC-B) protocol to address this problem. VCG mechanism based schemes have been popularly used in the literature to design dominant strategy incentive compatible (DSIC) protocols for ad hoc wireless networks. VCG based mechanisms have two critical limitations: (i) the network is required to be bi-connected, (ii) the resulting protocol is not budget balanced. Our proposed BIC-B protocol overcomes these difficulties. We also prove the optimality of the proposed scheme.
研究了具有自利节点的自组织无线网络中的激励兼容广播(ICB)问题。我们设计了一个贝叶斯激励兼容广播(BIC-B)协议来解决这个问题。基于VCG机制的方案已在文献中广泛用于设计自组织无线网络的优势策略激励兼容(DSIC)协议。基于VCG的机制有两个关键限制:(i)网络需要双连接,(ii)生成的协议不平衡预算。我们提出的BIC-B协议克服了这些困难。我们还证明了所提方案的最优性。
{"title":"Broadcast in Ad hoc Wireless Networks with Selfish Nodes: A Bayesian Incentive Compatibility Approach","authors":"Ramasuri Narayanam, Y. Narahari","doi":"10.1109/COMSWA.2007.382618","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382618","url":null,"abstract":"We consider the incentive compatible broadcast (ICB) problem in ad hoc wireless networks with selfish nodes. We design a Bayesian incentive compatible broadcast (BIC-B) protocol to address this problem. VCG mechanism based schemes have been popularly used in the literature to design dominant strategy incentive compatible (DSIC) protocols for ad hoc wireless networks. VCG based mechanisms have two critical limitations: (i) the network is required to be bi-connected, (ii) the resulting protocol is not budget balanced. Our proposed BIC-B protocol overcomes these difficulties. We also prove the optimality of the proposed scheme.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Location Estimation Scheme using Connectivity Constraints for Wireless Ad Hoc Sensor Networks 基于连接约束的无线自组织传感器网络位置估计方案
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382581
N. Sundaram, P. Ramanathan
The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware. The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware.
提出了一种估计传感器网络中节点位置的方法。这个网络有几个节点,它们的位置是精确已知的。其他节点根据它们通过无线自组织网络上的消息交换收集的邻居关系来估计它们的位置。本文表明,与仅利用邻居关系相比,通过引入非邻居约束可以大大提高位置估计的精度。分析了某一规则部署的期望位置估计误差。对于其他部署,经验评估表明,该方案可以准确地估计节点位置,而不需要任何专门的硬件。提出了一种估计传感器网络中节点位置的方法。这个网络有几个节点,它们的位置是精确已知的。其他节点根据它们通过无线自组织网络上的消息交换收集的邻居关系来估计它们的位置。本文表明,与仅利用邻居关系相比,通过引入非邻居约束可以大大提高位置估计的精度。分析了某一规则部署的期望位置估计误差。对于其他部署,经验评估表明,该方案可以准确地估计节点位置,而不需要任何专门的硬件。
{"title":"Location Estimation Scheme using Connectivity Constraints for Wireless Ad Hoc Sensor Networks","authors":"N. Sundaram, P. Ramanathan","doi":"10.1109/COMSWA.2007.382581","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382581","url":null,"abstract":"The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware. The paper proposes a method to estimate the location of nodes in a sensor network. The network has a few nodes whose locations are accurately known. The other nodes estimate their location based on neighborhood relationships gathered by them through message exchanges over a wireless ad hoc network. The paper shows that by incorporating non-neighbor constraints, one can substantially improve the accuracy of location estimation as compared to only utilizing neighbor relationships. The expected location estimation error is analytically derived for a certain regular deployment. For other deployments, empirical evaluation of the proposed scheme shows that the node locations can be estimated accurately without the need for any specialized hardware.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks 无线Ad-hoc和传感器网络中基于拓扑的簇头候选选择
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382475
Matthias R. Brust, A. Andronache, S. Rothkugel, Z. Benenson
Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due to the dynamic environment, clusterhead selection becomes an important issue. We consider the problem of appropriate clusterhead selection in wireless ad-hoc networks and sensor networks. This work presents topological criteria for robust clusterhead candidate selection, resilient to sporadic node mobility and failure as well as for efficient information dissemination. One of the main ideas of our approach is to avoid selecting nodes located close to the network partition border as such nodes are more likely to move out of the partition, thus causing a clusterhead re-election. We conducted experiments both for static topologies as well as for cases in the presence of node mobility. Our results showed that the frequency of clusterhead re-election and average shortest path length from the clusterhead decrease when considering topological criteria. Additionally, the clusters tend to be robust to clusterhead failure. The presented mechanisms rely on local topological information only and do not require geographical data.
集群技术在平面网络上创建层次网络结构,称为集群。相邻设备选择一个合适的设备作为簇头。由于环境是动态的,簇头的选择成为一个重要的问题。研究了无线自组织网络和传感器网络中簇头的合理选择问题。这项工作提出了鲁棒簇头候选选择的拓扑标准,能够适应零星的节点移动和故障,以及有效的信息传播。我们的方法的主要思想之一是避免选择靠近网络分区边界的节点,因为这样的节点更有可能移出分区,从而导致簇头重选。我们对静态拓扑和存在节点移动性的情况进行了实验。我们的结果表明,当考虑拓扑条件时,簇头重选的频率和簇头的平均最短路径长度减少。此外,对于簇头故障,集群往往是健壮的。所提出的机制仅依赖于局部拓扑信息,而不需要地理数据。
{"title":"Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks","authors":"Matthias R. Brust, A. Andronache, S. Rothkugel, Z. Benenson","doi":"10.1109/COMSWA.2007.382475","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382475","url":null,"abstract":"Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due to the dynamic environment, clusterhead selection becomes an important issue. We consider the problem of appropriate clusterhead selection in wireless ad-hoc networks and sensor networks. This work presents topological criteria for robust clusterhead candidate selection, resilient to sporadic node mobility and failure as well as for efficient information dissemination. One of the main ideas of our approach is to avoid selecting nodes located close to the network partition border as such nodes are more likely to move out of the partition, thus causing a clusterhead re-election. We conducted experiments both for static topologies as well as for cases in the presence of node mobility. Our results showed that the frequency of clusterhead re-election and average shortest path length from the clusterhead decrease when considering topological criteria. Additionally, the clusters tend to be robust to clusterhead failure. The presented mechanisms rely on local topological information only and do not require geographical data.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130412535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Automatic Calibration Using Receiver Operating Characteristics Curves 使用接收机工作特性曲线的自动校准
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382484
Prakash Kolan, Ram Vaithilingam, R. Dantu
Application-level filters, such as e-mail and VoIP spam filters, that analyze dynamic behavior changes are replacing static signature-recognition filters. These application-level filters learn behavior and use that knowledge to filter unwanted requests. Because behavior of a service request's participating entities changes rapidly, filters must adapt quickly by using end user's preferences about receiving that service request message. Many adaptive filters learn from the participating entities' behavior; however, none configure themselves automatically to an end user's changing tolerance levels. Also, filter administrators cannot manually change the threshold for each service request in real time. Traditional adaptive filters fail when administrators must optimize multiple filter thresholds manually and often. Thus, to improve a filter's learning, we must automate its threshold-update process. We propose an automatic threshold-calibration mechanism using Receiver Operating Characteristics (ROC) curves that updates the threshold based on an end user's feedback. To demonstrate the mechanism's real-time applicability, we integrated it in a Voice over IP (VoIP) spam filter that analyzes incoming Spam over IP Telephony (SPIT) calls. Using this mechanism, we observed good improvement in the VoIP spam filter's accuracy. Further, computing and updating the optimum threshold in realtime does not impede the filter's temporal performance because we update thresholds after each call's completion. Because we reach an optimum threshold for any initial setting, this mechanism works efficiently when we cannot predict end-user behavior. Furthermore, automatic calibration proves efficient when using multiple threshold values.
分析动态行为变化的应用程序级过滤器(如电子邮件和VoIP垃圾邮件过滤器)正在取代静态签名识别过滤器。这些应用程序级过滤器学习行为并使用这些知识来过滤不需要的请求。由于服务请求参与实体的行为变化很快,因此过滤器必须通过使用最终用户关于接收该服务请求消息的首选项来快速适应。许多自适应滤波器从参与实体的行为中学习;但是,它们都不会自动配置自己以适应最终用户不断变化的容忍级别。此外,过滤器管理员无法实时手动更改每个服务请求的阈值。当管理员必须经常手动优化多个过滤器阈值时,传统的自适应过滤器会失败。因此,为了提高过滤器的学习能力,我们必须使其阈值更新过程自动化。我们提出了一种使用接收者工作特征(ROC)曲线的自动阈值校准机制,该机制根据最终用户的反馈更新阈值。为了演示该机制的实时适用性,我们将其集成到IP语音(VoIP)垃圾邮件过滤器中,该过滤器分析IP电话(SPIT)呼叫传入的垃圾邮件。使用这种机制,我们观察到VoIP垃圾邮件过滤器的准确性有了很好的提高。此外,实时计算和更新最佳阈值不会影响过滤器的时间性能,因为我们在每次调用完成后更新阈值。因为我们达到了任何初始设置的最佳阈值,所以当我们无法预测最终用户行为时,这种机制有效地工作。此外,当使用多个阈值时,自动校准证明是有效的。
{"title":"Automatic Calibration Using Receiver Operating Characteristics Curves","authors":"Prakash Kolan, Ram Vaithilingam, R. Dantu","doi":"10.1109/COMSWA.2007.382484","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382484","url":null,"abstract":"Application-level filters, such as e-mail and VoIP spam filters, that analyze dynamic behavior changes are replacing static signature-recognition filters. These application-level filters learn behavior and use that knowledge to filter unwanted requests. Because behavior of a service request's participating entities changes rapidly, filters must adapt quickly by using end user's preferences about receiving that service request message. Many adaptive filters learn from the participating entities' behavior; however, none configure themselves automatically to an end user's changing tolerance levels. Also, filter administrators cannot manually change the threshold for each service request in real time. Traditional adaptive filters fail when administrators must optimize multiple filter thresholds manually and often. Thus, to improve a filter's learning, we must automate its threshold-update process. We propose an automatic threshold-calibration mechanism using Receiver Operating Characteristics (ROC) curves that updates the threshold based on an end user's feedback. To demonstrate the mechanism's real-time applicability, we integrated it in a Voice over IP (VoIP) spam filter that analyzes incoming Spam over IP Telephony (SPIT) calls. Using this mechanism, we observed good improvement in the VoIP spam filter's accuracy. Further, computing and updating the optimum threshold in realtime does not impede the filter's temporal performance because we update thresholds after each call's completion. Because we reach an optimum threshold for any initial setting, this mechanism works efficiently when we cannot predict end-user behavior. Furthermore, automatic calibration proves efficient when using multiple threshold values.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks 静态和移动无线传感器网络中的分布式容错拓扑控制
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382434
I. Saha, L. K. Sambasivan, R. Patro, S. K. Ghosh
In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this work, we present a distributed algorithm for assigning minimum possible power to all the nodes in the wireless sensor network, such that the network is K-connected. In this algorithm, a node collects the location and maximum power information from all the nodes in its vicinity, and then it adjusts the powers of the nodes in its vicinity in such a way that it can reach all the nodes in the vicinity through K optimal vertex-disjoint paths. We prove that, if each node maintains K optimal vertex-disjoint paths to all the nodes in its vicinity then the resulting topology is globally K-connected, provided the topology obtained when all nodes transmit with their maximum power Gmax is K-connected. This topology control algorithm has been extended to mobile scenario and the proof of connectivity in the mobile scenario has been presented. Simulation results show that significant power saving can be achieved by using this algorithm.
在无线传感器网络中,最小化功耗并同时保持网络拓扑中所需的特性是至关重要的。在这项工作中,我们提出了一种分布式算法,为无线传感器网络中的所有节点分配尽可能小的功率,使网络是k连接的。在该算法中,节点收集其附近所有节点的位置和最大功率信息,然后调整其附近节点的功率,使其通过K条最优顶点不相交路径到达附近的所有节点。我们证明了,如果每个节点与其附近的所有节点保持K个最优顶点不相交路径,则所得到的拓扑是全局K连通的,前提是所有节点以其最大功率Gmax传输时得到的拓扑是K连通的。将该拓扑控制算法推广到移动场景,并给出了移动场景下的连通性证明。仿真结果表明,采用该算法可实现显著的节能效果。
{"title":"Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks","authors":"I. Saha, L. K. Sambasivan, R. Patro, S. K. Ghosh","doi":"10.1109/COMSWA.2007.382434","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382434","url":null,"abstract":"In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this work, we present a distributed algorithm for assigning minimum possible power to all the nodes in the wireless sensor network, such that the network is K-connected. In this algorithm, a node collects the location and maximum power information from all the nodes in its vicinity, and then it adjusts the powers of the nodes in its vicinity in such a way that it can reach all the nodes in the vicinity through K optimal vertex-disjoint paths. We prove that, if each node maintains K optimal vertex-disjoint paths to all the nodes in its vicinity then the resulting topology is globally K-connected, provided the topology obtained when all nodes transmit with their maximum power Gmax is K-connected. This topology control algorithm has been extended to mobile scenario and the proof of connectivity in the mobile scenario has been presented. Simulation results show that significant power saving can be achieved by using this algorithm.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure Distributed Agreement Protocols for Information Assurance Applications 信息保障应用的安全分布式协议协议
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382482
A. Sabbir, K. Ravindran, K. Kwiat
Distributed agreement protocols among a group of application processes are often built upon atomic multicast message delivery guarantees. Issues arise however when agreement protocols are realized in Information Assurance (IA) settings where extreme failure behaviors such as send-omission of processes and message timeliness violations are likely. The issues are compounded by security weaknesses in the communication software that make it easier for intruders to stage attacks. These issues impact the design of agreement protocols, which have hitherto assumed only benign failures such as process crash and network message loss/delay. In this paper, we revisit the distributed agreement problem, taking into account the IA dimension as well. Our study reveals the need for a secure centralized entity to realize the group decision-making and state coordination functions. Two functions are studied: dynamic group membership management to exclude non-cooperating members from the group and security-reinforced communications to enforce mutual anonymity of members. Our paper walks through a state-machine based realization of distributed agreements using secure atomic multicast protocol as an underlying communication substrate. The use of our approach in IA applications is also described.
一组应用程序进程之间的分布式协议通常建立在原子多播消息传递保证的基础上。然而,当在信息保证(IA)设置中实现协议协议时,问题就出现了,在这些设置中,可能出现极端的失败行为,例如发送遗漏过程和消息时效性违规。通信软件的安全漏洞使问题更加复杂,这使得入侵者更容易发动攻击。这些问题影响了协议协议的设计,迄今为止,协议协议只假定良性故障,如进程崩溃和网络消息丢失/延迟。在本文中,我们重新审视了分布式协议问题,同时也考虑了IA维度。我们的研究表明,需要一个安全的集中实体来实现群体决策和国家协调功能。研究了动态组成员管理和安全增强通信两种功能,前者可以将不合作的组成员排除在组成员之外,后者可以增强组成员之间的相互匿名性。本文介绍了一种基于状态机的分布式协议的实现,使用安全原子多播协议作为底层通信基板。本文还描述了我们的方法在IA应用程序中的使用。
{"title":"Secure Distributed Agreement Protocols for Information Assurance Applications","authors":"A. Sabbir, K. Ravindran, K. Kwiat","doi":"10.1109/COMSWA.2007.382482","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382482","url":null,"abstract":"Distributed agreement protocols among a group of application processes are often built upon atomic multicast message delivery guarantees. Issues arise however when agreement protocols are realized in Information Assurance (IA) settings where extreme failure behaviors such as send-omission of processes and message timeliness violations are likely. The issues are compounded by security weaknesses in the communication software that make it easier for intruders to stage attacks. These issues impact the design of agreement protocols, which have hitherto assumed only benign failures such as process crash and network message loss/delay. In this paper, we revisit the distributed agreement problem, taking into account the IA dimension as well. Our study reveals the need for a secure centralized entity to realize the group decision-making and state coordination functions. Two functions are studied: dynamic group membership management to exclude non-cooperating members from the group and security-reinforced communications to enforce mutual anonymity of members. Our paper walks through a state-machine based realization of distributed agreements using secure atomic multicast protocol as an underlying communication substrate. The use of our approach in IA applications is also described.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 2nd International Conference on Communication Systems Software and Middleware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1