首页 > 最新文献

2011 19th IEEE International Conference on Network Protocols最新文献

英文 中文
J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime J-RoC:一种延长传感器网络寿命的联合路由和收费方案
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089076
Zi Li, Yang Peng, Wensheng Zhang, D. Qiao
The emerging wireless charging technology creates a controllable and perpetual energy source to provide wireless power over distance. Schemes have been proposed to make use of wireless charging to prolong the sensor network lifetime. Unfortunately, existing schemes only passively replenish sensors that are deficient in energy supply, and cannot fully leverage the strengths of this technology. To address the limitation, we propose J-RoC — a practical and efficient Joint Routing and Charging scheme. Through proactively guiding the routing activities in the network and delivering energy to where it is needed, J-RoC not only replenishes energy into the network but also effectively improves the network energy utilization, thus prolonging the network lifetime. To evaluate the performance of the J-RoC scheme, we conduct experiments in a small-scale testbed and simulations in large-scale networks. Evaluation results demonstrate that J-RoC significantly elongates the network lifetime compared to existing wireless charging based schemes.
新兴的无线充电技术创造了一种可控的、永久的能源,可以提供远距离的无线供电。提出了利用无线充电延长传感器网络寿命的方案。遗憾的是,现有方案只能被动地补充能量供应不足的传感器,无法充分发挥该技术的优势。为了解决这一限制,我们提出了J-RoC——一种实用且高效的联合路由和收费方案。J-RoC通过主动引导网络中的路由活动,将能量输送到需要的地方,不仅可以向网络补充能量,还可以有效提高网络的能量利用率,从而延长网络的生命周期。为了评估J-RoC方案的性能,我们在小型试验台进行了实验,并在大型网络中进行了模拟。评估结果表明,与现有基于无线充电的方案相比,J-RoC显著延长了网络寿命。
{"title":"J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime","authors":"Zi Li, Yang Peng, Wensheng Zhang, D. Qiao","doi":"10.1109/ICNP.2011.6089076","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089076","url":null,"abstract":"The emerging wireless charging technology creates a controllable and perpetual energy source to provide wireless power over distance. Schemes have been proposed to make use of wireless charging to prolong the sensor network lifetime. Unfortunately, existing schemes only passively replenish sensors that are deficient in energy supply, and cannot fully leverage the strengths of this technology. To address the limitation, we propose J-RoC — a practical and efficient Joint Routing and Charging scheme. Through proactively guiding the routing activities in the network and delivering energy to where it is needed, J-RoC not only replenishes energy into the network but also effectively improves the network energy utilization, thus prolonging the network lifetime. To evaluate the performance of the J-RoC scheme, we conduct experiments in a small-scale testbed and simulations in large-scale networks. Evaluation results demonstrate that J-RoC significantly elongates the network lifetime compared to existing wireless charging based schemes.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"160 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 167
The case for addressing the limiting impact of interference on wireless scheduling 解决干扰对无线调度的限制影响的案例
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089051
X. Che, Xi Ju, Hongwei Zhang
Co-channel interference is a limiting factor to the predictability and performance of wireless networks, thus interference-oriented scheduling of channel access has become a basic building block of wireless networking. Despite much work in this area, the existing algorithms did not address the limiting impact of interference when optimizing transmission scheduling. Towards understanding the importance of considering the limiting impact of interference, we formulate the concept of interference budget, and we propose the scheduling algorithm iOrder that maximizes the schedulability of future channel access when scheduling concurrent transmissions. When selecting concurrent transmitters for a time slot, more specifically, iOrder tries to maximize the additional interference that can be tolerated by all the receivers while satisfying the application requirement on link reliability. We analyze the approximation ratio of iOrder, and, through extensive simulation and testbed-based measurement, we observe that addressing the limiting impact of interference can improve the performance of existing algorithms by a significant margin, for instance, improving the throughput of the well-known algorithm LQF by a factor up to 2. Thus our study demonstrates the importance of explicitly addressing the limiting impact of interference, which opens up new avenues for future research and for optimizing wireless network performance.
同信道干扰是无线网络可预测性和性能的限制因素,因此面向干扰的信道访问调度已成为无线网络的基本组成部分。尽管在这方面做了很多工作,但现有的算法在优化传输调度时没有解决干扰的限制影响。为了理解考虑干扰限制影响的重要性,我们提出了干扰预算的概念,并提出了调度算法iOrder,该算法在调度并发传输时最大限度地提高了未来信道访问的可调度性。当为一个时隙选择并发发射机时,更具体地说,iOrder试图在满足应用对链路可靠性的要求的同时,使所有接收器可以容忍的额外干扰最大化。我们分析了iOrder的近似比率,并且通过广泛的模拟和基于测试平台的测量,我们观察到解决干扰的限制影响可以显着提高现有算法的性能,例如,将众所周知的算法LQF的吞吐量提高2倍。因此,我们的研究表明了明确解决干扰限制影响的重要性,这为未来的研究和优化无线网络性能开辟了新的途径。
{"title":"The case for addressing the limiting impact of interference on wireless scheduling","authors":"X. Che, Xi Ju, Hongwei Zhang","doi":"10.1109/ICNP.2011.6089051","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089051","url":null,"abstract":"Co-channel interference is a limiting factor to the predictability and performance of wireless networks, thus interference-oriented scheduling of channel access has become a basic building block of wireless networking. Despite much work in this area, the existing algorithms did not address the limiting impact of interference when optimizing transmission scheduling. Towards understanding the importance of considering the limiting impact of interference, we formulate the concept of interference budget, and we propose the scheduling algorithm iOrder that maximizes the schedulability of future channel access when scheduling concurrent transmissions. When selecting concurrent transmitters for a time slot, more specifically, iOrder tries to maximize the additional interference that can be tolerated by all the receivers while satisfying the application requirement on link reliability. We analyze the approximation ratio of iOrder, and, through extensive simulation and testbed-based measurement, we observe that addressing the limiting impact of interference can improve the performance of existing algorithms by a significant margin, for instance, improving the throughput of the well-known algorithm LQF by a factor up to 2. Thus our study demonstrates the importance of explicitly addressing the limiting impact of interference, which opens up new avenues for future research and for optimizing wireless network performance.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125453366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine learning for implanted malicious code detection with incompletely specified system implementations 不完全指定系统实现的植入恶意代码检测的机器学习
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089070
Yating Hsu, David Lee
In 2009 UnrealIRCd 3.2.8.1, an IRC (Internet Relay Chat) server, was replaced by a version with a backdoor at its mirror sites. It was not detected until seven months later and it had caused irrevocable damages in IRC services. It is of vital importance and also a challenge to detect implanted malicious code in newly developed systems before their deployment. We apply machine learning to uncover a system implementation structure that includes its normal functions from the design, as well as the hidden malicious behaviors. Published works with machine learning often assume that systems are completely specified. Unfortunately, practical system implementations are usually incompletely specified and the prevalent algorithms do not apply. We design generalized and efficient machine learning algorithms for incompletely specified protocol system implementations for detecting implanted malicious code. We further extend the results where machine learning starts from an approximate model instead of an empty conjecture — a usual approach of machine learning algorithms, and our approach learns an implementation structure more efficiently than the known algorithms. We implement and apply our method to two case studies: an IRC server with backdoor and an MSN client with message flooder. Experiments show that our procedures successfully and efficiently detect the implanted malicious behaviors.
2009年,IRC (Internet Relay Chat)服务器UnrealIRCd 3.2.8.1被镜像站点带有后门的版本所取代。它直到7个月后才被发现,并对IRC服务造成了不可挽回的损害。在新开发的系统部署之前检测植入的恶意代码是至关重要的,也是一个挑战。我们应用机器学习来揭示系统实现结构,包括其设计中的正常功能,以及隐藏的恶意行为。已发表的机器学习著作通常假设系统是完全指定的。不幸的是,实际的系统实现通常是不完全指定的,流行的算法并不适用。我们为检测植入恶意代码的不完全指定协议系统实现设计了通用且高效的机器学习算法。我们进一步扩展了机器学习从一个近似模型开始的结果,而不是一个空的猜想——机器学习算法的一种常用方法,我们的方法比已知的算法更有效地学习实现结构。我们在两个案例研究中实现并应用我们的方法:带后门的IRC服务器和带消息泛滥的MSN客户端。实验表明,该方法能够有效地检测出植入的恶意行为。
{"title":"Machine learning for implanted malicious code detection with incompletely specified system implementations","authors":"Yating Hsu, David Lee","doi":"10.1109/ICNP.2011.6089070","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089070","url":null,"abstract":"In 2009 UnrealIRCd 3.2.8.1, an IRC (Internet Relay Chat) server, was replaced by a version with a backdoor at its mirror sites. It was not detected until seven months later and it had caused irrevocable damages in IRC services. It is of vital importance and also a challenge to detect implanted malicious code in newly developed systems before their deployment. We apply machine learning to uncover a system implementation structure that includes its normal functions from the design, as well as the hidden malicious behaviors. Published works with machine learning often assume that systems are completely specified. Unfortunately, practical system implementations are usually incompletely specified and the prevalent algorithms do not apply. We design generalized and efficient machine learning algorithms for incompletely specified protocol system implementations for detecting implanted malicious code. We further extend the results where machine learning starts from an approximate model instead of an empty conjecture — a usual approach of machine learning algorithms, and our approach learns an implementation structure more efficiently than the known algorithms. We implement and apply our method to two case studies: an IRC server with backdoor and an MSN client with message flooder. Experiments show that our procedures successfully and efficiently detect the implanted malicious behaviors.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of adaptive streaming for hybrid CDN/P2P live video systems CDN/P2P混合视频直播系统的自适应流分析
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089062
Ahmed Mansy, M. Ammar
Most commercial video streaming systems rely on Content Distribution Networks (CDNs) to distribute video content. HTTP adaptive streaming has been recently adopted by major video streaming providers and is now considered the standard technique used with CDN-based streaming systems. Despite the success of these systems, cost-effective scalability continues to be of concern in their design and deployment. To address this, recent work has proposed the use of hybrid CDN and Peer-to-peer (P2P) live streaming systems. The design of these systems aims to combine the scalability of P2P systems and the desirable performance properties of CDN-based systems. However, the use of adaptive streaming, has not been explored extensively in such hybrid systems. Designing and operating an adaptive hybrid streaming system is very challenging. Two design decisions are very critical in the operation of any such system. The first one is the bitrate adaptation strategy which specifies how different bitrates are assigned to different users while maximizing user satisfaction. The second is defining the operational guidelines for switching the system between the CDN and the P2P modes while efficiently utilizing the available resources. In this paper we present a model and analysis of a hybrid CDN-P2P adaptive live streaming system with the objective of answering these two design questions. We first present a stochastic fluid model to the hybrid streaming system with a single video bitrate and we obtain theoretical results to guide the system operation as described above. We then extend the analysis to the adaptive streaming case with multiple video bitrates. We model adaptive streaming as a linear optimization problem to obtain the best bitrate adaptation strategy. We validate our analysis using simulations. Our conclusion is that adaptive hybrid streaming can significantly improve the ability of the system to satisfy more users with higher video bitrates over CDN-based systems.
大多数商业视频流系统依赖于内容分发网络(cdn)来分发视频内容。HTTP自适应流媒体最近被主要的视频流媒体提供商采用,现在被认为是基于cdn的流媒体系统使用的标准技术。尽管这些系统取得了成功,但在它们的设计和部署中,经济有效的可伸缩性仍然是人们关注的问题。为了解决这个问题,最近的工作建议使用混合CDN和点对点(P2P)直播系统。这些系统的设计旨在将P2P系统的可扩展性和基于cdn的系统的理想性能结合起来。然而,在这种混合系统中,自适应流的使用尚未得到广泛的探索。设计和操作自适应混合流系统是非常具有挑战性的。在任何此类系统的操作中,有两个设计决策是非常关键的。第一个是比特率自适应策略,它规定了如何将不同的比特率分配给不同的用户,同时最大限度地提高用户满意度。其次是定义在CDN和P2P模式之间切换系统的操作指南,同时有效地利用可用资源。在本文中,我们提出了一个混合CDN-P2P自适应直播系统的模型和分析,目的是回答这两个设计问题。我们首先对单视频比特率的混合流系统提出了一个随机流体模型,并得到了指导系统运行的理论结果。然后,我们将分析扩展到具有多个视频比特率的自适应流情况。我们将自适应流建模为一个线性优化问题,以获得最佳的比特率自适应策略。我们用模拟来验证我们的分析。我们的结论是,与基于cdn的系统相比,自适应混合流可以显著提高系统以更高的视频比特率满足更多用户的能力。
{"title":"Analysis of adaptive streaming for hybrid CDN/P2P live video systems","authors":"Ahmed Mansy, M. Ammar","doi":"10.1109/ICNP.2011.6089062","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089062","url":null,"abstract":"Most commercial video streaming systems rely on Content Distribution Networks (CDNs) to distribute video content. HTTP adaptive streaming has been recently adopted by major video streaming providers and is now considered the standard technique used with CDN-based streaming systems. Despite the success of these systems, cost-effective scalability continues to be of concern in their design and deployment. To address this, recent work has proposed the use of hybrid CDN and Peer-to-peer (P2P) live streaming systems. The design of these systems aims to combine the scalability of P2P systems and the desirable performance properties of CDN-based systems. However, the use of adaptive streaming, has not been explored extensively in such hybrid systems. Designing and operating an adaptive hybrid streaming system is very challenging. Two design decisions are very critical in the operation of any such system. The first one is the bitrate adaptation strategy which specifies how different bitrates are assigned to different users while maximizing user satisfaction. The second is defining the operational guidelines for switching the system between the CDN and the P2P modes while efficiently utilizing the available resources. In this paper we present a model and analysis of a hybrid CDN-P2P adaptive live streaming system with the objective of answering these two design questions. We first present a stochastic fluid model to the hybrid streaming system with a single video bitrate and we obtain theoretical results to guide the system operation as described above. We then extend the analysis to the adaptive streaming case with multiple video bitrates. We model adaptive streaming as a linear optimization problem to obtain the best bitrate adaptation strategy. We validate our analysis using simulations. Our conclusion is that adaptive hybrid streaming can significantly improve the ability of the system to satisfy more users with higher video bitrates over CDN-based systems.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120958870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Anti-jamming communication in cognitive radio networks with unknown channel statistics 信道统计未知的认知无线网络抗干扰通信
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089079
Qian Wang, K. Ren, P. Ning
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs). For achieving optimized spectrum usage, existing solutions model the spectrum sensing and access problem as a partially observed Markov decision process (POMDP) and assume that the information states and/or the primary users' (PUs) traffic statistics are known a priori to the secondary users (SUs). While theoretically sound, these existing approaches may not be effective in practice due to two main concerns. First, the assumptions they made are not practical, as before the communication starts, PUs' traffic statistics may not be readily available to the SUs. Secondly and more seriously, existing approaches are extremely vulnerable to malicious jamming attacks. A cognitive attacker can always jam the channels to be accessed by leveraging the same statistic information and stochastic dynamic decision making process that the SUs would follow. To address the above concerns, we formulate the problem of anti-jamming multichannel access in CRNs and solve it as a non-stochastic multi-armed bandit (NS-MAB) problem, where the secondary sender and receiver adaptively choose their arms (i.e., sending and receiving channels) to operate. The proposed protocol enables them to hop to the same set of channels with high probability in the presence of jamming. We analytically show the convergence of the learning algorithms, i.e., the performance difference between the secondary sende and receiver's optimal strategies is no more than O(20k/√ε √Tn ln n). Extensive simulations are conducted to validate the theoretical analysis and show that the proposed protocol is highly resilient to various jamming attacks.
近年来,针对认知无线网络(crn)提出了许多机会频谱感知和接入协议。为了实现优化的频谱使用,现有的解决方案将频谱感知和访问问题建模为部分观察的马尔可夫决策过程(POMDP),并假设信息状态和/或主用户(pu)的流量统计数据是次要用户(su)先验知道的。虽然理论上是合理的,但由于两个主要问题,这些现有的方法在实践中可能并不有效。首先,他们所做的假设是不实际的,因为在通信开始之前,pu的流量统计数据可能不容易提供给su。其次,更严重的是,现有的方法极易受到恶意干扰攻击。认知攻击者总是可以通过利用与SUs相同的统计信息和随机动态决策过程来阻塞要访问的通道。为了解决上述问题,我们制定了crn中的抗干扰多通道接入问题,并将其解决为非随机多臂强盗(NS-MAB)问题,其中辅助发送方和接收方自适应地选择其臂(即发送和接收信道)进行操作。所提出的协议使它们能够在存在干扰的情况下以高概率跳转到同一组信道。我们分析地证明了学习算法的收敛性,即辅助发送方和接收方的最优策略之间的性能差异不超过O(20k/√ε√Tn ln n)。进行了大量的仿真来验证理论分析,并表明所提出的协议对各种干扰攻击具有很高的弹性。
{"title":"Anti-jamming communication in cognitive radio networks with unknown channel statistics","authors":"Qian Wang, K. Ren, P. Ning","doi":"10.1109/ICNP.2011.6089079","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089079","url":null,"abstract":"Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs). For achieving optimized spectrum usage, existing solutions model the spectrum sensing and access problem as a partially observed Markov decision process (POMDP) and assume that the information states and/or the primary users' (PUs) traffic statistics are known a priori to the secondary users (SUs). While theoretically sound, these existing approaches may not be effective in practice due to two main concerns. First, the assumptions they made are not practical, as before the communication starts, PUs' traffic statistics may not be readily available to the SUs. Secondly and more seriously, existing approaches are extremely vulnerable to malicious jamming attacks. A cognitive attacker can always jam the channels to be accessed by leveraging the same statistic information and stochastic dynamic decision making process that the SUs would follow. To address the above concerns, we formulate the problem of anti-jamming multichannel access in CRNs and solve it as a non-stochastic multi-armed bandit (NS-MAB) problem, where the secondary sender and receiver adaptively choose their arms (i.e., sending and receiving channels) to operate. The proposed protocol enables them to hop to the same set of channels with high probability in the presence of jamming. We analytically show the convergence of the learning algorithms, i.e., the performance difference between the secondary sende and receiver's optimal strategies is no more than O(20k/√ε √Tn ln n). Extensive simulations are conducted to validate the theoretical analysis and show that the proposed protocol is highly resilient to various jamming attacks.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Argus: An accurate and agile system to detecting IP prefix hijacking Argus:一个准确和灵活的系统,以检测IP前缀劫持
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089080
Yang Xiang, Zhiliang Wang, Xia Yin, Jianping Wu
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the Internet routing reliability. Invalid routes generated by mis-configurations or malicious attacks will devastate the Internet routing system. In the near future, deploying a secure BGP in the Internet to completely prevent hijacking is impossible. As a result, lots of hijacking detection systems have emerged. However, they have more or less weaknesses such as long detection delay, high false alarm rate or deploy hardness. This paper proposes Argus, an agile system to fast and accurate detect prefix hijacking. Argus already keeps on running in the Internet for two months and identified several possible hijackings. Initial results show that it usually discovers a hijacking in less than ten seconds, and can significantly decrease the false alarm rate.
边界网关协议BGP (Border Gateway protocol)是一种事实上的域间路由协议,它对Internet的路由可靠性起着至关重要的作用。由于配置错误或恶意攻击而产生的无效路由会导致Internet路由系统的崩溃。在不久的将来,在互联网上部署一个安全的BGP来完全防止劫持是不可能的。因此,出现了许多劫机检测系统。然而,它们或多或少都存在检测延迟长、虚警率高、部署困难等缺点。本文提出了一种快速准确检测前缀劫持的敏捷系统Argus。Argus已经在互联网上运行了两个月,并发现了几起可能的劫持事件。初步结果表明,该系统通常在不到10秒的时间内发现劫持事件,并能显著降低误报率。
{"title":"Argus: An accurate and agile system to detecting IP prefix hijacking","authors":"Yang Xiang, Zhiliang Wang, Xia Yin, Jianping Wu","doi":"10.1109/ICNP.2011.6089080","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089080","url":null,"abstract":"The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the Internet routing reliability. Invalid routes generated by mis-configurations or malicious attacks will devastate the Internet routing system. In the near future, deploying a secure BGP in the Internet to completely prevent hijacking is impossible. As a result, lots of hijacking detection systems have emerged. However, they have more or less weaknesses such as long detection delay, high false alarm rate or deploy hardness. This paper proposes Argus, an agile system to fast and accurate detect prefix hijacking. Argus already keeps on running in the Internet for two months and identified several possible hijackings. Initial results show that it usually discovers a hijacking in less than ten seconds, and can significantly decrease the false alarm rate.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133011245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Win-Coupon: An incentive framework for 3G traffic offloading Win-Coupon: 3G流量分流的激励框架
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089054
Xuejun Zhuo, Wei Gao, G. Cao, Yiqi Dai
3G networks are currently facing severe traffic overload problems caused by excessive demands of mobile users. Offloading part of the 3G traffic through other forms of networks, such as Delay Tolerant Networks (DTNs), WiFi hotspots, and Femtocells, is a promising solution. However, since these networks can only provide intermittent and opportunistic connectivity to mobile users, utilizing them for 3G traffic offloading may result in a non-negligible delay. As the delay increases, the users' satisfaction decreases. In this paper, we investigate the tradeoff between the amount of traffic being offloaded and the users' satisfaction. We provide a novel incentive framework to motivate users to leverage their delay tolerance for 3G traffic offloading. To minimize the incentive cost given an offloading target, users with high delay tolerance and large offloading potential should be prioritized for traffic offloading. To effectively capture the dynamic characteristics of users' delay tolerance, our incentive framework is based on reverse auction to let users proactively express their delay tolerance by submitting bids. We further take DTN as a case study to illustrate how to predict the offloading potential of the users by using stochastic analysis. Extensive trace-driven simulations verify the efficiency of our incentive framework for 3G traffic offloading.
由于移动用户的过度需求,3G网络目前面临着严重的流量过载问题。通过其他形式的网络(如延迟容忍网络(DTNs)、WiFi热点和Femtocells)卸载部分3G流量是一种很有前途的解决方案。然而,由于这些网络只能为移动用户提供间歇性和机会性的连接,因此利用它们进行3G流量卸载可能会导致不可忽略的延迟。随着延迟的增加,用户的满意度降低。在本文中,我们研究了被卸载的流量与用户满意度之间的权衡。我们提供了一个新的激励框架来激励用户利用他们对3G流量卸载的延迟容忍度。在给定卸载目标的情况下,为了使激励成本最小化,应优先选择时延容忍度高、卸载潜力大的用户进行流量卸载。为了有效捕捉用户延迟容忍的动态特征,我们的激励框架基于反向拍卖,让用户通过出价主动表达他们的延迟容忍。并以DTN为例,说明如何运用随机分析方法预测用户卸载潜力。广泛的跟踪驱动仿真验证了我们的3G流量卸载激励框架的有效性。
{"title":"Win-Coupon: An incentive framework for 3G traffic offloading","authors":"Xuejun Zhuo, Wei Gao, G. Cao, Yiqi Dai","doi":"10.1109/ICNP.2011.6089054","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089054","url":null,"abstract":"3G networks are currently facing severe traffic overload problems caused by excessive demands of mobile users. Offloading part of the 3G traffic through other forms of networks, such as Delay Tolerant Networks (DTNs), WiFi hotspots, and Femtocells, is a promising solution. However, since these networks can only provide intermittent and opportunistic connectivity to mobile users, utilizing them for 3G traffic offloading may result in a non-negligible delay. As the delay increases, the users' satisfaction decreases. In this paper, we investigate the tradeoff between the amount of traffic being offloaded and the users' satisfaction. We provide a novel incentive framework to motivate users to leverage their delay tolerance for 3G traffic offloading. To minimize the incentive cost given an offloading target, users with high delay tolerance and large offloading potential should be prioritized for traffic offloading. To effectively capture the dynamic characteristics of users' delay tolerance, our incentive framework is based on reverse auction to let users proactively express their delay tolerance by submitting bids. We further take DTN as a case study to illustrate how to predict the offloading potential of the users by using stochastic analysis. Extensive trace-driven simulations verify the efficiency of our incentive framework for 3G traffic offloading.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Energy-efficient routing 节能路由
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089066
A. Junior, Rute C. Sofia, António D. Costa
This work is focused on explore different heuristics that may be applied to provide a link-based cost for energy-aware multihop routing for wireless environments which integrate heterogeneous devices that are carried or owned by Internet end-users. We propose to analyze based on simulations of the different heuristics when applied to both distance-vector and link-state approaches, namely the AODV and OLSR routing protocols.
这项工作的重点是探索不同的启发式方法,这些启发式方法可以应用于为无线环境提供基于链路的能量感知多跳路由成本,这些无线环境集成了由互联网最终用户携带或拥有的异构设备。我们建议在模拟的基础上分析应用于距离矢量和链路状态方法的不同启发式方法,即AODV和OLSR路由协议。
{"title":"Energy-efficient routing","authors":"A. Junior, Rute C. Sofia, António D. Costa","doi":"10.1109/ICNP.2011.6089066","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089066","url":null,"abstract":"This work is focused on explore different heuristics that may be applied to provide a link-based cost for energy-aware multihop routing for wireless environments which integrate heterogeneous devices that are carried or owned by Internet end-users. We propose to analyze based on simulations of the different heuristics when applied to both distance-vector and link-state approaches, namely the AODV and OLSR routing protocols.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Impact of mobility on user-centric routing 移动性对以用户为中心路由的影响
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089063
Namusale Chama, Rute C. Sofia, S. Sargento
This paper presents a summary of work aimed at making current multihop routing in mobile ad hoc networks more sensitive to node mobility and ultimately improve routing performance in the face of node mobility. We discuss the various existing mobility tracking parameters, how they capture node mobility and also their shortfalls. We propose some mobility tracking schemes(heuristics) based on one of the mobility tracking parameters(Link Duration) and also show the performance of one of the proposed heuristics.
本文总结了当前移动自组织网络中多跳路由对节点移动更加敏感的工作,并最终提高面对节点移动的路由性能。我们讨论了各种现有的移动跟踪参数,它们如何捕获节点移动以及它们的不足之处。我们提出了一些基于其中一个移动跟踪参数(链路持续时间)的移动跟踪方案(启发式),并展示了其中一个启发式的性能。
{"title":"Impact of mobility on user-centric routing","authors":"Namusale Chama, Rute C. Sofia, S. Sargento","doi":"10.1109/ICNP.2011.6089063","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089063","url":null,"abstract":"This paper presents a summary of work aimed at making current multihop routing in mobile ad hoc networks more sensitive to node mobility and ultimately improve routing performance in the face of node mobility. We discuss the various existing mobility tracking parameters, how they capture node mobility and also their shortfalls. We propose some mobility tracking schemes(heuristics) based on one of the mobility tracking parameters(Link Duration) and also show the performance of one of the proposed heuristics.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114311856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Self-organizing TDMA for multihop networks 多跳网络自组织TDMA
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089043
L. Feeney
We present a preliminary study of self-organizing TDMA for battery-constrained multihop wireless networks, such as sensor networks. Compared with existing TDMA approaches, this work emphasizes operation in the context of battery saving techniques that allow the radio to spend most of its time powered down, relying on some rendezvous mechanism to ensure that sender and receiver are simultaneously powered on and able to communicate. While such techniques reduce battery consumption, they also significantly limit the amount of information — even local information — that nodes can obtain from channel sensing or packet exchange. We therefore focus on self-organizing TDMA in the case of very limited state information. This work is also relevant to the practical case of independent, co-located sensor networks, which need to adapt to each other's presence without explicit coordination.
我们提出了一个初步的研究自组织TDMA电池约束的多跳无线网络,如传感器网络。与现有的时分多址(TDMA)方法相比,这项工作强调在节省电池的技术背景下进行操作,这种技术允许无线电在大部分时间处于断电状态,依靠某种会合机制来确保发送方和接收方同时通电并能够通信。虽然这些技术减少了电池消耗,但它们也极大地限制了节点可以从信道感知或分组交换中获得的信息量——甚至是本地信息。因此,我们将重点放在状态信息非常有限的情况下的自组织TDMA。这项工作也与独立的、共定位的传感器网络的实际情况有关,这些传感器网络需要在没有明确协调的情况下适应彼此的存在。
{"title":"Self-organizing TDMA for multihop networks","authors":"L. Feeney","doi":"10.1109/ICNP.2011.6089043","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089043","url":null,"abstract":"We present a preliminary study of self-organizing TDMA for battery-constrained multihop wireless networks, such as sensor networks. Compared with existing TDMA approaches, this work emphasizes operation in the context of battery saving techniques that allow the radio to spend most of its time powered down, relying on some rendezvous mechanism to ensure that sender and receiver are simultaneously powered on and able to communicate. While such techniques reduce battery consumption, they also significantly limit the amount of information — even local information — that nodes can obtain from channel sensing or packet exchange. We therefore focus on self-organizing TDMA in the case of very limited state information. This work is also relevant to the practical case of independent, co-located sensor networks, which need to adapt to each other's presence without explicit coordination.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 19th IEEE International Conference on Network Protocols
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1