首页 > 最新文献

2013 Proceedings IEEE INFOCOM最新文献

英文 中文
FREDI: Robust RSS-based ranging with multipath effect and radio interference FREDI:具有多径效应和无线电干扰的基于rss的鲁棒测距
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566824
Yu Zhao, Yunhuai Liu, T. He, A. Vasilakos, Chuanping Hu
Radio Signal Strength (RSS) based ranging is attractive by the low cost and easy deployment. In real environments, its accuracy is severely affected by the multipath effect and the external radio interference. The well-known fingerprint approaches can deal with the issues but introduce too much overhead in dynamic environments. In this paper, we attempt to address the issue along a completely different direction. We propose a new ranging framework called Fredi that exploits the frequency diversity to overcome the multi-path effect solely based on RSS measurements. We design a Discrete Fourier Transformation based algorithm and prove that it has the optimal solution under ideal cases. We further revise the algorithm to be robust to the measurement noises in practice. We implement Fredi on top of the USRP-2 platform and conduct extensive real environments in indoor environments. Experimental results show the superiority performance compared with the traditional methods.
基于无线电信号强度(RSS)的测距技术具有成本低、部署方便等优点。在实际环境中,其精度受到多径效应和外界无线电干扰的严重影响。众所周知的指纹方法可以处理这些问题,但在动态环境中引入了过多的开销。在本文中,我们试图从一个完全不同的方向来解决这个问题。我们提出了一种新的测距框架,称为Fredi,它利用频率分集来克服仅基于RSS测量的多径效应。设计了一种基于离散傅里叶变换的算法,并证明了该算法在理想情况下具有最优解。在实践中,我们进一步改进了算法,使其对测量噪声具有鲁棒性。我们在USRP-2平台上实现了Fredi,并在室内环境中进行了广泛的真实环境。实验结果表明,与传统方法相比,该方法性能优越。
{"title":"FREDI: Robust RSS-based ranging with multipath effect and radio interference","authors":"Yu Zhao, Yunhuai Liu, T. He, A. Vasilakos, Chuanping Hu","doi":"10.1109/INFCOM.2013.6566824","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566824","url":null,"abstract":"Radio Signal Strength (RSS) based ranging is attractive by the low cost and easy deployment. In real environments, its accuracy is severely affected by the multipath effect and the external radio interference. The well-known fingerprint approaches can deal with the issues but introduce too much overhead in dynamic environments. In this paper, we attempt to address the issue along a completely different direction. We propose a new ranging framework called Fredi that exploits the frequency diversity to overcome the multi-path effect solely based on RSS measurements. We design a Discrete Fourier Transformation based algorithm and prove that it has the optimal solution under ideal cases. We further revise the algorithm to be robust to the measurement noises in practice. We implement Fredi on top of the USRP-2 platform and conduct extensive real environments in indoor environments. Experimental results show the superiority performance compared with the traditional methods.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122569801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Finding critical regions in a network 查找网络中的关键区域
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567167
S. Trajanovski, F. Kuipers, P. Mieghem
It is important that our vital networks (e.g., infrastructures) are robust to more than single-link failures. Failures might for instance affect a part of the network that resides in a certain geographical region. In this paper, considering networks embedded in a two-dimensional plane, we study the problem of finding a critical region - that is, a part of the network that can be enclosed by a given elementary figure (a circle, ellipse, rectangle, square, or equilateral triangle) with a predetermined size - whose removal would lead to the highest network disruption. We determine that there is a polynomial number of non-trivial positions for such a figure that need to be considered and, subsequently, we propose a polynomial-time algorithm for the problem. Simulations on realistic networks illustrate that different figures with equal area result in different critical regions in a network.
重要的是,我们的关键网络(例如,基础设施)对于单链路故障以外的故障是健壮的。例如,故障可能会影响位于某个地理区域的网络的一部分。在本文中,考虑嵌入在二维平面上的网络,我们研究了寻找一个临界区域的问题,即网络的一部分,它可以被给定的初等图形(圆、椭圆、矩形、正方形或等边三角形)包围,具有预定的大小,它的移除将导致最高的网络中断。我们确定有一个多项式数目的非平凡的位置对于这样的图形需要考虑,随后,我们提出了一个多项式时间算法的问题。对实际网络的仿真表明,不同的等面积图形会导致网络中不同的关键区域。
{"title":"Finding critical regions in a network","authors":"S. Trajanovski, F. Kuipers, P. Mieghem","doi":"10.1109/INFCOM.2013.6567167","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567167","url":null,"abstract":"It is important that our vital networks (e.g., infrastructures) are robust to more than single-link failures. Failures might for instance affect a part of the network that resides in a certain geographical region. In this paper, considering networks embedded in a two-dimensional plane, we study the problem of finding a critical region - that is, a part of the network that can be enclosed by a given elementary figure (a circle, ellipse, rectangle, square, or equilateral triangle) with a predetermined size - whose removal would lead to the highest network disruption. We determine that there is a polynomial number of non-trivial positions for such a figure that need to be considered and, subsequently, we propose a polynomial-time algorithm for the problem. Simulations on realistic networks illustrate that different figures with equal area result in different critical regions in a network.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A traceback attack on Freenet 对Freenet的回溯攻击
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566978
Guanyu Tian, Z. Duan, Todd Baumeister, Yingfei Dong
Freenet is a popular peer to peer anonymous network, with the objective to provide the anonymity of both content publishers and retrievers. Despite more than a decade of active development and deployment and the adoption of well-established cryptographic algorithms in Freenet, it remains unanswered how well the anonymity objective of the initial Freenet design has been met. In this paper we develop a traceback attack on Freenet, and show that the originating machine of a content request message in Freenet can be identified; that is, the anonymity of a content retriever can be broken, even if a single request message has been issued by the retriever. We present the design of the traceback attack, and perform Emulab-based experiments to confirm the feasibility and effectiveness of the attack. With randomly chosen content requesters (and random contents stored in the Freenet testbed), the experiments show that, for 24% to 43% of the content request messages, we can identify their originating machines. We also briefly discuss potential solutions to address the developed traceback attack. Despite being developed specifically on Freenet, the basic principles of the traceback attack and solutions have important security implications for similar anonymous content sharing systems.
Freenet是一个流行的点对点匿名网络,其目标是为内容发布者和检索者提供匿名性。尽管在Freenet中进行了十多年的积极开发和部署,并采用了完善的加密算法,但仍然没有回答最初Freenet设计的匿名目标是否得到了很好的满足。本文提出了一种针对Freenet的回溯攻击方法,并证明了可以识别Freenet中内容请求消息的发起机器;也就是说,可以破坏内容检索器的匿名性,即使检索器发出了单个请求消息。提出了回溯攻击的设计方案,并进行了仿真实验,验证了该攻击的可行性和有效性。对于随机选择的内容请求者(以及存储在Freenet测试平台中的随机内容),实验表明,对于24%到43%的内容请求消息,我们可以识别它们的原始机器。我们还简要讨论了解决已开发的回溯攻击的潜在解决方案。尽管是专门针对Freenet开发的,但回溯攻击的基本原理和解决方案对类似的匿名内容共享系统具有重要的安全含义。
{"title":"A traceback attack on Freenet","authors":"Guanyu Tian, Z. Duan, Todd Baumeister, Yingfei Dong","doi":"10.1109/INFCOM.2013.6566978","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566978","url":null,"abstract":"Freenet is a popular peer to peer anonymous network, with the objective to provide the anonymity of both content publishers and retrievers. Despite more than a decade of active development and deployment and the adoption of well-established cryptographic algorithms in Freenet, it remains unanswered how well the anonymity objective of the initial Freenet design has been met. In this paper we develop a traceback attack on Freenet, and show that the originating machine of a content request message in Freenet can be identified; that is, the anonymity of a content retriever can be broken, even if a single request message has been issued by the retriever. We present the design of the traceback attack, and perform Emulab-based experiments to confirm the feasibility and effectiveness of the attack. With randomly chosen content requesters (and random contents stored in the Freenet testbed), the experiments show that, for 24% to 43% of the content request messages, we can identify their originating machines. We also briefly discuss potential solutions to address the developed traceback attack. Despite being developed specifically on Freenet, the basic principles of the traceback attack and solutions have important security implications for similar anonymous content sharing systems.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114297953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Practical algorithm for power efficient DRX configuration in next generation mobiles 实用的算法,为节能DRX配置在下一代手机
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566901
R. Karthik, A. Chakrapani
In this paper, we consider wireless communication systems where user equipments (UEs) monitor packet-data traffic characteristics and adopt Discontinuous Reception (DRX) to conserve battery power. With DRX, the receiver circuitry is configured to toggle between on (active) and off (inactive) states for specified durations, depending on the packet arrival process. Arriving at an appropriate DRX configuration remains a challenging research issue, especially when multiple applications generate traffic. Our objective in this work is to provide a practical mechanism for selecting a suitable DRX configuration. First, we derive an analytical expression for the expected maximum time (delay) required for a packet arriving during the offduration to be serviced for any arrival process. Second, we obtain an estimate for the on-duration, Ton* for which the expected delay is below a certain threshold. Using Ton*, we compute the active duration, Tactive in each DRX cycle by considering the timers specified in 3rd Generation Partnership Project (3GPP) Release 10 and for a given interarrival time distribution between packets. Finally, using our analysis, we propose a pragmatic algorithm and show how to select an appropriate DRX configuration which will lead to high power efficiency with acceptable buffer requirements. Through extensive analysis and simulations both with general arrival processes and real-time traces, we show that our algorithm can lead to significant extension in battery life at the UE.
在本文中,我们考虑无线通信系统,其中用户设备(ue)监控分组数据流量特性并采用不连续接收(DRX)来节省电池电量。使用DRX,接收器电路被配置为在指定的持续时间内在开(活动)和关(非活动)状态之间切换,这取决于数据包的到达过程。获得适当的DRX配置仍然是一个具有挑战性的研究问题,特别是当多个应用程序产生流量时。我们在这项工作中的目标是为选择合适的DRX配置提供一种实用的机制。首先,我们导出了在任何到达过程中,在offduration期间到达的数据包所需的预期最大时间(延迟)的解析表达式。其次,我们获得了预期延迟低于某一阈值的on-duration Ton*的估计。使用Ton*,我们通过考虑第三代合作伙伴计划(3GPP)第10版中指定的计时器和数据包之间给定的到达间隔时间分布,计算每个DRX周期中的活动持续时间,Tactive。最后,通过我们的分析,我们提出了一个实用的算法,并展示了如何选择一个合适的DRX配置,这将导致高功率效率和可接受的缓冲需求。通过对一般到达过程和实时跟踪的广泛分析和模拟,我们表明我们的算法可以显著延长UE的电池寿命。
{"title":"Practical algorithm for power efficient DRX configuration in next generation mobiles","authors":"R. Karthik, A. Chakrapani","doi":"10.1109/INFCOM.2013.6566901","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566901","url":null,"abstract":"In this paper, we consider wireless communication systems where user equipments (UEs) monitor packet-data traffic characteristics and adopt Discontinuous Reception (DRX) to conserve battery power. With DRX, the receiver circuitry is configured to toggle between on (active) and off (inactive) states for specified durations, depending on the packet arrival process. Arriving at an appropriate DRX configuration remains a challenging research issue, especially when multiple applications generate traffic. Our objective in this work is to provide a practical mechanism for selecting a suitable DRX configuration. First, we derive an analytical expression for the expected maximum time (delay) required for a packet arriving during the offduration to be serviced for any arrival process. Second, we obtain an estimate for the on-duration, Ton* for which the expected delay is below a certain threshold. Using Ton*, we compute the active duration, Tactive in each DRX cycle by considering the timers specified in 3rd Generation Partnership Project (3GPP) Release 10 and for a given interarrival time distribution between packets. Finally, using our analysis, we propose a pragmatic algorithm and show how to select an appropriate DRX configuration which will lead to high power efficiency with acceptable buffer requirements. Through extensive analysis and simulations both with general arrival processes and real-time traces, we show that our algorithm can lead to significant extension in battery life at the UE.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Secure crowdsourcing-based cooperative pectrum sensing 安全的基于众包的协同频谱感知
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567059
Rui Zhang, Jinxue Zhang, Yanchao Zhang, Chi Zhang
Cooperative (spectrum) sensing is a key function for dynamic spectrum access and is essential for avoiding interference with licensed primary users and identifying spectrum holes. A promising approach for effective cooperative sensing over a large geographic region is to rely on special spectrum-sensing providers (SSPs), which outsource spectrum-sensing tasks to distributed mobile users. Its feasibility is deeply rooted in the ubiquitous penetration of mobile devices into everyday life. Crowdsourcing-based cooperative spectrum sensing is, however, vulnerable to malicious sensing data injection attack, in which a malicious CR users submit false sensing reports containing power measurements much larger (or smaller) than the true value to inflate (or deflate) the final average, in which case the SSP may falsely determine that the channel is busy (or vacant). In this paper, we propose a novel scheme to enable secure crowdsourcing-based cooperative spectrum sensing by jointly considering the instantaneous trustworthiness of mobile detectors in combination with their reputation scores during data fusion. Our scheme can enable robust cooperative sensing even if the malicious CR users are the majority. The efficacy and efficiency of our scheme have been confirmed by extensive simulation studies.
协同(频谱)感知是动态频谱接入的关键功能,对于避免对授权主用户的干扰和识别频谱漏洞至关重要。利用特殊频谱感知提供商(ssp)将频谱感知任务外包给分布的移动用户是实现大地理区域有效协同感知的一种很有前景的方法。它的可行性深深植根于移动设备对日常生活的无处不在的渗透。然而,基于众包的协同频谱感知容易受到恶意感知数据注入攻击,在这种攻击中,恶意CR用户提交虚假的感知报告,其中包含比真实值大(或小)得多的功率测量值,以膨胀(或缩小)最终平均值,在这种情况下,SSP可能错误地确定信道是忙(或空)。在本文中,我们提出了一种新的方案,通过联合考虑移动探测器在数据融合过程中的瞬时可信度及其声誉分数,实现基于众包的安全协同频谱感知。即使恶意CR用户占多数,我们的方案也能实现鲁棒的协同感知。大量的仿真研究证实了该方案的有效性和高效性。
{"title":"Secure crowdsourcing-based cooperative pectrum sensing","authors":"Rui Zhang, Jinxue Zhang, Yanchao Zhang, Chi Zhang","doi":"10.1109/INFCOM.2013.6567059","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567059","url":null,"abstract":"Cooperative (spectrum) sensing is a key function for dynamic spectrum access and is essential for avoiding interference with licensed primary users and identifying spectrum holes. A promising approach for effective cooperative sensing over a large geographic region is to rely on special spectrum-sensing providers (SSPs), which outsource spectrum-sensing tasks to distributed mobile users. Its feasibility is deeply rooted in the ubiquitous penetration of mobile devices into everyday life. Crowdsourcing-based cooperative spectrum sensing is, however, vulnerable to malicious sensing data injection attack, in which a malicious CR users submit false sensing reports containing power measurements much larger (or smaller) than the true value to inflate (or deflate) the final average, in which case the SSP may falsely determine that the channel is busy (or vacant). In this paper, we propose a novel scheme to enable secure crowdsourcing-based cooperative spectrum sensing by jointly considering the instantaneous trustworthiness of mobile detectors in combination with their reputation scores during data fusion. Our scheme can enable robust cooperative sensing even if the malicious CR users are the majority. The efficacy and efficiency of our scheme have been confirmed by extensive simulation studies.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A trie merging approach with incremental updates for virtual routers 一种带增量更新的虚拟路由器尝试合并方法
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566914
Layong Luo, Gaogang Xie, Kave Salamatian, S. Uhlig, L. Mathy, Yingke Xie
Virtual routers are increasingly being studied, as an important building block to enable network virtualization. In a virtual router platform, multiple virtual router instances coexist, each having its own FIB (Forwarding Information Base). In this context, memory scalability and route updates are two major challenges. Existing approaches addressed one of these challenges but not both. In this paper, we present a trie merging approach, which compactly represents multiple FIBs by a merged trie and a table of next-hop-pointer arrays to achieve good memory scalability, while supporting fast incremental updates by avoiding the use of leaf pushing during merging. Experimental results show that storing the merged trie requires limited memory space, e.g., we only need 10MB memory space to store the merged trie for 14 full FIBs from IPv4 core routers, achieving a memory reduction by 87% when compared to the total size of the individual tries. We implement our approach in an SRAM (Static Random Access Memory)-based lookup pipeline. Using our approach, an on-chip SRAM-based lookup pipeline with 5 external stages is sufficient to store the 14 full IPv4 FIBs. Furthermore, our approach can guarantee a minimum update overhead of one write bubble per update, as well as a high lookup throughput of one lookup per clock cycle, which corresponds to a throughput of 251 million lookups per second in the implementation.
虚拟路由器作为实现网络虚拟化的重要组成部分,正受到越来越多的研究。在一个虚拟路由器平台中,多个虚拟路由器实例共存,每个实例都有自己的FIB (Forwarding Information Base)。在这种情况下,内存可伸缩性和路由更新是两个主要挑战。现有的方法解决了其中一个挑战,但不能同时解决这两个挑战。在本文中,我们提出了一种三树合并方法,该方法通过合并的三树和下一跳指针数组表紧凑地表示多个fib,以实现良好的内存可伸缩性,同时通过避免在合并过程中使用叶推来支持快速增量更新。实验结果表明,存储合并树需要有限的内存空间,例如,我们只需要10MB的内存空间来存储来自IPv4核心路由器的14个完整FIBs的合并树,与单个尝试的总大小相比,实现了87%的内存减少。我们在基于SRAM(静态随机存取存储器)的查找管道中实现我们的方法。使用我们的方法,带有5个外部阶段的基于sram的片上查找管道足以存储14个完整的IPv4 fib。此外,我们的方法可以保证每次更新一个写泡的最小更新开销,以及每个时钟周期一次查找的高查找吞吐量,这相当于实现中每秒2.51亿次查找的吞吐量。
{"title":"A trie merging approach with incremental updates for virtual routers","authors":"Layong Luo, Gaogang Xie, Kave Salamatian, S. Uhlig, L. Mathy, Yingke Xie","doi":"10.1109/INFCOM.2013.6566914","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566914","url":null,"abstract":"Virtual routers are increasingly being studied, as an important building block to enable network virtualization. In a virtual router platform, multiple virtual router instances coexist, each having its own FIB (Forwarding Information Base). In this context, memory scalability and route updates are two major challenges. Existing approaches addressed one of these challenges but not both. In this paper, we present a trie merging approach, which compactly represents multiple FIBs by a merged trie and a table of next-hop-pointer arrays to achieve good memory scalability, while supporting fast incremental updates by avoiding the use of leaf pushing during merging. Experimental results show that storing the merged trie requires limited memory space, e.g., we only need 10MB memory space to store the merged trie for 14 full FIBs from IPv4 core routers, achieving a memory reduction by 87% when compared to the total size of the individual tries. We implement our approach in an SRAM (Static Random Access Memory)-based lookup pipeline. Using our approach, an on-chip SRAM-based lookup pipeline with 5 external stages is sufficient to store the 14 full IPv4 FIBs. Furthermore, our approach can guarantee a minimum update overhead of one write bubble per update, as well as a high lookup throughput of one lookup per clock cycle, which corresponds to a throughput of 251 million lookups per second in the implementation.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Elderberry: A peer-to-peer, privacy-aware smart metering protocol 接骨木莓:一种点对点、隐私敏感的智能计量协议
Pub Date : 2013-04-14 DOI: 10.1109/INFCOMW.2013.6562905
Sören Finster, I. Baumgart
The deployment of smart metering provides an immense amount of data for power grid operators and energy providers. By using this data, a more efficient and flexible power grid can be realized. However, this data also raises privacy concerns since it contains very sensitive information about customers. In this paper, we present Elderberry, a peer-to-peer protocol that enables near real-time smart metering while preserving the customer's privacy. By forming small groups of cooperating smart meters, their consumption traces are anonymized before being aggregated and sent to the grid operator. Through aggregation, Elderberry realizes efficient monitoring of large numbers of smart meters. It reaches this goal without computationally complex cryptography and adds only little communication overhead.
智能电表的部署为电网运营商和能源供应商提供了大量的数据。利用这些数据,可以实现更高效、更灵活的电网。然而,这些数据也引起了隐私问题,因为它包含了关于客户的非常敏感的信息。在本文中,我们介绍了Elderberry,这是一种点对点协议,可以在保护客户隐私的同时实现近乎实时的智能计量。通过组成协作的智能电表小组,它们的消费轨迹在汇总并发送给电网运营商之前是匿名的。通过聚合,Elderberry实现了对大量智能电表的高效监控。它不需要复杂的计算加密就能达到这个目标,并且只增加了很少的通信开销。
{"title":"Elderberry: A peer-to-peer, privacy-aware smart metering protocol","authors":"Sören Finster, I. Baumgart","doi":"10.1109/INFCOMW.2013.6562905","DOIUrl":"https://doi.org/10.1109/INFCOMW.2013.6562905","url":null,"abstract":"The deployment of smart metering provides an immense amount of data for power grid operators and energy providers. By using this data, a more efficient and flexible power grid can be realized. However, this data also raises privacy concerns since it contains very sensitive information about customers. In this paper, we present Elderberry, a peer-to-peer protocol that enables near real-time smart metering while preserving the customer's privacy. By forming small groups of cooperating smart meters, their consumption traces are anonymized before being aggregated and sent to the grid operator. Through aggregation, Elderberry realizes efficient monitoring of large numbers of smart meters. It reaches this goal without computationally complex cryptography and adds only little communication overhead.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RSS-Ratio for enhancing performance of RSS-based applications RSS-Ratio用于增强基于rss的应用程序的性能
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567120
Wei Cheng, K. Tan, Victor Omwando, Jindan Zhu, P. Mohapatra
RSS (Received Signal Strength) has been widely utilized in wireless applications. It is, however, susceptible to environmental unknowns from both temporal and spatial domains. As a result, the fluctuation of RSS may degrade performance of RSS based applications. In this work, we propose a novel RSS processing method at the receiver for three antenna based systems. The output of our approach is `RSS-Ratio', which eliminates the environmental unknowns and thus is a more stable variable compared to RSS itself. To validate the efficacy of the proposed method, we conduct a series of experiments in a range of wireless scenarios, including indoor laptop based measurement, indoor software defined radio - WARP based measurement, and outdoor wireless measurement. In addition, we also give an analysis to the relationship between the location of transmitter and the value of RSS-Ratio, and examine the accuracy of the estimated RSS-Ratio value via both simulations and experiments. All the experimental, analytical, and simulated results demonstrate that RSS-Ratio will be a better replacement for RSS to improve the performance of RSS based applications.
RSS(接收信号强度)在无线应用中得到了广泛的应用。然而,它容易受到来自时间和空间领域的未知环境的影响。因此,RSS的波动可能会降低基于RSS的应用程序的性能。在这项工作中,我们提出了一种新的基于三天线系统的接收机RSS处理方法。我们方法的输出是“RSS- ratio”,它消除了环境的未知因素,因此与RSS本身相比,它是一个更稳定的变量。为了验证所提出方法的有效性,我们在一系列无线场景下进行了一系列实验,包括基于室内笔记本电脑的测量,基于室内软件定义无线电- WARP的测量和室外无线测量。此外,我们还分析了发射机位置与RSS-Ratio值之间的关系,并通过仿真和实验检验了估计的RSS-Ratio值的准确性。所有的实验、分析和仿真结果都表明,RSS- ratio将是RSS的更好替代品,以提高基于RSS的应用程序的性能。
{"title":"RSS-Ratio for enhancing performance of RSS-based applications","authors":"Wei Cheng, K. Tan, Victor Omwando, Jindan Zhu, P. Mohapatra","doi":"10.1109/INFCOM.2013.6567120","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567120","url":null,"abstract":"RSS (Received Signal Strength) has been widely utilized in wireless applications. It is, however, susceptible to environmental unknowns from both temporal and spatial domains. As a result, the fluctuation of RSS may degrade performance of RSS based applications. In this work, we propose a novel RSS processing method at the receiver for three antenna based systems. The output of our approach is `RSS-Ratio', which eliminates the environmental unknowns and thus is a more stable variable compared to RSS itself. To validate the efficacy of the proposed method, we conduct a series of experiments in a range of wireless scenarios, including indoor laptop based measurement, indoor software defined radio - WARP based measurement, and outdoor wireless measurement. In addition, we also give an analysis to the relationship between the location of transmitter and the value of RSS-Ratio, and examine the accuracy of the estimated RSS-Ratio value via both simulations and experiments. All the experimental, analytical, and simulated results demonstrate that RSS-Ratio will be a better replacement for RSS to improve the performance of RSS based applications.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Mutual privacy-preserving regression modeling in participatory sensing 参与式感知中的互保隐私回归模型
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567116
Kai Xing, Z. Wan, Pengfei Hu, Haojin Zhu, Yuepeng Wang, X. Chen, Yang Wang, Liusheng Huang
As the advancement of sensing and networking technologies, participatory sensing has raised more and more attention as it provides a promising way enabling public and professional users to gather and analyze private data to understand the world. However, in these participatory sensing applications both data at the individuals and analysis results obtained at the users are usually private and sensitive to be disclosed, e.g., locations, salaries, utility usage, consumptions, behaviors, etc. A natural question, also an important but challenging problem is how to keep both participants and users data privacy while still producing the best analysis to explain a phenomenon. In this paper, we have addressed this issue and proposed M-PERM, a mutual privacy preserving regression modeling approach. Particularly, we launch a series of data transformation and aggregation operations at the participatory nodes, the clusters, and the user. During regression model fitting, we provide a new way for model fitting without any need of the original private data or the exact knowledge of the model expression. To evaluate our approach, we conduct both theoretical analysis and simulation study. The evaluation results show that the proposed approach produces exactly the same best model as if the original private data were used without leakage of the fitted model to any participatory nodes, which is a significant advance compared with the existing approaches [1-5]. It is also shown that the data gathering design is able to reach maximum privacy protection under certain conditions and be robust against collusion attack. Furthermore, compared with existing works under the same context (e.g., [1-5]), to our best knowledge it is the first work showing that not only the model coefficients estimation but also a series of regression analysis and model selection methods are reachable in mutual privacy preserving data analysis scenarios such as participatory sensing.
随着传感和网络技术的进步,参与式传感为公众和专业用户收集和分析私人数据以了解世界提供了一种有前途的方式,越来越受到人们的关注。然而,在这些参与式传感应用中,个人数据和从用户那里获得的分析结果通常都是隐私和敏感的,无法公开,例如位置、工资、公用事业使用、消费、行为等。一个自然的问题,也是一个重要但具有挑战性的问题是,如何在保持参与者和用户数据隐私的同时,仍然产生最好的分析来解释一种现象。在本文中,我们解决了这个问题,并提出了M-PERM,一种相互保护隐私的回归建模方法。特别是,我们在参与节点、集群和用户上启动了一系列的数据转换和聚合操作。在回归模型拟合中,我们提供了一种新的模型拟合方法,不需要原始私有数据或模型表达式的确切知识。为了评估我们的方法,我们进行了理论分析和仿真研究。评估结果表明,所提出的方法产生的最佳模型与使用原始私有数据完全相同,而拟合模型不会泄漏到任何参与节点,这与现有方法相比是一个重大进步[1-5]。数据采集设计在一定条件下能够达到最大的隐私保护,对合谋攻击具有较强的鲁棒性。此外,与相同背景下的已有研究(如[1-5])相比,据我们所知,这是第一次在参与式感知等相互隐私保护的数据分析场景中,不仅可以获得模型系数估计,还可以获得一系列回归分析和模型选择方法。
{"title":"Mutual privacy-preserving regression modeling in participatory sensing","authors":"Kai Xing, Z. Wan, Pengfei Hu, Haojin Zhu, Yuepeng Wang, X. Chen, Yang Wang, Liusheng Huang","doi":"10.1109/INFCOM.2013.6567116","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567116","url":null,"abstract":"As the advancement of sensing and networking technologies, participatory sensing has raised more and more attention as it provides a promising way enabling public and professional users to gather and analyze private data to understand the world. However, in these participatory sensing applications both data at the individuals and analysis results obtained at the users are usually private and sensitive to be disclosed, e.g., locations, salaries, utility usage, consumptions, behaviors, etc. A natural question, also an important but challenging problem is how to keep both participants and users data privacy while still producing the best analysis to explain a phenomenon. In this paper, we have addressed this issue and proposed M-PERM, a mutual privacy preserving regression modeling approach. Particularly, we launch a series of data transformation and aggregation operations at the participatory nodes, the clusters, and the user. During regression model fitting, we provide a new way for model fitting without any need of the original private data or the exact knowledge of the model expression. To evaluate our approach, we conduct both theoretical analysis and simulation study. The evaluation results show that the proposed approach produces exactly the same best model as if the original private data were used without leakage of the fitted model to any participatory nodes, which is a significant advance compared with the existing approaches [1-5]. It is also shown that the data gathering design is able to reach maximum privacy protection under certain conditions and be robust against collusion attack. Furthermore, compared with existing works under the same context (e.g., [1-5]), to our best knowledge it is the first work showing that not only the model coefficients estimation but also a series of regression analysis and model selection methods are reachable in mutual privacy preserving data analysis scenarios such as participatory sensing.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures 数据库驱动的认知无线网络中的位置隐私:攻击和对策
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567084
Zhaoyu Gao, Haojin Zhu, Yao Liu, M. Li, Z. Cao
Cognitive Radio Network (CRN) is regarded as a promising way to address the increasing demand for wireless channel resources. It solves the channel resource shortage problem by allowing a Secondary User (SU) to access the channel of a Primary User (PU) when the channel is not occupied by the PU. The latest FCC's rule in May 2012 enforces database-driven CRNs, in which an SU queries a database to obtain spectrum availability information by submitting a location based query. However, one concern about database-driven CRNs is that the queries sent by SUs will inevitably leak the location information. In this study, we identify a new kind of attack against location privacy of database-drive CRNs. Instead of directly learning the SUs' locations from their queries, our discovered attacks can infer an SU's location through his used channels. We propose Spectrum Utilization based Location Inferring Algorithm that enables the attacker to geo-locate an SU. To thwart location privacy leaking from query process, we propose a novel Private Spectrum Availability Information Retrieval scheme that utilizes a blind factor to hide the location of the SU. To defend against the discovered attack, we propose a novel prediction based Private Channel Utilization protocol that reduces the possibilities of location privacy leaking by choosing the most stable channels. We implement our discovered attack and proposed scheme on the data extracted from Google Earth Coverage Maps released by FCC. Experiment results show that the proposed protocols can significantly improve the location privacy.
认知无线网络(CRN)被认为是解决无线信道资源日益增长需求的一种很有前途的方法。在主用户(Primary User)的通道未被占用的情况下,允许从用户(Secondary User)访问主用户(PU)的通道,解决了通道资源不足的问题。2012年5月最新的FCC规则强制执行数据库驱动的crn,其中SU通过提交基于位置的查询来查询数据库以获得频谱可用性信息。然而,关于数据库驱动的crn的一个问题是,由su发送的查询将不可避免地泄露位置信息。在本研究中,我们确定了一种针对数据库驱动crn位置隐私的新攻击。我们发现的攻击不是直接从用户的查询中学习用户的位置,而是通过用户使用的通道推断用户的位置。我们提出了一种基于频谱利用率的位置推断算法,该算法使攻击者能够对SU进行地理定位。为了防止在查询过程中位置隐私泄露,我们提出了一种新的私有频谱可用性信息检索方案,该方案利用盲因子来隐藏SU的位置。我们提出了一种新的基于预测的专用信道利用协议,通过选择最稳定的信道来减少位置隐私泄露的可能性。我们在FCC发布的Google Earth Coverage Maps中提取的数据上实现了我们发现的攻击和提出的方案。实验结果表明,所提出的协议能够显著提高位置隐私性。
{"title":"Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures","authors":"Zhaoyu Gao, Haojin Zhu, Yao Liu, M. Li, Z. Cao","doi":"10.1109/INFCOM.2013.6567084","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567084","url":null,"abstract":"Cognitive Radio Network (CRN) is regarded as a promising way to address the increasing demand for wireless channel resources. It solves the channel resource shortage problem by allowing a Secondary User (SU) to access the channel of a Primary User (PU) when the channel is not occupied by the PU. The latest FCC's rule in May 2012 enforces database-driven CRNs, in which an SU queries a database to obtain spectrum availability information by submitting a location based query. However, one concern about database-driven CRNs is that the queries sent by SUs will inevitably leak the location information. In this study, we identify a new kind of attack against location privacy of database-drive CRNs. Instead of directly learning the SUs' locations from their queries, our discovered attacks can infer an SU's location through his used channels. We propose Spectrum Utilization based Location Inferring Algorithm that enables the attacker to geo-locate an SU. To thwart location privacy leaking from query process, we propose a novel Private Spectrum Availability Information Retrieval scheme that utilizes a blind factor to hide the location of the SU. To defend against the discovered attack, we propose a novel prediction based Private Channel Utilization protocol that reduces the possibilities of location privacy leaking by choosing the most stable channels. We implement our discovered attack and proposed scheme on the data extracted from Google Earth Coverage Maps released by FCC. Experiment results show that the proposed protocols can significantly improve the location privacy.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129915718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
期刊
2013 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1