首页 > 最新文献

2013 Proceedings IEEE INFOCOM最新文献

英文 中文
VoteTrust: Leveraging friend invitation graph to defend against social network Sybils VoteTrust:利用好友邀请图来抵御社交网络攻击
Pub Date : 2016-07-01 DOI: 10.1109/TDSC.2015.2410792
Zhi Yang, Jilong Xue, Xiaoyong Yang, Xiao Wang, Yafei Dai
Online social networks (OSNs) currently face a significant challenge by the existence and continuous creation of fake user accounts (Sybils), which can undermine the quality of social network service by introducing spam and manipulating online rating. Recently, there has been much excitement in the research community over exploiting social network structure to detect Sybils. However, they rely on the assumption that Sybils form a tight-knit community, which may not hold in real OSNs. In this paper, we present VoteTrust, a Sybil detection system that further leverages user interactions of initiating and accepting links. VoteTrust uses the techniques of trust-based vote assignment and global vote aggregation to evaluate the probability that the user is a Sybil. Using detailed evaluation on real social network (Renren), we show VoteTrust's ability to prevent Sybils gathering victims (e.g., spam audience) by sending a large amount of unsolicited friend requests and befriending many normal users, and demonstrate it can significantly outperform traditional ranking systems (such as TrustRank or BadRank) in Sybil detection.
在线社交网络(OSNs)目前面临着一个重大挑战,即虚假用户账户(Sybils)的存在和不断创建,这些账户可以通过引入垃圾邮件和操纵在线评级来破坏社交网络服务的质量。最近,在研究社区中,利用社会网络结构来检测Sybils的研究非常令人兴奋。然而,它们依赖于一个假设,即sybil形成了一个紧密结合的社区,这在实际的osn中可能不成立。在本文中,我们提出了VoteTrust,这是一个Sybil检测系统,它进一步利用了发起和接受链接的用户交互。VoteTrust使用基于信任的投票分配和全局投票聚合技术来评估用户是Sybil的概率。通过对真实社交网络(人人网)的详细评估,我们展示了VoteTrust通过发送大量未经请求的朋友请求和与许多正常用户成为朋友来防止Sybil收集受害者(例如垃圾邮件受众)的能力,并证明它在Sybil检测方面可以显着优于传统排名系统(如TrustRank或BadRank)。
{"title":"VoteTrust: Leveraging friend invitation graph to defend against social network Sybils","authors":"Zhi Yang, Jilong Xue, Xiaoyong Yang, Xiao Wang, Yafei Dai","doi":"10.1109/TDSC.2015.2410792","DOIUrl":"https://doi.org/10.1109/TDSC.2015.2410792","url":null,"abstract":"Online social networks (OSNs) currently face a significant challenge by the existence and continuous creation of fake user accounts (Sybils), which can undermine the quality of social network service by introducing spam and manipulating online rating. Recently, there has been much excitement in the research community over exploiting social network structure to detect Sybils. However, they rely on the assumption that Sybils form a tight-knit community, which may not hold in real OSNs. In this paper, we present VoteTrust, a Sybil detection system that further leverages user interactions of initiating and accepting links. VoteTrust uses the techniques of trust-based vote assignment and global vote aggregation to evaluate the probability that the user is a Sybil. Using detailed evaluation on real social network (Renren), we show VoteTrust's ability to prevent Sybils gathering victims (e.g., spam audience) by sending a large amount of unsolicited friend requests and befriending many normal users, and demonstrate it can significantly outperform traditional ranking systems (such as TrustRank or BadRank) in Sybil detection.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123421117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networks ZOOM:扩展车辆网络中快速机会转发的移动性
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567093
Hongzi Zhu, M. Dong, Shan Chang, Yanmin Zhu, Minglu Li, Xuemin Shen
Vehicular networks consist of highly mobile vehicles communications, where connectivity is intermittent. Due to the distributed and highly dynamic nature of vehicular network, to minimize the end-to-end delay and the network traffic at the same time in data forwarding is very hard. Heuristic algorithms utilizing either contact-level or social-level scale of vehicular mobility have only one-sided view of the network and therefore are not optimal. In this paper, by analyzing three large sets of Global Positioning System (GPS) trace of more than ten thousand public vehicles, we find that pairwise contacts have strong temporal correlation. Furthermore, the contact graph of vehicles presents complex structure when aggregating the underlying contacts. In understanding the impact of both levels of mobility to the data forwarding, we propose an innovative scheme, named ZOOM, for fast opportunistic forwarding in vehicular networks, which automatically choose the most appropriate mobility information when deciding next data-relays in order to minimize the end-to-end delay while reducing the network traffic. Extensive trace-driven simulations demonstrate the efficacy of ZOOM design. On average, ZOOM can improve 30% performance gain comparing to the state-of-art algorithms.
车载网络由高度移动的车辆通信组成,其中连接是间歇性的。由于车用网络的分布式和高度动态性,在数据转发过程中实现端到端时延最小化和网络流量最小化是非常困难的。启发式算法利用车辆移动的接触级或社会级尺度,只能片面地观察网络,因此不是最优的。本文通过对三组一万多辆公共车辆的GPS轨迹进行分析,发现两两接触具有很强的时间相关性。此外,车辆接触图在汇总底层接触点时呈现出复杂的结构。在了解这两种级别的移动性对数据转发的影响后,我们提出了一种创新方案ZOOM,用于车载网络中的快速机会转发,该方案在决定下一个数据中继时自动选择最合适的移动性信息,以最大限度地减少端到端延迟,同时减少网络流量。大量的跟踪驱动仿真证明了ZOOM设计的有效性。平均而言,与最先进的算法相比,ZOOM可以提高30%的性能增益。
{"title":"ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networks","authors":"Hongzi Zhu, M. Dong, Shan Chang, Yanmin Zhu, Minglu Li, Xuemin Shen","doi":"10.1109/INFCOM.2013.6567093","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567093","url":null,"abstract":"Vehicular networks consist of highly mobile vehicles communications, where connectivity is intermittent. Due to the distributed and highly dynamic nature of vehicular network, to minimize the end-to-end delay and the network traffic at the same time in data forwarding is very hard. Heuristic algorithms utilizing either contact-level or social-level scale of vehicular mobility have only one-sided view of the network and therefore are not optimal. In this paper, by analyzing three large sets of Global Positioning System (GPS) trace of more than ten thousand public vehicles, we find that pairwise contacts have strong temporal correlation. Furthermore, the contact graph of vehicles presents complex structure when aggregating the underlying contacts. In understanding the impact of both levels of mobility to the data forwarding, we propose an innovative scheme, named ZOOM, for fast opportunistic forwarding in vehicular networks, which automatically choose the most appropriate mobility information when deciding next data-relays in order to minimize the end-to-end delay while reducing the network traffic. Extensive trace-driven simulations demonstrate the efficacy of ZOOM design. On average, ZOOM can improve 30% performance gain comparing to the state-of-art algorithms.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
COBRA: A framework for the analysis of realistic mobility models 柯博拉:一个分析现实流动性模型的框架
Pub Date : 2013-04-14 DOI: 10.1109/INFCOMW.2013.6562895
Gautam Thakur, A. Helmy
The future global Internet is going to have to cater to users that will be largely mobile. Mobility is one of the main factors affecting the design and performance of wireless networks. Mobility modeling has been an active field for the past decade, mostly focusing on matching a specific mobility or encounter metric with little focus on matching protocol performance. This study investigates the adequacy of existing mobility models in capturing various aspects of human mobility behavior (including communal behavior), as well as network protocol performance. This is achieved systematically through the introduction of a framework that includes a multi-dimensional mobility metric space. We then introduce COBRA, a new mobility model capable of spanning the mobility metric space to match realistic traces. A methodical analysis using a range of protocol (epidemic, spraywait, Prophet, and Bubble Rap) dependent and independent metrics (modularity) of various mobility models (SMOOTH and TVC) and traces (university campuses, and theme parks) is done. Our results indicate significant gaps in several metric dimensions between real traces and existing mobility models. Our findings show that COBRA matches communal aspect and realistic protocol performance, reducing the overhead gap (w.r.t existing models) from 80% to less than 12%, showing the efficacy of our framework.
未来的全球互联网将不得不迎合大部分移动用户。移动性是影响无线网络设计和性能的主要因素之一。在过去的十年中,移动性建模一直是一个活跃的领域,主要关注匹配特定的移动性或遭遇度量,很少关注匹配协议性能。本研究探讨了现有移动性模型在捕捉人类移动性行为(包括公共行为)以及网络协议性能的各个方面的充分性。这是通过引入一个包括多维流动性度量空间的框架来系统地实现的。然后,我们介绍了一种新的移动性模型COBRA,它能够跨越移动性度量空间来匹配真实的轨迹。使用一系列协议(流行病、spraywait、Prophet和Bubble Rap)依赖和独立指标(模块化)的各种移动模型(SMOOTH和TVC)和轨迹(大学校园和主题公园)进行了系统分析。我们的结果表明,在几个度量维度上,真实的轨迹和现有的流动性模型之间存在显著的差距。我们的研究结果表明,COBRA匹配公共方面和现实的协议性能,将开销差距(与现有模型相比)从80%减少到不到12%,显示了我们框架的有效性。
{"title":"COBRA: A framework for the analysis of realistic mobility models","authors":"Gautam Thakur, A. Helmy","doi":"10.1109/INFCOMW.2013.6562895","DOIUrl":"https://doi.org/10.1109/INFCOMW.2013.6562895","url":null,"abstract":"The future global Internet is going to have to cater to users that will be largely mobile. Mobility is one of the main factors affecting the design and performance of wireless networks. Mobility modeling has been an active field for the past decade, mostly focusing on matching a specific mobility or encounter metric with little focus on matching protocol performance. This study investigates the adequacy of existing mobility models in capturing various aspects of human mobility behavior (including communal behavior), as well as network protocol performance. This is achieved systematically through the introduction of a framework that includes a multi-dimensional mobility metric space. We then introduce COBRA, a new mobility model capable of spanning the mobility metric space to match realistic traces. A methodical analysis using a range of protocol (epidemic, spraywait, Prophet, and Bubble Rap) dependent and independent metrics (modularity) of various mobility models (SMOOTH and TVC) and traces (university campuses, and theme parks) is done. Our results indicate significant gaps in several metric dimensions between real traces and existing mobility models. Our findings show that COBRA matches communal aspect and realistic protocol performance, reducing the overhead gap (w.r.t existing models) from 80% to less than 12%, showing the efficacy of our framework.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"114 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124419136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
eTime: Energy-efficient transmission between cloud and mobile devices eTime:云与移动设备之间的高能效传输
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566762
Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, Bo Li
Mobile cloud computing, promising to extend the capabilities of resource-constrained mobile devices, is emerging as a new computing paradigm which has fostered a wide range of exciting applications. In this new paradigm, efficient data transmission between the cloud and mobile devices becomes essential. This, however, is highly unreliable and unpredictable due to several uncontrollable factors, particularly the instability and intermittency of wireless connections, fluctuation of communication bandwidth, and user mobility. Consequently, this puts a heavy burden on the energy consumption of mobile devices. Confirmed by our experiments, significantly more energy is consumed during “bad” connectivity. Inspired by the feasibility to schedule data transmissions for prefetching-friendly or delay-tolerant applications, in this paper, we present eTime, a novel Energy-efficient data Transmission strategy between cloud and Mobile dEvices, based on Lyapunov optimization. It aggressively and adaptively seizes the timing of good connectivity to prefetch frequently used data while deferring delay-tolerant data in bad connectivity. To cope with the randomness and unpredictability of wireless connectivity, eTime only relies on the current status information to make a global energy-delay tradeoff decision. Our evaluations from both trace-driven simulation and realworld implementation show that eTime can be applied to various popular applications while achieving 20%-35% energy saving.
移动云计算有望扩展资源受限的移动设备的功能,它正在作为一种新的计算范式出现,并催生了一系列令人兴奋的应用程序。在这种新模式下,云和移动设备之间的高效数据传输变得至关重要。然而,由于一些不可控因素,特别是无线连接的不稳定性和间歇性、通信带宽的波动以及用户的移动性,这是非常不可靠和不可预测的。因此,这给移动设备的能源消耗带来了沉重的负担。我们的实验证实,在“不良”连接期间消耗的能量要多得多。受预取友好或延迟容忍应用程序调度数据传输可行性的启发,本文提出了一种基于Lyapunov优化的云和移动设备之间的新型节能数据传输策略eTime。它积极地、自适应地抓住良好连接的时间来预取频繁使用的数据,同时在连接差的情况下延迟容忍延迟的数据。为了应对无线连接的随机性和不可预测性,eTime仅依靠当前状态信息来做出全局能量延迟权衡决策。我们对跟踪驱动仿真和现实世界实现的评估表明,eTime可以应用于各种流行的应用,同时实现20%-35%的节能。
{"title":"eTime: Energy-efficient transmission between cloud and mobile devices","authors":"Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, Bo Li","doi":"10.1109/INFCOM.2013.6566762","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566762","url":null,"abstract":"Mobile cloud computing, promising to extend the capabilities of resource-constrained mobile devices, is emerging as a new computing paradigm which has fostered a wide range of exciting applications. In this new paradigm, efficient data transmission between the cloud and mobile devices becomes essential. This, however, is highly unreliable and unpredictable due to several uncontrollable factors, particularly the instability and intermittency of wireless connections, fluctuation of communication bandwidth, and user mobility. Consequently, this puts a heavy burden on the energy consumption of mobile devices. Confirmed by our experiments, significantly more energy is consumed during “bad” connectivity. Inspired by the feasibility to schedule data transmissions for prefetching-friendly or delay-tolerant applications, in this paper, we present eTime, a novel Energy-efficient data Transmission strategy between cloud and Mobile dEvices, based on Lyapunov optimization. It aggressively and adaptively seizes the timing of good connectivity to prefetch frequently used data while deferring delay-tolerant data in bad connectivity. To cope with the randomness and unpredictability of wireless connectivity, eTime only relies on the current status information to make a global energy-delay tradeoff decision. Our evaluations from both trace-driven simulation and realworld implementation show that eTime can be applied to various popular applications while achieving 20%-35% energy saving.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120826967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks 低占空比无线网络中的实用同步会合
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567074
Hao Huang, Jihoon Yun, Ziguo Zhong, S. Kim, T. He
Low-duty-cycle radio operations have been proposed for wireless networks facing severe energy constraints. Despite energy savings, duty-cycling the radio creates transient-available wireless links, making communication rendezvous a challenging task under the practical issue of clock drift. To overcome limitations of prior work, this paper presents PSR, a practical design for synchronous rendezvous in low-duty-cycle wireless networks. The key idea behind PSR is to extract timing information naturally embedded in the pattern of radio duty-cycling, so that normal traffic in the network can be utilized as a “free” input for drift detection, which helps reduce (or even eliminate) the overhead of traditional time-stamp exchange with dedicated packets or bits. To prevent an overuse of such free information, leading to energy waste, an energy-driven adaptive mechanism is developed for clock calibration to balance between energy efficiency and rendezvous accuracy. PSR is evaluated with both test-bed experiments and extensive simulations, by augmenting and comparing with four different MAC protocols. Results show that PSR is practical and effective under different levels of traffic load, and can be fused with those MAC protocols to improve their energy efficiency without major change of the original designs.
低占空比无线电业务已被提出用于面临严重能量限制的无线网络。尽管节省了能源,但在时钟漂移的实际问题下,无线电的责任循环产生了瞬时可用的无线链路,使通信会合成为一项具有挑战性的任务。为了克服以往工作的局限性,本文提出了一种用于低占空比无线网络同步交会的实用设计——PSR。PSR背后的关键思想是提取自然嵌入在无线电占空比模式中的定时信息,以便网络中的正常流量可以用作漂移检测的“自由”输入,这有助于减少(甚至消除)使用专用数据包或位的传统时间戳交换的开销。为了防止这种自由信息的过度使用,导致能源浪费,开发了一种能量驱动的时钟校准机制,以平衡能源效率和交会精度。通过扩展和比较四种不同的MAC协议,通过试验台实验和广泛的模拟来评估PSR。结果表明,在不同的流量负荷下,PSR是实用有效的,可以在不改变原有设计的情况下与MAC协议融合,提高其能效。
{"title":"PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks","authors":"Hao Huang, Jihoon Yun, Ziguo Zhong, S. Kim, T. He","doi":"10.1109/INFCOM.2013.6567074","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567074","url":null,"abstract":"Low-duty-cycle radio operations have been proposed for wireless networks facing severe energy constraints. Despite energy savings, duty-cycling the radio creates transient-available wireless links, making communication rendezvous a challenging task under the practical issue of clock drift. To overcome limitations of prior work, this paper presents PSR, a practical design for synchronous rendezvous in low-duty-cycle wireless networks. The key idea behind PSR is to extract timing information naturally embedded in the pattern of radio duty-cycling, so that normal traffic in the network can be utilized as a “free” input for drift detection, which helps reduce (or even eliminate) the overhead of traditional time-stamp exchange with dedicated packets or bits. To prevent an overuse of such free information, leading to energy waste, an energy-driven adaptive mechanism is developed for clock calibration to balance between energy efficiency and rendezvous accuracy. PSR is evaluated with both test-bed experiments and extensive simulations, by augmenting and comparing with four different MAC protocols. Results show that PSR is practical and effective under different levels of traffic load, and can be fused with those MAC protocols to improve their energy efficiency without major change of the original designs.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Concurrent channel access and estimation for scalable multiuser MIMO networking 可扩展多用户MIMO网络的并发信道访问和估计
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566751
Tsung-Han Lin, H. T. Kung
This paper presents MIMO/CON, a PHY/MAC cross-layer design for multiuser MIMO wireless networks that delivers throughput scalable to many users. MIMO/CON supports concurrent channel access from uncoordinated and loosely synchronized users. This new capability allows a multi-antenna MIMO access point (AP) to fully realize its MIMO capacity gain. MIMO/CON draws insight from compressive sensing to carry out concurrent channel estimation. In the MAC layer, MIMO/CON boosts channel utilization by exploiting normal MAC layer retransmissions to recover otherwise undecodable packets in a collision. MIMO/CON has been implemented and validated on a 4×4 MIMO testbed with software-defined radios. In software simulations, MIMO/CON achieves a 210% improvement in MAC throughput over existing staggered access protocols in a 5-antenna AP scenario.
MIMO/CON是一种多用户MIMO无线网络的PHY/MAC跨层设计,可为多用户提供可扩展的吞吐量。MIMO/CON支持非协调和松散同步用户的并发通道访问。这种新功能允许多天线MIMO接入点(AP)充分实现其MIMO容量增益。MIMO/CON从压缩感知中汲取洞察力来进行并发信道估计。在MAC层,MIMO/CON通过利用正常的MAC层重传来恢复碰撞中不可解码的数据包,从而提高信道利用率。MIMO/CON已在4×4软件定义无线电MIMO测试平台上实现并验证。在软件模拟中,在5天线AP场景中,MIMO/CON比现有的交错访问协议的MAC吞吐量提高了210%。
{"title":"Concurrent channel access and estimation for scalable multiuser MIMO networking","authors":"Tsung-Han Lin, H. T. Kung","doi":"10.1109/INFCOM.2013.6566751","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566751","url":null,"abstract":"This paper presents MIMO/CON, a PHY/MAC cross-layer design for multiuser MIMO wireless networks that delivers throughput scalable to many users. MIMO/CON supports concurrent channel access from uncoordinated and loosely synchronized users. This new capability allows a multi-antenna MIMO access point (AP) to fully realize its MIMO capacity gain. MIMO/CON draws insight from compressive sensing to carry out concurrent channel estimation. In the MAC layer, MIMO/CON boosts channel utilization by exploiting normal MAC layer retransmissions to recover otherwise undecodable packets in a collision. MIMO/CON has been implemented and validated on a 4×4 MIMO testbed with software-defined radios. In software simulations, MIMO/CON achieves a 210% improvement in MAC throughput over existing staggered access protocols in a 5-antenna AP scenario.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
WiFi-BA: Choosing arbitration over backoff in high speed multicarrier wireless networks wi - fi - ba:在高速多载波无线网络中选择仲裁
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566931
Pei Huang, Xi Yang, Li Xiao
Advancements in wireless communication techniques have increased the wireless physical layer (PHY) data rates by hundreds of times in a dozen years. The high PHY data rates, however, have not been translated to commensurate throughput gains due to overheads incurred by medium access control (MAC) and PHY convergence procedure. At high PHY data rates, the time used for collision avoidance (CA) at MAC layer and the time used for PHY convergence procedure can easily exceed the time used for transmission of an actual data frame. Recent work intends to reduce the CA overhead by reducing the backoff time slot size. However, the method introduces more collisions in presence of hidden terminals because the tiny backoff slots can no longer de-synchronize hidden terminals, leading to persistent collisions among hidden terminals. As collision detection (CD) in wireless communication became feasible recently, some protocols migrate random backoff from the time domain to the frequency domain, but they fail to address the introduced high collision probability. We investigate the practical issues of CD in the frequency domain and introduce a binary mapping scheme to reduce the collision probability. Based on the binary mapping, a bitwise arbitration (BA) mechanism is devised to grant only one transmitter the permission to initiate data transmission in a contention. With the low collision probability achieved in a short bounded arbitration phase, the throughput is significantly improved by our proposed WiFi-BA. Because collisions are unlikely to happen, unfairness caused by capture effect of radios is also reduced. The bitwise arbitration mechanism can further be set to let high priority messages get through unimpeded, making WiFi-BA suitable for real time prioritized communication. We validate the effectiveness of WiFi-BA through implementation on FPGA of USRP E110. Performance evaluation demonstrates that WiFi-BA is more efficient than current Wi-Fi solutions.
无线通信技术的进步使无线物理层(PHY)数据速率在十几年内提高了数百倍。然而,由于介质访问控制(MAC)和PHY收敛过程产生的开销,高PHY数据速率并没有转化为相应的吞吐量增益。在高PHY数据速率下,用于MAC层避免碰撞(CA)的时间和用于PHY收敛过程的时间很容易超过用于传输实际数据帧的时间。最近的工作旨在通过减小回退时隙大小来减少CA开销。然而,该方法在隐藏终端存在的情况下引入了更多的冲突,因为微小的回退槽不能再去同步隐藏终端,导致隐藏终端之间的持续冲突。随着无线通信中碰撞检测(CD)的实现,一些协议将随机退离从时域迁移到频域,但无法解决所引入的高碰撞概率问题。我们在频域研究了CD的实际问题,并引入了一种二值映射方案来降低碰撞概率。基于二进制映射,设计了位仲裁(bit - wise arbitration, BA)机制,在争用中只授予一个发送方发起数据传输的权限。由于在较短的有界仲裁阶段实现了较低的碰撞概率,因此我们提出的WiFi-BA显著提高了吞吐量。由于不太可能发生碰撞,无线电捕获效应引起的不公平也减少了。可以进一步设置比特仲裁机制,让高优先级的消息畅通无阻地通过,使WiFi-BA适合实时优先级通信。通过在USRP E110 FPGA上的实现,验证了WiFi-BA的有效性。性能评估表明,Wi-Fi - ba比目前的Wi-Fi解决方案更高效。
{"title":"WiFi-BA: Choosing arbitration over backoff in high speed multicarrier wireless networks","authors":"Pei Huang, Xi Yang, Li Xiao","doi":"10.1109/INFCOM.2013.6566931","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566931","url":null,"abstract":"Advancements in wireless communication techniques have increased the wireless physical layer (PHY) data rates by hundreds of times in a dozen years. The high PHY data rates, however, have not been translated to commensurate throughput gains due to overheads incurred by medium access control (MAC) and PHY convergence procedure. At high PHY data rates, the time used for collision avoidance (CA) at MAC layer and the time used for PHY convergence procedure can easily exceed the time used for transmission of an actual data frame. Recent work intends to reduce the CA overhead by reducing the backoff time slot size. However, the method introduces more collisions in presence of hidden terminals because the tiny backoff slots can no longer de-synchronize hidden terminals, leading to persistent collisions among hidden terminals. As collision detection (CD) in wireless communication became feasible recently, some protocols migrate random backoff from the time domain to the frequency domain, but they fail to address the introduced high collision probability. We investigate the practical issues of CD in the frequency domain and introduce a binary mapping scheme to reduce the collision probability. Based on the binary mapping, a bitwise arbitration (BA) mechanism is devised to grant only one transmitter the permission to initiate data transmission in a contention. With the low collision probability achieved in a short bounded arbitration phase, the throughput is significantly improved by our proposed WiFi-BA. Because collisions are unlikely to happen, unfairness caused by capture effect of radios is also reduced. The bitwise arbitration mechanism can further be set to let high priority messages get through unimpeded, making WiFi-BA suitable for real time prioritized communication. We validate the effectiveness of WiFi-BA through implementation on FPGA of USRP E110. Performance evaluation demonstrates that WiFi-BA is more efficient than current Wi-Fi solutions.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Fault tolerant complex event detection in WSNs: A case study in structural health monitoring 基于WSNs的复杂事件容错检测:以结构健康监测为例
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566932
Xuefeng Liu, Jiannong Cao, Shaojie Tang, Peng Guo
Reliably detecting event in the presence of faulty nodes, particularly nodes with faulty readings is a fundamental task in wireless sensor networks (WSNs). Existing fault-tolerant event detection schemes usually 'mask' the effect of faulty readings through high-level fusion techniques. However, in some applications such as structural health monitoring (SHM) and volcano monitoring, detecting the events of interest requires lowlevel data collaboration from multiple sensors. This implies that the effect of faulty readings cannot be masked once they are involved into event detection. Nodes with faulty readings must be firstly detected and removed from the system. Unfortunately, most existing techniques to detect faulty nodes can only take boolean or scalar data as input while in these applications, data generated from each sensor is a sequence of dynamic data. In this paper, we address these issues using an example of SHM. Detecting event in SHM (i.e. structural damage) requires low level collaboration from multiple sensors, and each sensor generates a sequence of dynamic vibrational data. We proposed a fault-tolerant event detection scheme in SHM called FTED. In FTED, three novel techniques are proposed: (1) distributed extraction of features for faulty node detection, (2) iterative faulty node detection (I-FUND), and (3) distributed event detection. In particular, I-FUND takes vector as input and can even handle the 'element mismatch problem' where comparable elements in vectors are located at unknown different positions. The effectiveness of FTED is demonstrated through both simulations and real experiments.
在存在故障节点的情况下,可靠地检测事件是无线传感器网络(wsn)的一项基本任务,特别是具有错误读数的节点。现有的容错事件检测方案通常通过高级融合技术“掩盖”错误读数的影响。然而,在结构健康监测(SHM)和火山监测等一些应用中,检测感兴趣的事件需要来自多个传感器的低级数据协作。这意味着错误读数的影响一旦涉及到事件检测就不能被掩盖。必须首先检测出读数错误的节点,并将其从系统中移除。不幸的是,大多数现有的检测故障节点的技术只能将布尔或标量数据作为输入,而在这些应用中,从每个传感器生成的数据是一个动态数据序列。在本文中,我们使用SHM的一个示例来解决这些问题。在SHM中检测事件(即结构损伤)需要多个传感器的低水平协作,每个传感器产生一系列动态振动数据。我们在SHM中提出了一种称为FTED的容错事件检测方案。在FTED中,提出了三种新技术:(1)故障节点检测的分布式特征提取,(2)迭代故障节点检测(I-FUND)和(3)分布式事件检测。特别是,I-FUND以向量为输入,甚至可以处理“元素不匹配问题”,即向量中的可比元素位于未知的不同位置。仿真和实际实验验证了FTED的有效性。
{"title":"Fault tolerant complex event detection in WSNs: A case study in structural health monitoring","authors":"Xuefeng Liu, Jiannong Cao, Shaojie Tang, Peng Guo","doi":"10.1109/INFCOM.2013.6566932","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566932","url":null,"abstract":"Reliably detecting event in the presence of faulty nodes, particularly nodes with faulty readings is a fundamental task in wireless sensor networks (WSNs). Existing fault-tolerant event detection schemes usually 'mask' the effect of faulty readings through high-level fusion techniques. However, in some applications such as structural health monitoring (SHM) and volcano monitoring, detecting the events of interest requires lowlevel data collaboration from multiple sensors. This implies that the effect of faulty readings cannot be masked once they are involved into event detection. Nodes with faulty readings must be firstly detected and removed from the system. Unfortunately, most existing techniques to detect faulty nodes can only take boolean or scalar data as input while in these applications, data generated from each sensor is a sequence of dynamic data. In this paper, we address these issues using an example of SHM. Detecting event in SHM (i.e. structural damage) requires low level collaboration from multiple sensors, and each sensor generates a sequence of dynamic vibrational data. We proposed a fault-tolerant event detection scheme in SHM called FTED. In FTED, three novel techniques are proposed: (1) distributed extraction of features for faulty node detection, (2) iterative faulty node detection (I-FUND), and (3) distributed event detection. In particular, I-FUND takes vector as input and can even handle the 'element mismatch problem' where comparable elements in vectors are located at unknown different positions. The effectiveness of FTED is demonstrated through both simulations and real experiments.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123576321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Toward composable network traffic measurement 迈向可组合的网络流量测量
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566737
A. D. Pietro, Felipe Huici, Nicola Bonelli, B. Trammell, Petr Kastovsky, Tristan Groléat, Sandrine Vaton, M. Dusi
As the growth of Internet traffic volume and diversity continues, passive monitoring and data analysis, crucial to the correct operation of networks and the systems that rely on them, has become an increasingly difficult task. We present the design and implementation of Blockmon, a flexible, high performance system for network monitoring and analysis. We present experimental results demonstrating Blockmon's performance, running simple analyses at 10Gb/s line rate on commodity hardware; and compare its performance with that of existing programmable measurement systems, showing significant improvement (as much as twice as fast) especially for small packet sizes. We further demonstrate Blockmon's applicability to measurement and data analysis by implementing and evaluating three sample applications: a flow meter, a TCP SYN flood detector, and a VoIP anomaly-detection system.
随着互联网流量的增长和多样性的持续,被动监测和数据分析已经成为一项越来越困难的任务,对于网络和依赖于它们的系统的正确运行至关重要。我们介绍了Blockmon的设计和实现,这是一个灵活,高性能的网络监控和分析系统。我们展示了Blockmon性能的实验结果,在商用硬件上以10Gb/s的线路速率运行简单分析;并将其性能与现有的可编程测量系统进行比较,显示出显着的改进(速度提高了两倍),特别是对于小数据包大小。通过实施和评估三个示例应用程序,我们进一步展示了Blockmon在测量和数据分析方面的适用性:流量计,TCP SYN洪水检测器和VoIP异常检测系统。
{"title":"Toward composable network traffic measurement","authors":"A. D. Pietro, Felipe Huici, Nicola Bonelli, B. Trammell, Petr Kastovsky, Tristan Groléat, Sandrine Vaton, M. Dusi","doi":"10.1109/INFCOM.2013.6566737","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566737","url":null,"abstract":"As the growth of Internet traffic volume and diversity continues, passive monitoring and data analysis, crucial to the correct operation of networks and the systems that rely on them, has become an increasingly difficult task. We present the design and implementation of Blockmon, a flexible, high performance system for network monitoring and analysis. We present experimental results demonstrating Blockmon's performance, running simple analyses at 10Gb/s line rate on commodity hardware; and compare its performance with that of existing programmable measurement systems, showing significant improvement (as much as twice as fast) especially for small packet sizes. We further demonstrate Blockmon's applicability to measurement and data analysis by implementing and evaluating three sample applications: a flow meter, a TCP SYN flood detector, and a VoIP anomaly-detection system.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PPBD: A piracy preventing system for BT DHT networks PPBD: BT DHT网络防盗版系统
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566979
Hongli Zhang, Jiantao Shi, Lin Ye, Xiaojiang Du
In this paper, we study several important issues that can be used to prevent pirated content propagation in BitTorrent (BT) Distributed Hash-Tables (DHT) networks. We design a system called PPBD to stop pirated content propagation by utilizing several attacking methods. First, the system can efficiently deal with massive concurrent connections to reduce bandwidth consumption, schedule peers to cooperate and optimize the protection methods according to clients. Second, we construct two mathematical models for BT DHT attacks, and we theoretically analyze the system performance. Third, we take into account some countermeasures of different BT clients and make corresponding optimizations of our PPBD system. Our realworld experiments show that: (1) our system can extend the download duration at least three times by the fake-block attacking method and it is more effective in a small swarm; (2) DHT index poison and routing pollution methods can limit the sharing swarm to a small swarm.
本文研究了在BitTorrent (BT)分布式哈希表(DHT)网络中防止盗版内容传播的几个重要问题。我们设计了一个名为PPBD的系统,利用几种攻击方法来阻止盗版内容的传播。首先,系统可以有效处理大量并发连接,减少带宽消耗,调度对等体进行协作,并根据客户端优化保护方法。其次,建立了BT DHT攻击的两个数学模型,并对系统性能进行了理论分析。第三,结合不同BT客户的一些对策,对我们的PPBD系统进行相应的优化。我们的实际实验表明:(1)我们的系统通过假阻断攻击方法可以将下载持续时间延长至少3倍,并且在小集群中更有效;(2) DHT指数毒害和路由污染方法可以将共享群体限制在一个小群体内。
{"title":"PPBD: A piracy preventing system for BT DHT networks","authors":"Hongli Zhang, Jiantao Shi, Lin Ye, Xiaojiang Du","doi":"10.1109/INFCOM.2013.6566979","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566979","url":null,"abstract":"In this paper, we study several important issues that can be used to prevent pirated content propagation in BitTorrent (BT) Distributed Hash-Tables (DHT) networks. We design a system called PPBD to stop pirated content propagation by utilizing several attacking methods. First, the system can efficiently deal with massive concurrent connections to reduce bandwidth consumption, schedule peers to cooperate and optimize the protection methods according to clients. Second, we construct two mathematical models for BT DHT attacks, and we theoretically analyze the system performance. Third, we take into account some countermeasures of different BT clients and make corresponding optimizations of our PPBD system. Our realworld experiments show that: (1) our system can extend the download duration at least three times by the fake-block attacking method and it is more effective in a small swarm; (2) DHT index poison and routing pollution methods can limit the sharing swarm to a small swarm.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125547445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1