首页 > 最新文献

2007 2nd International Conference on Communication Systems Software and Middleware最新文献

英文 中文
Secure Host Identity Delegation for Mobility 移动安全主机身份委托
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382596
S. Herborn, A. Huber, R. Boreli, A. Seneviratne
We develop a scheme for host identity delegation based on the Host Identity Protocol (HIP). We show how this scheme can be applied to enable the movement of communication sessions between devices e.g. in a Personal Area Network (PAN), or to securely and seamlessly insert any number of service proxies in between session endpoints e.g. to adapt data to suit different devices in a PAN. Identities are securely delegated by relaying HIP signalling messages to the device that owns the private key. This avoids security issues caused by dissemination of private keys. This also ensures that delegated endpoint identities are instantly and permanently revocable by the original device which remains in full control of the private key used to authorize use of the identity. We show that the delegation process introduces minimal additional signalling, and present results of evaluation of a prototype which show the scheme results in no detriment to the performance of HIP.
提出了一种基于主机身份协议(HIP)的主机身份授权方案。我们展示了如何应用该方案来实现设备之间通信会话的移动,例如在个人局域网(PAN)中,或者在会话端点之间安全无缝地插入任意数量的服务代理,例如在PAN中调整数据以适应不同的设备。通过将HIP信令消息中继到拥有私钥的设备,身份被安全地委托。这避免了私钥传播带来的安全问题。这还确保了被委托的端点标识可以被原始设备立即永久地撤销,原始设备仍然完全控制用于授权使用标识的私钥。我们证明了授权过程引入了最小的额外信号,并给出了一个原型的评估结果,表明该方案不会损害HIP的性能。
{"title":"Secure Host Identity Delegation for Mobility","authors":"S. Herborn, A. Huber, R. Boreli, A. Seneviratne","doi":"10.1109/COMSWA.2007.382596","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382596","url":null,"abstract":"We develop a scheme for host identity delegation based on the Host Identity Protocol (HIP). We show how this scheme can be applied to enable the movement of communication sessions between devices e.g. in a Personal Area Network (PAN), or to securely and seamlessly insert any number of service proxies in between session endpoints e.g. to adapt data to suit different devices in a PAN. Identities are securely delegated by relaying HIP signalling messages to the device that owns the private key. This avoids security issues caused by dissemination of private keys. This also ensures that delegated endpoint identities are instantly and permanently revocable by the original device which remains in full control of the private key used to authorize use of the identity. We show that the delegation process introduces minimal additional signalling, and present results of evaluation of a prototype which show the scheme results in no detriment to the performance of HIP.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131145479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive and Reconfigurable ResOurce Management for Wireless Sensors using Grid Technology 基于网格技术的无线传感器自适应和可重构资源管理
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382470
I. Rao, N. Imran, Salman Khan, E. Huh, TaeChoong Chung
Integrating grid computing with sensor networks, named as sensor grid, promises immense storage; unmatched computational power and availability of virtually any shareable resource through grid to resource constrained sensor nodes. On the other hand it poses complicated and new challenges such processing SOAP enabled XML messages, compliance with grid security standards. In this research work we first identify service requirements for the sensor grid to efficiently process data using grid technology and then list the challenging issues to meet these requirements. We also propose an end-to-end adaptive and reconfigurable resource manager for wireless sensors (ARROWS) using grid technology to enable resource constrained sensor nodes to connect to the grid.
将网格计算与传感器网络相结合,称为传感器网格,保证了巨大的存储空间;无与伦比的计算能力和几乎任何可共享资源的可用性,通过网格到资源受限的传感器节点。另一方面,它提出了复杂的新挑战,如处理支持SOAP的XML消息、遵守网格安全标准。在这项研究工作中,我们首先确定了传感器网格的服务需求,以便使用网格技术有效地处理数据,然后列出了满足这些需求的挑战性问题。我们还提出了一个端到端自适应和可重构的无线传感器资源管理器(ARROWS),使用网格技术使资源受限的传感器节点能够连接到网格。
{"title":"Adaptive and Reconfigurable ResOurce Management for Wireless Sensors using Grid Technology","authors":"I. Rao, N. Imran, Salman Khan, E. Huh, TaeChoong Chung","doi":"10.1109/COMSWA.2007.382470","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382470","url":null,"abstract":"Integrating grid computing with sensor networks, named as sensor grid, promises immense storage; unmatched computational power and availability of virtually any shareable resource through grid to resource constrained sensor nodes. On the other hand it poses complicated and new challenges such processing SOAP enabled XML messages, compliance with grid security standards. In this research work we first identify service requirements for the sensor grid to efficiently process data using grid technology and then list the challenging issues to meet these requirements. We also propose an end-to-end adaptive and reconfigurable resource manager for wireless sensors (ARROWS) using grid technology to enable resource constrained sensor nodes to connect to the grid.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121957000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks 抗简单功率分析攻击的ECDSA并行化
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382592
Sarang Aravamuthan, Viswanatha Rao Thumparthy
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further parallelism is achieved by executing a portion of the multiprecision arithmetic operations in parallel with point multiplication. This results in a saving in timing as well as gate count when the two paths are implemented in hardware and software. This article attempts to exploit this parallelism in a typical system context in which a microprocessor is always present though a hardware accelerator is being designed for performance. We discuss some implementation aspects of this design with reference to power analysis attacks. We show how the Montgomery point multiplication and the binary extended gcd algorithms can be adapted to prevent simple power analysis attacks. We implemented our design using a hardware/software parallel architecture. We present the results when the software component is coded on an 8051 architecture and an ARM7TDMI processor. Our enhancements find applications in security environments such as servers, smart cards etc.
椭圆曲线数字签名算法允许自然并行化,其中点乘法步骤可以分成两个部分并行执行。进一步的并行性是通过与点乘法并行执行部分多精度算术运算来实现的。当这两个路径在硬件和软件中实现时,这将节省时间和门计数。本文试图在一个典型的系统环境中利用这种并行性,在这种环境中,微处理器总是存在,尽管硬件加速器是为了性能而设计的。我们将参考功率分析攻击讨论该设计的一些实现方面。我们将展示如何利用Montgomery点乘法和二进制扩展gcd算法来防止简单的功率分析攻击。我们使用硬件/软件并行架构实现了我们的设计。我们给出了在8051架构和ARM7TDMI处理器上对软件组件进行编码的结果。我们的改进可以在服务器、智能卡等安全环境中找到应用。
{"title":"A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks","authors":"Sarang Aravamuthan, Viswanatha Rao Thumparthy","doi":"10.1109/COMSWA.2007.382592","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382592","url":null,"abstract":"The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further parallelism is achieved by executing a portion of the multiprecision arithmetic operations in parallel with point multiplication. This results in a saving in timing as well as gate count when the two paths are implemented in hardware and software. This article attempts to exploit this parallelism in a typical system context in which a microprocessor is always present though a hardware accelerator is being designed for performance. We discuss some implementation aspects of this design with reference to power analysis attacks. We show how the Montgomery point multiplication and the binary extended gcd algorithms can be adapted to prevent simple power analysis attacks. We implemented our design using a hardware/software parallel architecture. We present the results when the software component is coded on an 8051 architecture and an ARM7TDMI processor. Our enhancements find applications in security environments such as servers, smart cards etc.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Improving MAC Layer Fairness in Multi-Hop 802.11 Networks 提高多跳802.11网络MAC层公平性
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382628
M. V. S. Deekshitulu, Sukumar Nandi, A. Chowdhury
Wireless adhoc networks consist of nodes interconnected by wireless multi-hop communication paths. Such networks exhibit simulated mobility, where the topological changes are caused by nodes coming up or going down. These networks also exhibit complex overlapping of flow paths. This in turn leads to severe contention in between flows as well as between the sub-flows of the same flow. In this paper, we analyze the unfairness of IEEE 802.11, in case it is extended for multi-hop networks. Thereafter we demonstrate how a simple, distributed algorithm can be put in place to approximate an ideal scheduler like round-robin and provide fair access to all the flows. Our simulation results clearly show that such an approach outscores the existing standard on fairness grounds. Additionally we also gain in terms of throughput by reducing the number of collisions.
无线自组织网络由通过无线多跳通信路径相互连接的节点组成。这种网络表现出模拟的移动性,其中拓扑变化是由节点上升或下降引起的。这些网络也表现出复杂的流动路径重叠。这反过来又导致了流之间以及同一流的子流之间的严重争用。本文分析了IEEE 802.11在扩展到多跳网络时的不公平性。之后,我们将演示如何使用一个简单的分布式算法来近似于理想的调度程序(如轮询),并提供对所有流的公平访问。我们的模拟结果清楚地表明,这种方法在公平的基础上优于现有的标准。此外,通过减少冲突的数量,我们还获得了吞吐量。
{"title":"Improving MAC Layer Fairness in Multi-Hop 802.11 Networks","authors":"M. V. S. Deekshitulu, Sukumar Nandi, A. Chowdhury","doi":"10.1109/COMSWA.2007.382628","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382628","url":null,"abstract":"Wireless adhoc networks consist of nodes interconnected by wireless multi-hop communication paths. Such networks exhibit simulated mobility, where the topological changes are caused by nodes coming up or going down. These networks also exhibit complex overlapping of flow paths. This in turn leads to severe contention in between flows as well as between the sub-flows of the same flow. In this paper, we analyze the unfairness of IEEE 802.11, in case it is extended for multi-hop networks. Thereafter we demonstrate how a simple, distributed algorithm can be put in place to approximate an ideal scheduler like round-robin and provide fair access to all the flows. Our simulation results clearly show that such an approach outscores the existing standard on fairness grounds. Additionally we also gain in terms of throughput by reducing the number of collisions.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks 基于IEEE 802.11 WLAN的Mesh网络的增强拓扑形成协议
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382499
D. Shrestha, Young-Bae Ko
This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution system based on wireless mesh networking, namely the IEEE 802.11 s Task Group, has proposed the "Simple Channel Unification Protocol" that coalesce all nodes into to a single channel. We show that protocols as such without exposition of the topological information may take more time to converge and have higher message overhead. We propose an enhancement of the existing protocol to reduce message and time required to generate a single unified graph in WLAN-based mesh networks. We performed simulations using the network simulator, ns-2 and compared with the existing solution. The preliminary results show that our scheme performs better in terms of the message overhead as well as the convergence time.
本文研究了基于IEEE 802.11的无线网状网络的拓扑形成方案。最近,IEEE 802.11任务组(ieee802.11任务组)在无线网状网络的基础上制定了无线分配系统的标准化工作,提出了将所有节点合并为单一信道的“简单信道统一协议”。我们表明,不公开拓扑信息的协议可能需要更多的时间来收敛,并且具有更高的消息开销。我们提出了一种现有协议的改进,以减少在基于wlan的网状网络中生成单一统一图所需的消息和时间。我们使用网络模拟器ns-2进行了仿真,并与现有的解决方案进行了比较。初步结果表明,该方案在消息开销和收敛时间方面具有较好的性能。
{"title":"Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks","authors":"D. Shrestha, Young-Bae Ko","doi":"10.1109/COMSWA.2007.382499","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382499","url":null,"abstract":"This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution system based on wireless mesh networking, namely the IEEE 802.11 s Task Group, has proposed the \"Simple Channel Unification Protocol\" that coalesce all nodes into to a single channel. We show that protocols as such without exposition of the topological information may take more time to converge and have higher message overhead. We propose an enhancement of the existing protocol to reduce message and time required to generate a single unified graph in WLAN-based mesh networks. We performed simulations using the network simulator, ns-2 and compared with the existing solution. The preliminary results show that our scheme performs better in terms of the message overhead as well as the convergence time.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128704528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OASiS: A Programming Framework for Service-Oriented Sensor Networks 面向服务的传感器网络的编程框架
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382431
Manish Kushwaha, Isaac Amundson, X. Koutsoukos, S. Neema, J. Sztipanovits
Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in order to monitor spatio-temporal phenomena. These devices are ideally suited for a variety of applications including object tracking, environmental monitoring, and homeland security. At present, sensor network technologies do not provide off-the-shelf solutions to users who lack low-level network programming experience. Because of limited resources, ad hoc deployments, and volatile wireless communication links, the development of distributed applications require the combination of both application and system-level logic. Programming frameworks and middleware for traditional distributed computing are not suitable for many of these problems due to the resource constraints and interactions with the physical world. To address these challenges we have developed OASiS, a programming framework that provides abstractions for object-centric, ambient-aware, service-oriented sensor network applications. OASiS uses a well-defined model of computation based on globally asynchronous locally synchronous dataflow, and is complemented by a user-friendly modeling environment. Applications are realized as graphs of modular services and executed in response to the detection of physical phenomena. We have also implemented a suite of middleware services that support OASiS to provide a layer of abstraction shielding the low-level system complexities. A tracking application is used to illustrate the features of OASiS. Our results demonstrate the feasibility and the benefits of a service-oriented programming framework for composing and deploying applications in resource-constrained sensor networks.
无线传感器网络由小型、廉价的设备组成,这些设备与环境相互作用,相互通信,并执行分布式计算,以监测时空现象。这些设备非常适合各种应用,包括对象跟踪,环境监测和国土安全。目前,传感器网络技术并没有为缺乏低级网络编程经验的用户提供现成的解决方案。由于有限的资源、临时部署和不稳定的无线通信链路,分布式应用程序的开发需要结合应用程序级和系统级逻辑。由于资源限制和与物理世界的交互,用于传统分布式计算的编程框架和中间件不适合解决许多这样的问题。为了应对这些挑战,我们开发了OASiS,这是一个编程框架,为以对象为中心、环境感知、面向服务的传感器网络应用程序提供抽象。OASiS使用基于全局异步本地同步数据流的定义良好的计算模型,并辅以用户友好的建模环境。应用程序被实现为模块化服务的图形,并根据物理现象的检测执行。我们还实现了一套支持OASiS的中间件服务,以提供一个抽象层来屏蔽底层系统的复杂性。使用跟踪应用程序来说明OASiS的特性。我们的结果证明了面向服务的编程框架在资源受限的传感器网络中组合和部署应用程序的可行性和好处。
{"title":"OASiS: A Programming Framework for Service-Oriented Sensor Networks","authors":"Manish Kushwaha, Isaac Amundson, X. Koutsoukos, S. Neema, J. Sztipanovits","doi":"10.1109/COMSWA.2007.382431","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382431","url":null,"abstract":"Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in order to monitor spatio-temporal phenomena. These devices are ideally suited for a variety of applications including object tracking, environmental monitoring, and homeland security. At present, sensor network technologies do not provide off-the-shelf solutions to users who lack low-level network programming experience. Because of limited resources, ad hoc deployments, and volatile wireless communication links, the development of distributed applications require the combination of both application and system-level logic. Programming frameworks and middleware for traditional distributed computing are not suitable for many of these problems due to the resource constraints and interactions with the physical world. To address these challenges we have developed OASiS, a programming framework that provides abstractions for object-centric, ambient-aware, service-oriented sensor network applications. OASiS uses a well-defined model of computation based on globally asynchronous locally synchronous dataflow, and is complemented by a user-friendly modeling environment. Applications are realized as graphs of modular services and executed in response to the detection of physical phenomena. We have also implemented a suite of middleware services that support OASiS to provide a layer of abstraction shielding the low-level system complexities. A tracking application is used to illustrate the features of OASiS. Our results demonstrate the feasibility and the benefits of a service-oriented programming framework for composing and deploying applications in resource-constrained sensor networks.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
A Conqueror Traffic Based Ranking Metrics Heuristic for Assigning Synthetically Generated Traffic Matrices to a Topology 基于征服者流量的排序度量启发式方法将综合生成的流量矩阵分配给拓扑
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382611
S. Zargar, M. Moghaddam
In this paper we introduced the synthetically generated traffic assignment problem and we proposed conqueror traffic based ranking metrics heuristic method for solving this problem. We modified previous ranking metrics heuristic method and we tried to assign the synthetically generated traffic to a topology based on traffic type. In our work, transmission control protocol (TCP) and user datagram protocol (UDP), as two major traffic types of today's Internet, are considered to generate special traffic matrices for them. By generating special traffic matrices for each type of traffic, traffic matrices may better describe the network conditions and consider the traffic type constraints. We made a comparison between our proposed algorithm and the two previous algorithms, called Load Minimization Solution (LMS) and ranking metrics heuristic (RMH), using simulation and results are presented. Simulation results indicate that our proposed heuristic method performs better in all cases which conqueror traffic (TCP & UDP) exists and correctly identifies more flow rates than the two other algorithms. Moreover, results show that, it is better to use LMS in the case of no conqueror traffic exists. The total absolute error rates between the amount of originally assigned flow rates and the rates that the RMH, LMS, and our conqueror traffic based RMH are assigned is another comparison we made which, proves that our heuristic method assigns the rates much closer to the original rates.
本文介绍了综合生成的流量分配问题,提出了基于征服者流量排序度量的启发式方法来解决该问题。改进了以往的排序度量启发式方法,尝试将综合生成的流量分配到基于流量类型的拓扑中。在我们的工作中,传输控制协议(TCP)和用户数据报协议(UDP)作为当今互联网的两种主要流量类型,我们考虑为它们生成特殊的流量矩阵。通过为每种类型的流量生成专门的流量矩阵,流量矩阵可以更好地描述网络状况,并考虑到流量类型的约束。我们将我们提出的算法与之前的两种算法,负载最小化解决方案(LMS)和排名指标启发式(RMH)进行了比较,并给出了仿真结果。仿真结果表明,在存在征服者流量(TCP和UDP)的所有情况下,我们提出的启发式算法都表现得更好,并且比其他两种算法正确识别更多的流量。此外,结果表明,在没有征服者流量的情况下,使用LMS效果更好。原始分配的流量数量与RMH、LMS和基于征服者流量的RMH分配的流量之间的总绝对错误率是我们所做的另一个比较,它证明了我们的启发式方法分配的流量更接近原始速率。
{"title":"A Conqueror Traffic Based Ranking Metrics Heuristic for Assigning Synthetically Generated Traffic Matrices to a Topology","authors":"S. Zargar, M. Moghaddam","doi":"10.1109/COMSWA.2007.382611","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382611","url":null,"abstract":"In this paper we introduced the synthetically generated traffic assignment problem and we proposed conqueror traffic based ranking metrics heuristic method for solving this problem. We modified previous ranking metrics heuristic method and we tried to assign the synthetically generated traffic to a topology based on traffic type. In our work, transmission control protocol (TCP) and user datagram protocol (UDP), as two major traffic types of today's Internet, are considered to generate special traffic matrices for them. By generating special traffic matrices for each type of traffic, traffic matrices may better describe the network conditions and consider the traffic type constraints. We made a comparison between our proposed algorithm and the two previous algorithms, called Load Minimization Solution (LMS) and ranking metrics heuristic (RMH), using simulation and results are presented. Simulation results indicate that our proposed heuristic method performs better in all cases which conqueror traffic (TCP & UDP) exists and correctly identifies more flow rates than the two other algorithms. Moreover, results show that, it is better to use LMS in the case of no conqueror traffic exists. The total absolute error rates between the amount of originally assigned flow rates and the rates that the RMH, LMS, and our conqueror traffic based RMH are assigned is another comparison we made which, proves that our heuristic method assigns the rates much closer to the original rates.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127447943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Wireless Sensor Networks Against Spurious Injections 保护无线传感器网络免受虚假注入
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382600
A. Chowdhury, S. Tripathy, Sukumar Nandi
Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.
无线传感器网络(WSNs)最适合于感知现象,这反过来又构成了控制纠偏平面上执行器的基础。但是,在调用纠正操作之前,有必要验证数据没有被恶意注入。为此,我们提出了CADA(基于元胞自动机的数据认证机制),这是一种轻量级协议,用于对来自有效节点的数据进行认证。与它的前辈不同,它被设计为考虑多种资源的稀缺性,即功率、处理、存储、带宽和无线电范围。CADA利用元胞自动机组件之间的并发操作,不仅速度快,而且易于在硬件上实现。
{"title":"Securing Wireless Sensor Networks Against Spurious Injections","authors":"A. Chowdhury, S. Tripathy, Sukumar Nandi","doi":"10.1109/COMSWA.2007.382600","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382600","url":null,"abstract":"Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unwanted SMTP Paths and Relays 不需要的SMTP路径和中继
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382440
Srikanth Palla, R. Dantu
Based on the social interactions of an email user, incoming email traffic can be divided into different categories such as, telemarketing, Opt-in family members and friends. Due to a lack of knowledge in the different categories, most of the existing spam filters are prone to high false positives and false negatives. Moreover, a majority of the spammers obfuscate their email content inorder to circumvent the content-based spam filters. However, they do not have access to all the fields in the email header. Our classification method is based on the path traversed by email (instead of content analysis) since we believe that spammers cannot forge all the fields in the email header. We based our classification on three kinds of analyses on the header: i) EndToEnd path analysis, which tries to establish the legitimacy of the path taken by an email and classifies them as either spam or non-spam; ii) Relay analysis, which verifies the trustworthiness of the relays participating in the relaying of emails; iii) Emails wantedness analysis, which measure the recipients wantedness of the senders emails. We use the IMAP message status flags such as, message has been read, deleted, answered, flagged, and draft as an implicit feed back from the user in Emails wantedness analysis. Finally we classify the incoming emails as i) socially close (such as, legitimate emails from family, and friends), ii) socially distinct emails from strangers, iii) spam emails (for example, emails from telemarketers, and spammers) and iv) opt-in emails. Based on the relation between spamminess of the path taken by spam emails and the unwantedness values of the spammers, we classify spammers as i) prospective spammers, ii) suspects, iii) recent spammers and iv) serial spammers. Overall, our method resulted in far less false positives compared to current filters like SpamAssassin. We achieved a precision of 98.65% which is better than the precisions achieved by SPF and DNSBL blacklists.
根据电子邮件用户的社交互动,收到的电子邮件流量可以分为不同的类别,如电话营销、家庭成员和朋友的选择。由于缺乏对不同类别的了解,大多数现有的垃圾邮件过滤器容易出现高误报和误报。此外,大多数垃圾邮件发送者混淆了他们的电子邮件内容,以绕过基于内容的垃圾邮件过滤器。但是,他们不能访问电子邮件标题中的所有字段。我们的分类方法是基于电子邮件所经过的路径(而不是内容分析),因为我们认为垃圾邮件发送者无法伪造电子邮件头中的所有字段。我们基于对标题的三种分析进行分类:i) EndToEnd路径分析,它试图建立电子邮件所采取的路径的合法性,并将其分类为垃圾邮件或非垃圾邮件;ii)中继分析,验证参与邮件中继的中继者的可信度;iii)电子邮件需求分析,衡量收件人对发件人电子邮件的需求。在电子邮件需求分析中,我们使用IMAP消息状态标志(如消息已读取、已删除、已回答、已标记和已起草)作为来自用户的隐式反馈。最后,我们将收到的电子邮件分类为i)社交密切(例如,来自家人和朋友的合法电子邮件),ii)来自陌生人的社交不同电子邮件,iii)垃圾邮件(例如,来自电话营销人员和垃圾邮件发送者的电子邮件)和iv)选择加入电子邮件。根据滥发电邮路径的滥发性与滥发电邮者的不受欢迎程度之间的关系,我们将滥发电邮者分为i)准滥发电邮者、ii)怀疑滥发电邮者、iii)最近滥发电邮者及iv)连续滥发电邮者。总的来说,与SpamAssassin等当前过滤器相比,我们的方法产生的误报要少得多。准确度达到98.65%,优于SPF和DNSBL黑名单的准确度。
{"title":"Unwanted SMTP Paths and Relays","authors":"Srikanth Palla, R. Dantu","doi":"10.1109/COMSWA.2007.382440","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382440","url":null,"abstract":"Based on the social interactions of an email user, incoming email traffic can be divided into different categories such as, telemarketing, Opt-in family members and friends. Due to a lack of knowledge in the different categories, most of the existing spam filters are prone to high false positives and false negatives. Moreover, a majority of the spammers obfuscate their email content inorder to circumvent the content-based spam filters. However, they do not have access to all the fields in the email header. Our classification method is based on the path traversed by email (instead of content analysis) since we believe that spammers cannot forge all the fields in the email header. We based our classification on three kinds of analyses on the header: i) EndToEnd path analysis, which tries to establish the legitimacy of the path taken by an email and classifies them as either spam or non-spam; ii) Relay analysis, which verifies the trustworthiness of the relays participating in the relaying of emails; iii) Emails wantedness analysis, which measure the recipients wantedness of the senders emails. We use the IMAP message status flags such as, message has been read, deleted, answered, flagged, and draft as an implicit feed back from the user in Emails wantedness analysis. Finally we classify the incoming emails as i) socially close (such as, legitimate emails from family, and friends), ii) socially distinct emails from strangers, iii) spam emails (for example, emails from telemarketers, and spammers) and iv) opt-in emails. Based on the relation between spamminess of the path taken by spam emails and the unwantedness values of the spammers, we classify spammers as i) prospective spammers, ii) suspects, iii) recent spammers and iv) serial spammers. Overall, our method resulted in far less false positives compared to current filters like SpamAssassin. We achieved a precision of 98.65% which is better than the precisions achieved by SPF and DNSBL blacklists.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks 基于覆盖网络的应用感知数据传播体系结构和编程接口
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382438
Tarun Banka, Panho Lee, A. Jayasumana, J. Kurose
Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained network conditions. The QoS requirements, e.g., required bandwidth, latency, acceptable data quality, and reliability are interdependent, and critical to the operation of these applications. This paper presents an AWON (application-aware overlay networks) architecture for deploying application-aware services in an overlay network to best meet the application requirements over the available overlay networking infrastructure. An application programming interface (API) is presented to facilitate development of applications within the AWON architectural framework. The API supports the configuration of overlay nodes for in-network, application-aware processing. Application-defined plug-in modules are used to deploy application-specific functionality at each overlay node. The API also enables communication between application and the overlay routing protocol for the desired QoS support. The effectiveness of the AWON architecture and the API is demonstrated for a real-time weather radar data dissemination application using planetlab. Experimental results show that AWON-based application-aware services significantly improve the quality of the content delivered to the end users in bandwidth-constrained conditions.
许多实时分布式协作应用正在兴起,这些应用需要在资源受限的网络条件下,在地理位置遥远的最终用户之间交换关键传感器数据。QoS要求,例如所需带宽、延迟、可接受的数据质量和可靠性是相互依赖的,对这些应用程序的运行至关重要。本文提出了一种应用感知覆盖网络(AWON)体系结构,用于在覆盖网络中部署应用感知服务,从而在可用的覆盖网络基础设施上最好地满足应用需求。提出了一个应用程序编程接口(API),以方便在AWON体系结构框架内开发应用程序。该API支持配置覆盖节点,用于网络内的应用程序感知处理。应用程序定义的插件模块用于在每个覆盖节点上部署特定于应用程序的功能。API还支持应用程序和覆盖路由协议之间的通信,以获得所需的QoS支持。在planetlab的实时气象雷达数据传播应用中,验证了AWON架构和API的有效性。实验结果表明,在带宽受限的条件下,基于awn的应用感知服务显著提高了交付给最终用户的内容质量。
{"title":"An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks","authors":"Tarun Banka, Panho Lee, A. Jayasumana, J. Kurose","doi":"10.1109/COMSWA.2007.382438","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382438","url":null,"abstract":"Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained network conditions. The QoS requirements, e.g., required bandwidth, latency, acceptable data quality, and reliability are interdependent, and critical to the operation of these applications. This paper presents an AWON (application-aware overlay networks) architecture for deploying application-aware services in an overlay network to best meet the application requirements over the available overlay networking infrastructure. An application programming interface (API) is presented to facilitate development of applications within the AWON architectural framework. The API supports the configuration of overlay nodes for in-network, application-aware processing. Application-defined plug-in modules are used to deploy application-specific functionality at each overlay node. The API also enables communication between application and the overlay routing protocol for the desired QoS support. The effectiveness of the AWON architecture and the API is demonstrated for a real-time weather radar data dissemination application using planetlab. Experimental results show that AWON-based application-aware services significantly improve the quality of the content delivered to the end users in bandwidth-constrained conditions.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2007 2nd International Conference on Communication Systems Software and Middleware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1