首页 > 最新文献

2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

英文 中文
Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System 基于软件定义和认知无线网络的容灾系统性能评估
Goshi Sato, Noriki Uchida, K. Hashimoto, Y. Shibata
Through the information network recovery experience on the East Japan Great Earthquake on March 11, 2011, we learned that the combination of various existing wireless network technologies such as satellite IP network, 3G/LTE, Wi-Fi was useful in term of connectivity. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best performance network among the possible network links even though the serious disaster occurred and some of those network links were seriously damaged. We also introduce an OpenFlow based access network to automatically control link selection and route selections within the cognitive wireless network to Internet by periodically monitoring evaluating their network states. In order to verify the usefulness of our proposed system, a prototype Openflow based cognitive wireless network system is constructed by connection the disaster areas in the East Japan Great Earthquake and its performance is evaluated.
通过2011年3月11日东日本大地震的信息网络恢复经验,我们了解到,结合现有的各种无线网络技术,如卫星IP网络、3G/LTE、Wi-Fi,在连接方面是有用的。本文通过将这些无线网络整合成一个认知无线网络,即使在发生严重灾害、部分网络链路严重损坏的情况下,用户也可以在可能的网络链路中选择性能最好的网络,将该认知网络作为互联网的接入网。我们还介绍了一种基于OpenFlow的接入网,通过定期监测评估网络状态,自动控制认知无线网络到互联网的链路选择和路由选择。为了验证该系统的有效性,通过连接东日本大地震灾区,构建了一个基于Openflow的认知无线网络原型系统,并对其性能进行了评估。
{"title":"Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System","authors":"Goshi Sato, Noriki Uchida, K. Hashimoto, Y. Shibata","doi":"10.1109/BWCCA.2014.135","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.135","url":null,"abstract":"Through the information network recovery experience on the East Japan Great Earthquake on March 11, 2011, we learned that the combination of various existing wireless network technologies such as satellite IP network, 3G/LTE, Wi-Fi was useful in term of connectivity. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best performance network among the possible network links even though the serious disaster occurred and some of those network links were seriously damaged. We also introduce an OpenFlow based access network to automatically control link selection and route selections within the cognitive wireless network to Internet by periodically monitoring evaluating their network states. In order to verify the usefulness of our proposed system, a prototype Openflow based cognitive wireless network system is constructed by connection the disaster areas in the East Japan Great Earthquake and its performance is evaluated.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of Routing Algorithm in Pocket Switched Networks 口袋交换网络中的路由算法综述
Chuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang
Pocket Switched Networks represent one particular intermittent communication network for handheld mobile devices. It is an important branch of delay tolerant network with broad application areas, taken as a necessary technology for human-centered pervasive computing. Compared with traditional networks, pocket switched networks have no stable topology structure. As for the other types of delay tolerant network, the nodes in pocket switched networks follow the mobility module as human society. Thus, the routing problem of pocket switched networks is more complex, and the existing works also focus their attention in this area. Technological advances of social networks are leading to a few routing protocols for pocket switched networks. A survey of current routing solutions is presented. The development of social network for pocket switched networks is introduced as three stages. Then the routing protocols for pocket switched networks are classified based on these three stages. The details of these routing protocols are shown in this paper. At last, the article discusses the trend of social based routing protocols. This work is hopefully beneficial to the researchers from the communities of pocket switched network analysis, social network mining, and pattern matching.
口袋交换网络是一种特殊的用于手持移动设备的间歇通信网络。它是容忍延迟网络的一个重要分支,具有广泛的应用领域,是实现以人为中心的普适计算的必要技术。与传统网络相比,口袋交换网络没有稳定的拓扑结构。对于其他类型的容延迟网络,口袋交换网络中的节点遵循人类社会的移动性模块。因此,口袋交换网络的路由问题更加复杂,现有的工作也集中在这方面。随着社会网络技术的发展,出现了一些适合口袋交换网络的路由协议。对当前的路由解决方案进行了综述。本文将口袋交换网络的社会网络发展分为三个阶段。然后根据这三个阶段对口袋交换网络的路由协议进行了分类。本文给出了这些路由协议的详细信息。最后,讨论了基于社交的路由协议的发展趋势。本文的工作对口袋交换网络分析、社会网络挖掘和模式匹配等领域的研究人员有一定的借鉴意义。
{"title":"Overview of Routing Algorithm in Pocket Switched Networks","authors":"Chuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang","doi":"10.1109/BWCCA.2014.44","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.44","url":null,"abstract":"Pocket Switched Networks represent one particular intermittent communication network for handheld mobile devices. It is an important branch of delay tolerant network with broad application areas, taken as a necessary technology for human-centered pervasive computing. Compared with traditional networks, pocket switched networks have no stable topology structure. As for the other types of delay tolerant network, the nodes in pocket switched networks follow the mobility module as human society. Thus, the routing problem of pocket switched networks is more complex, and the existing works also focus their attention in this area. Technological advances of social networks are leading to a few routing protocols for pocket switched networks. A survey of current routing solutions is presented. The development of social network for pocket switched networks is introduced as three stages. Then the routing protocols for pocket switched networks are classified based on these three stages. The details of these routing protocols are shown in this paper. At last, the article discusses the trend of social based routing protocols. This work is hopefully beneficial to the researchers from the communities of pocket switched network analysis, social network mining, and pattern matching.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124909629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Performance Analysis of Direct/Cooperative Transmission with TXOP Scheme in WLANs 无线局域网中TXOP直接/协同传输的性能分析
Chien-Erh Weng, Lie Yang, Hsing-Chung Chen
In this paper, we evaluate the saturation throughput and saturation delay with direct/cooperative transmission strategies. Moreover, the cost function is introduced to tradeoff the system performance to determine the optimal strategy for adopting the cooperative transmission, and then we extend the model to support applications with quality of service (QoS) requirements. In order to improve the efficiency, TXOP mechanism which allows multiple consecutive frame exchanges during the TXOP duration is defined in IEEE 802.11e standard. We show the performance in term of saturation throughput, saturation delay and total throughput of the model. Numerical results show that TXOP mechanism is generally suitable for high traffic condition environments.
在本文中,我们评估了直接/协作传输策略下的饱和吞吐量和饱和延迟。在此基础上,引入成本函数来权衡系统性能,确定采用协同传输的最优策略,并将模型扩展到具有服务质量要求的应用。为了提高效率,IEEE 802.11e标准定义了TXOP机制,在TXOP期间允许多个连续帧交换。我们从饱和吞吐量、饱和延迟和总吞吐量三个方面展示了该模型的性能。数值结果表明,TXOP机制一般适用于高流量工况环境。
{"title":"The Performance Analysis of Direct/Cooperative Transmission with TXOP Scheme in WLANs","authors":"Chien-Erh Weng, Lie Yang, Hsing-Chung Chen","doi":"10.1109/BWCCA.2014.137","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.137","url":null,"abstract":"In this paper, we evaluate the saturation throughput and saturation delay with direct/cooperative transmission strategies. Moreover, the cost function is introduced to tradeoff the system performance to determine the optimal strategy for adopting the cooperative transmission, and then we extend the model to support applications with quality of service (QoS) requirements. In order to improve the efficiency, TXOP mechanism which allows multiple consecutive frame exchanges during the TXOP duration is defined in IEEE 802.11e standard. We show the performance in term of saturation throughput, saturation delay and total throughput of the model. Numerical results show that TXOP mechanism is generally suitable for high traffic condition environments.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125072595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-CEStat: Cooperative Critical Data Transmission in Emergency in Static Wireless Body Area Network 静态无线体域网络紧急情况下关键数据的协同传输
S. Yousaf, S. Ahmed, M. Akbar, N. Javaid, Z. Khan, U. Qasim
Cooperative routing is a promising technique which exploits the broadcast nature of wireless medium to enhance network performance. Sensor nodes simultaneously transmit their data on different links and utilize cooperation between nodes. In this paper, a new protocol, Co-CEStat, Cooperative Critical data transmission in Emergency for Static Wireless Body Area Networks, is proposed. The protocol utilizes the merits of both direct and cooperative transmission to achieve higher stability period and end-to-end throughput with greater network lifetime. Simulations are conducted in MATLAB to compare the Co-CEStat's performance with that of three other contemporary non-cooperative routing protocols.
协同路由是利用无线介质的广播特性来提高网络性能的一种很有前途的技术。传感器节点在不同的链路上同时传输数据,并利用节点之间的协作。本文提出了一种新的静态无线体域网应急关键数据协同传输协议——Co-CEStat。该协议利用了直接传输和协同传输的优点,在更长的网络生存期下实现了更高的稳定周期和端到端吞吐量。在MATLAB中进行了仿真,比较了Co-CEStat与其他三种当代非合作路由协议的性能。
{"title":"Co-CEStat: Cooperative Critical Data Transmission in Emergency in Static Wireless Body Area Network","authors":"S. Yousaf, S. Ahmed, M. Akbar, N. Javaid, Z. Khan, U. Qasim","doi":"10.1109/BWCCA.2014.54","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.54","url":null,"abstract":"Cooperative routing is a promising technique which exploits the broadcast nature of wireless medium to enhance network performance. Sensor nodes simultaneously transmit their data on different links and utilize cooperation between nodes. In this paper, a new protocol, Co-CEStat, Cooperative Critical data transmission in Emergency for Static Wireless Body Area Networks, is proposed. The protocol utilizes the merits of both direct and cooperative transmission to achieve higher stability period and end-to-end throughput with greater network lifetime. Simulations are conducted in MATLAB to compare the Co-CEStat's performance with that of three other contemporary non-cooperative routing protocols.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Analysis of WMN-GA Simulation System Results: A Comparison Study for Node Placement in WMNs Considering Exponential and Weibull Distributions and Different Transmission Rates WMN-GA仿真系统结果分析:考虑指数分布和威布尔分布以及不同传输速率的wmn网络节点放置的比较研究
Admir Barolli, Tetsuya Oda, L. Barolli, F. Xhafa, M. Takizawa, V. Loia
In our previous work, we presented WMN-GA (Wireless Mesh Networks-Genetic Algorithm) system. In this paper, we use WMN-GA and analyze the simulation results considering packet delivery ratio (PDR), throughput and delay metrics. For simulations, we used ns-3 simulator and Hybrid Wireless Mesh Protocol (HWMP). We evaluate the performance of WMN for Exponential and Weibull distributions by sending multiple constant bit rate (CBR) flows and different transmission rates in the network. From simulation results, we found that for 10, 20 and 30 number of connections, the PDR is less than 60% when the transmission rate is more than 1200 kbps for Exponential distribution. The PDR for Weibull distribution is higher than Exponential distribution. For different number of connections, the throughput is increased linearly with the increasing of the transmission rate. The throughput of Exponential distribution is higher than Weibull distribution. With increasing of the number of the connections and the transmission rate, the delay is increased. For 10 connections, the delay is very small until the transmission rate is 800 kbps. The delay of Exponential distribution is smaller than that of Weibull distribution.
在我们之前的工作中,我们提出了WMN-GA(无线网状网络-遗传算法)系统。在本文中,我们使用WMN-GA并分析了考虑分组传送率(PDR)、吞吐量和延迟指标的仿真结果。在模拟中,我们使用ns-3模拟器和混合无线网格协议(HWMP)。我们通过在网络中发送多个恒定比特率(CBR)流和不同的传输速率来评估指数分布和威布尔分布下WMN的性能。仿真结果表明,在连接数为10、20和30的情况下,当传输速率大于1200 kbps时,PDR均小于60%,呈指数分布。威布尔分布的PDR高于指数分布。对于不同的连接数,吞吐量随传输速率的增加而线性增加。指数分布的吞吐量高于威布尔分布。随着连接数和传输速率的增加,延迟也随之增加。对于10个连接,延迟非常小,直到传输速率达到800kbps。指数分布的延迟比威布尔分布的延迟小。
{"title":"Analysis of WMN-GA Simulation System Results: A Comparison Study for Node Placement in WMNs Considering Exponential and Weibull Distributions and Different Transmission Rates","authors":"Admir Barolli, Tetsuya Oda, L. Barolli, F. Xhafa, M. Takizawa, V. Loia","doi":"10.1109/BWCCA.2014.142","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.142","url":null,"abstract":"In our previous work, we presented WMN-GA (Wireless Mesh Networks-Genetic Algorithm) system. In this paper, we use WMN-GA and analyze the simulation results considering packet delivery ratio (PDR), throughput and delay metrics. For simulations, we used ns-3 simulator and Hybrid Wireless Mesh Protocol (HWMP). We evaluate the performance of WMN for Exponential and Weibull distributions by sending multiple constant bit rate (CBR) flows and different transmission rates in the network. From simulation results, we found that for 10, 20 and 30 number of connections, the PDR is less than 60% when the transmission rate is more than 1200 kbps for Exponential distribution. The PDR for Weibull distribution is higher than Exponential distribution. For different number of connections, the throughput is increased linearly with the increasing of the transmission rate. The throughput of Exponential distribution is higher than Weibull distribution. With increasing of the number of the connections and the transmission rate, the delay is increased. For 10 connections, the delay is very small until the transmission rate is 800 kbps. The delay of Exponential distribution is smaller than that of Weibull distribution.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of a Trust-Behavior Based Reputation System for Mobile Applications 基于信任行为的移动应用信誉系统的实现
T. Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang
The sharp increase of the number of mobile applications attracts special attention on mobile application trust. It becomes more and more crucial for a user to know which mobile application is trustworthy to purchase, download, install, execute and recommend. This paper presents the design and implementation of a trust-behavior based reputation system for mobile applications based on an Android platform. The system can automatically evaluate a user's trust in a mobile application based on application usage and generate application reputation according to collected individual trust information. We implement the system and evaluate its performance based on a user study. The result shows that our system is effective with regard to trust/reputation evaluation accuracy, power efficiency and system usability.
移动应用数量的急剧增加引起了人们对移动应用信任的特别关注。对于用户来说,了解哪些手机应用值得购买、下载、安装、执行和推荐变得越来越重要。本文提出了一种基于Android平台的基于信任行为的移动应用信誉系统的设计与实现。该系统可以根据用户对移动应用的使用情况自动评估用户对移动应用的信任程度,并根据收集到的个人信任信息生成应用的信誉值。我们实现了该系统,并在用户研究的基础上对其性能进行了评估。结果表明,该系统在信任/声誉评估准确性、功耗效率和系统可用性方面是有效的。
{"title":"Implementation of a Trust-Behavior Based Reputation System for Mobile Applications","authors":"T. Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang","doi":"10.1109/BWCCA.2014.52","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.52","url":null,"abstract":"The sharp increase of the number of mobile applications attracts special attention on mobile application trust. It becomes more and more crucial for a user to know which mobile application is trustworthy to purchase, download, install, execute and recommend. This paper presents the design and implementation of a trust-behavior based reputation system for mobile applications based on an Android platform. The system can automatically evaluate a user's trust in a mobile application based on application usage and generate application reputation according to collected individual trust information. We implement the system and evaluate its performance based on a user study. The result shows that our system is effective with regard to trust/reputation evaluation accuracy, power efficiency and system usability.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129527982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements IID与BDD相结合,提高安全功能需求的关键质量
Sen-Tarng Lai, Fang-Yie Leu, W. Chu
In software system, functional requirements are primary system requirements. Client cannot explicitly depicted security requirements and the development team is hard to understand security requirements, makes security requirements difficult to specific implant software system. In software system development process, security requirements often neglected and ignored. However, the cost of correcting security flaws in maintenance phase is over 100 times in requirements phase. Can't effectively improve the system security, enterprises loss is bound to continue to expand. In order to enhance the security of software system, this paper combines the popular software development methodology IID (Interactive and Incremental Development) with BDD (Behavior Driven Development), institutionalized requires functional requirements must be integrated into security requirements. And, using BDD process features to evaluate the major quality of security functional requirements. Timely identifies and modifies the quality defects of security functional requirements item, effectively enhance the security of software systems.
在软件系统中,功能需求是主要的系统需求。客户端无法明确描述安全需求,开发团队难以理解安全需求,使得安全需求难以具体植入软件系统。在软件系统开发过程中,安全需求往往被忽视和忽视。然而,在维护阶段纠正安全缺陷的成本是需求阶段的100倍以上。不能有效提高系统的安全性,企业的损失势必会不断扩大。为了提高软件系统的安全性,本文将流行的软件开发方法IID(交互式增量开发)与BDD(行为驱动开发)相结合,制度化地要求功能需求必须集成到安全性需求中。并且,使用BDD过程特性来评估安全功能需求的主要质量。及时识别和修改安全功能需求项的质量缺陷,有效提升软件系统的安全性。
{"title":"Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements","authors":"Sen-Tarng Lai, Fang-Yie Leu, W. Chu","doi":"10.1109/BWCCA.2014.78","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.78","url":null,"abstract":"In software system, functional requirements are primary system requirements. Client cannot explicitly depicted security requirements and the development team is hard to understand security requirements, makes security requirements difficult to specific implant software system. In software system development process, security requirements often neglected and ignored. However, the cost of correcting security flaws in maintenance phase is over 100 times in requirements phase. Can't effectively improve the system security, enterprises loss is bound to continue to expand. In order to enhance the security of software system, this paper combines the popular software development methodology IID (Interactive and Incremental Development) with BDD (Behavior Driven Development), institutionalized requires functional requirements must be integrated into security requirements. And, using BDD process features to evaluate the major quality of security functional requirements. Timely identifies and modifies the quality defects of security functional requirements item, effectively enhance the security of software systems.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure Approximate Nearest Neighbor Search over Encrypted Data 加密数据的安全近似近邻搜索
Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen
For the past decade, approximate nearest neighbor (ANN) search in high dimensional space has been studied extensively. However, it supports only ANN search over palintext in traditional locality sensitive hashing (LSH). How to perform ANN search over encrypted data becomes a new challenging task. In this paper, we make an attempt to formally address the problem. We propose a new secure and efficient ANN search scheme over encrypted data based on Sorting Keys-LSH (LSH) and mutable order-preserving encryption (mOPE). In our construction, we exploit SK-LSH to generate indexes locally. While data and indexes should be outsourced to the cloud in encrypted form, which complicates computations on the encrypted data. Then, we encrypt LSH indexes using mOPE for efficient ANN search. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly realizing the goal of secure ANN search over encrypted data.
近十年来,高维空间中的近似最近邻(ANN)搜索得到了广泛的研究。然而,在传统的局部敏感散列(LSH)中,它只支持对回文的人工神经网络搜索。如何对加密数据进行人工神经网络搜索成为一个新的挑战。在本文中,我们试图正式地解决这个问题。提出了一种基于排序密钥LSH (LSH)和可变保序加密(mOPE)的安全高效的人工神经网络加密算法。在我们的构造中,我们利用SK-LSH在本地生成索引。而数据和索引应该以加密的形式外包给云,这使得对加密数据的计算变得复杂。然后,我们使用mOPE对LSH索引进行加密,以实现高效的人工神经网络搜索。通过严格的安全性和效率分析,我们证明了我们提出的方案在提出的模型下是安全的,同时正确地实现了对加密数据进行安全ANN搜索的目标。
{"title":"Secure Approximate Nearest Neighbor Search over Encrypted Data","authors":"Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen","doi":"10.1109/BWCCA.2014.118","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.118","url":null,"abstract":"For the past decade, approximate nearest neighbor (ANN) search in high dimensional space has been studied extensively. However, it supports only ANN search over palintext in traditional locality sensitive hashing (LSH). How to perform ANN search over encrypted data becomes a new challenging task. In this paper, we make an attempt to formally address the problem. We propose a new secure and efficient ANN search scheme over encrypted data based on Sorting Keys-LSH (LSH) and mutable order-preserving encryption (mOPE). In our construction, we exploit SK-LSH to generate indexes locally. While data and indexes should be outsourced to the cloud in encrypted form, which complicates computations on the encrypted data. Then, we encrypt LSH indexes using mOPE for efficient ANN search. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly realizing the goal of secure ANN search over encrypted data.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126688604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Outage Analysis of Interference-Limited Dual-Hop Amplify-and-Forward Bidirectional Relaying Systems 限干扰双跳放大转发双向中继系统的中断分析
Honghang Wen, J. Ge, Jifu Wang
This paper investigates the outage performance of dual-hop amplify-and-forward (AF) two-way relaying systems with multiple co-channel interferers at the AF relay and two noisy end-sources. For such, a tight closed-form approximation is derived for the outage probability of the considered systems. In particular, in high SIR regions, with an increasing system SIR, the outage performance does not vary with the number of interferers once the total interference power is given. Simulation results are presented to corroborate the proposed theoretical analysis.
研究了双跳放大转发(AF)双向中继系统在中继端存在多个同信道干扰和两个噪声源的情况下的中断性能。为此,导出了所考虑系统的停电概率的紧闭近似。特别是在高SIR区域,随着系统SIR的增加,当总干扰功率给定时,中断性能不随干扰数的变化而变化。仿真结果证实了理论分析的正确性。
{"title":"Outage Analysis of Interference-Limited Dual-Hop Amplify-and-Forward Bidirectional Relaying Systems","authors":"Honghang Wen, J. Ge, Jifu Wang","doi":"10.1109/BWCCA.2014.66","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.66","url":null,"abstract":"This paper investigates the outage performance of dual-hop amplify-and-forward (AF) two-way relaying systems with multiple co-channel interferers at the AF relay and two noisy end-sources. For such, a tight closed-form approximation is derived for the outage probability of the considered systems. In particular, in high SIR regions, with an increasing system SIR, the outage performance does not vary with the number of interferers once the total interference power is given. Simulation results are presented to corroborate the proposed theoretical analysis.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Process Migration Approach to Energy-Efficient Computation in a Cluster of Servers 服务器集群中节能计算的进程迁移方法
Dilawaer Duolikun, T. Enokido, M. Takizawa
Application processes have to be efficiently performed on servers in a cluster with respect to not only performance but also electric energy consumption. In this paper, we consider a process migration (MG) approach to energy-efficiently performing application processes on servers in a cluster. First, a client issues an application process to a server in a cluster. A process performed on a current server is migrated to another server if the server is expected to consume smaller electric energy to perform the process than the current server and the deadline constraint on the process is satisfied on the server. In the evaluation, the total electric energy consumption of servers is shown to be smaller and the average execution time of each process to be shorter in the MG algorithm than the round robin and random algorithms.
应用程序进程必须在集群中的服务器上高效地执行,不仅要考虑性能,还要考虑电能消耗。在本文中,我们考虑一种进程迁移(process migration, MG)方法,以便在集群中的服务器上高效地执行应用程序进程。首先,客户机向集群中的服务器发出应用程序进程。如果预期在当前服务器上执行的进程消耗的电能比当前服务器少,并且在服务器上满足进程的最后期限约束,则将在当前服务器上执行的进程迁移到另一个服务器。在评估中,MG算法比轮询算法和随机算法的服务器总能耗更小,每个进程的平均执行时间更短。
{"title":"A Process Migration Approach to Energy-Efficient Computation in a Cluster of Servers","authors":"Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/BWCCA.2014.63","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.63","url":null,"abstract":"Application processes have to be efficiently performed on servers in a cluster with respect to not only performance but also electric energy consumption. In this paper, we consider a process migration (MG) approach to energy-efficiently performing application processes on servers in a cluster. First, a client issues an application process to a server in a cluster. A process performed on a current server is migrated to another server if the server is expected to consume smaller electric energy to perform the process than the current server and the deadline constraint on the process is satisfied on the server. In the evaluation, the total electric energy consumption of servers is shown to be smaller and the average execution time of each process to be shorter in the MG algorithm than the round robin and random algorithms.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123646114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1