首页 > 最新文献

2013 Proceedings IEEE INFOCOM最新文献

英文 中文
On the CDN pricing game 关于CDN定价游戏
Pub Date : 2013-04-14 DOI: 10.1109/INFCOMW.2013.6562871
Yang Song, A. Venkataramani, Lixin Gao
Content Delivery Networks (CDNs) serve a large fraction of Internet traffic today improving user-perceived response time and availability of content. With tens of CDNs competing for content producers, it is important to understand the game played by these CDNs and whether the game is sustainable in the long term. In this paper, we formulate a game-theoretic model to analyze price competition among CDNs. Under this model, we propose an optimal strategy employed by two-CDN games. The strategy is incentive-compatible since any CDN that deviates from the strategy ends up with a lower utility. The strategy is also efficient since it produces a total utility that is at least two thirds of the social optimal utility. We formally derive the sufficient conditions for such a strategy to exist, and empirically show that there exists an optimal strategy for the games with more than two CDNs.
如今,内容交付网络(cdn)为很大一部分互联网流量提供服务,改善了用户感知的响应时间和内容的可用性。随着数十家cdn竞相争夺内容制作人,了解这些cdn所玩的游戏以及游戏是否具有长期可持续性是非常重要的。本文建立了一个博弈论模型来分析cdn之间的价格竞争。在此模型下,我们提出了两个cdn博弈的最优策略。该策略是激励兼容的,因为任何偏离该策略的CDN最终都将获得较低的效用。该策略也是有效的,因为它产生的总效用至少是社会最优效用的三分之二。我们正式推导出这种策略存在的充分条件,并经验地表明存在一个具有两个以上cdn的博弈的最优策略。
{"title":"On the CDN pricing game","authors":"Yang Song, A. Venkataramani, Lixin Gao","doi":"10.1109/INFCOMW.2013.6562871","DOIUrl":"https://doi.org/10.1109/INFCOMW.2013.6562871","url":null,"abstract":"Content Delivery Networks (CDNs) serve a large fraction of Internet traffic today improving user-perceived response time and availability of content. With tens of CDNs competing for content producers, it is important to understand the game played by these CDNs and whether the game is sustainable in the long term. In this paper, we formulate a game-theoretic model to analyze price competition among CDNs. Under this model, we propose an optimal strategy employed by two-CDN games. The strategy is incentive-compatible since any CDN that deviates from the strategy ends up with a lower utility. The strategy is also efficient since it produces a total utility that is at least two thirds of the social optimal utility. We formally derive the sufficient conditions for such a strategy to exist, and empirically show that there exists an optimal strategy for the games with more than two CDNs.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128917140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fast and secure rendezvous protocols for mitigating control channel DoS attacks 用于减轻控制通道DoS攻击的快速安全交会协议
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566797
Mohammad J. Abdel-Rahman, Hanif Rahbari, M. Krunz, P. Nain
The operation of a wireless network relies extensively on exchanging messages over a universally known channel, referred to as the control channel. The network performance can be severely degraded if a jammer launches a denial-of-service (DoS) attack on such a channel. In this paper, we design quorum-based frequency hopping (FH) algorithms that mitigate DoS attacks on the control channel of an asynchronous ad hoc network. Our algorithms can establish unicast as well as multicast communications under DoS attacks. They are fully distributed, do not incur any additional message exchange overhead, and can work in the absence of node synchronization. Furthermore, the multicast algorithms maintain the multicast group consistency. The efficiency of our algorithms is shown by analysis and simulations.
无线网络的运行广泛依赖于在一个众所周知的信道上交换消息,这个信道被称为控制信道。如果干扰者在这样的信道上发起拒绝服务(DoS)攻击,网络性能可能会严重下降。在本文中,我们设计了基于群体的跳频(FH)算法,以减轻对异步自组织网络控制通道的DoS攻击。我们的算法可以在DoS攻击下建立单播和多播通信。它们是完全分布式的,不会产生任何额外的消息交换开销,并且可以在没有节点同步的情况下工作。此外,组播算法还能保证组播组的一致性。通过分析和仿真验证了算法的有效性。
{"title":"Fast and secure rendezvous protocols for mitigating control channel DoS attacks","authors":"Mohammad J. Abdel-Rahman, Hanif Rahbari, M. Krunz, P. Nain","doi":"10.1109/INFCOM.2013.6566797","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566797","url":null,"abstract":"The operation of a wireless network relies extensively on exchanging messages over a universally known channel, referred to as the control channel. The network performance can be severely degraded if a jammer launches a denial-of-service (DoS) attack on such a channel. In this paper, we design quorum-based frequency hopping (FH) algorithms that mitigate DoS attacks on the control channel of an asynchronous ad hoc network. Our algorithms can establish unicast as well as multicast communications under DoS attacks. They are fully distributed, do not incur any additional message exchange overhead, and can work in the absence of node synchronization. Furthermore, the multicast algorithms maintain the multicast group consistency. The efficiency of our algorithms is shown by analysis and simulations.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards scalable network emulation: Channel accuracy versus implementation resources 迈向可扩展的网络仿真:通道准确性与实现资源
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566996
Pengda Huang, M. Tonnemacher, Yongjiu Du, D. Rajan, J. Camp
Channel emulators are valuable tools for controllable and repeatable wireless experimentation. Often, however, the high cost of such emulators preclude their widespread usage, especially in large-scale wireless networks. Moreover, existing channel emulators offer either very realistic channels for simplistic topologies or complex topologies with highly-abstracted, low-fidelity channels. To bridge the gap in offering a low-cost channel emulation solution which can scale to a large network size, in this paper, we study the tradeoff in channel emulation fidelity versus the hardware resources consumed using both analytical modeling and FPGA-based implementation. To reduce the memory footprint of our design, we optimize our channel emulation using an iterative structure to generate the Rayleigh fading channel. In addition, the channel update rate and word length selection are also evaluated in the paper which greatly improve the efficiency of implementation. We then extend our analysis of a single channel to understand how the implementation scales for the emulation of a large-scale wireless network, showing that up to 24 vehicular channels can be emulated in real-time on a single Virtex-4 FPGA.
信道仿真器是实现可控和可重复无线实验的重要工具。然而,这种仿真器的高成本往往阻碍了它们的广泛使用,特别是在大规模无线网络中。此外,现有的信道仿真器要么为简单拓扑提供非常逼真的信道,要么为具有高度抽象、低保真信道的复杂拓扑提供非常逼真的信道。为了提供可扩展到大型网络规模的低成本信道仿真解决方案,我们在本文中研究了信道仿真保真度与使用分析建模和基于fpga的实现所消耗的硬件资源之间的权衡。为了减少我们设计的内存占用,我们使用迭代结构优化我们的信道仿真来生成瑞利衰落信道。此外,本文还对信道更新速率和字长选择进行了评估,大大提高了实现效率。然后,我们扩展了对单个通道的分析,以了解大规模无线网络仿真的实现规模,表明在单个Virtex-4 FPGA上可以实时仿真多达24个车载通道。
{"title":"Towards scalable network emulation: Channel accuracy versus implementation resources","authors":"Pengda Huang, M. Tonnemacher, Yongjiu Du, D. Rajan, J. Camp","doi":"10.1109/INFCOM.2013.6566996","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566996","url":null,"abstract":"Channel emulators are valuable tools for controllable and repeatable wireless experimentation. Often, however, the high cost of such emulators preclude their widespread usage, especially in large-scale wireless networks. Moreover, existing channel emulators offer either very realistic channels for simplistic topologies or complex topologies with highly-abstracted, low-fidelity channels. To bridge the gap in offering a low-cost channel emulation solution which can scale to a large network size, in this paper, we study the tradeoff in channel emulation fidelity versus the hardware resources consumed using both analytical modeling and FPGA-based implementation. To reduce the memory footprint of our design, we optimize our channel emulation using an iterative structure to generate the Rayleigh fading channel. In addition, the channel update rate and word length selection are also evaluated in the paper which greatly improve the efficiency of implementation. We then extend our analysis of a single channel to understand how the implementation scales for the emulation of a large-scale wireless network, showing that up to 24 vehicular channels can be emulated in real-time on a single Virtex-4 FPGA.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131975355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Experimental evaluation of content distribution with NDN and HTTP 基于NDN和HTTP的内容分发实验评估
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566771
Haowei Yuan, P. Crowley
Content distribution is a primary activity on the Internet. Name-centric network architectures support content distribution intrinsically. Named Data Networking (NDN), one recent such scheme, names packets rather than end-hosts, thereby enabling packets to be cached and redistributed by routers. Among alternative name-based systems, HTTP is the most significant by any measure. A majority of today's content distribution services leverage the widely deployed HTTP infrastructure, such as web servers and caching proxies. As a result, HTTP can be viewed as a practical, name-based content distribution solution. Of course, NDN and HTTP do not overlap entirely in their capabilities and design goals, but both support name-based content distribution. This paper presents an experimental performance evaluation of NDN-based and HTTP-based content distribution solutions. Our findings verify popular intuition, but also surprise in some ways. In wired networks with local-area transmission latencies, the HTTP-based solution dramatically outperforms NDN, with roughly 10× greater sustained throughput. In networks with lossy access links, such as wireless links with 10% drop rates, or with non-local transmission delays, due to faster link retransmission brought by architectural advantages of NDN, the situation reverses and NDN outperforms HTTP, with sustained throughput increased by roughly 4× over a range of experimental scenarios.
内容分发是互联网上的一项主要活动。以名称为中心的网络架构从本质上支持内容分发。命名数据网络(NDN)是最近的一种这样的方案,它命名数据包而不是终端主机,从而使数据包能够被路由器缓存和重新分发。在可选的基于名称的系统中,HTTP以任何标准衡量都是最重要的。今天的大多数内容分发服务都利用了广泛部署的HTTP基础设施,比如web服务器和缓存代理。因此,可以将HTTP视为一种实用的、基于名称的内容分发解决方案。当然,NDN和HTTP在功能和设计目标上并不完全重叠,但它们都支持基于名称的内容分发。本文对基于ndn和基于http的内容分发方案进行了实验性能评估。我们的发现证实了普遍的直觉,但在某些方面也令人惊讶。在具有本地传输延迟的有线网络中,基于http的解决方案显著优于NDN,其持续吞吐量大约是NDN的10倍。在具有有损访问链路的网络中,例如丢包率为10%的无线链路,或者具有非本地传输延迟的网络中,由于NDN的架构优势带来了更快的链路重传,情况正好相反,NDN优于HTTP,在一系列实验场景中,持续吞吐量提高了大约4倍。
{"title":"Experimental evaluation of content distribution with NDN and HTTP","authors":"Haowei Yuan, P. Crowley","doi":"10.1109/INFCOM.2013.6566771","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566771","url":null,"abstract":"Content distribution is a primary activity on the Internet. Name-centric network architectures support content distribution intrinsically. Named Data Networking (NDN), one recent such scheme, names packets rather than end-hosts, thereby enabling packets to be cached and redistributed by routers. Among alternative name-based systems, HTTP is the most significant by any measure. A majority of today's content distribution services leverage the widely deployed HTTP infrastructure, such as web servers and caching proxies. As a result, HTTP can be viewed as a practical, name-based content distribution solution. Of course, NDN and HTTP do not overlap entirely in their capabilities and design goals, but both support name-based content distribution. This paper presents an experimental performance evaluation of NDN-based and HTTP-based content distribution solutions. Our findings verify popular intuition, but also surprise in some ways. In wired networks with local-area transmission latencies, the HTTP-based solution dramatically outperforms NDN, with roughly 10× greater sustained throughput. In networks with lossy access links, such as wireless links with 10% drop rates, or with non-local transmission delays, due to faster link retransmission brought by architectural advantages of NDN, the situation reverses and NDN outperforms HTTP, with sustained throughput increased by roughly 4× over a range of experimental scenarios.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Predicting length of stay at WiFi hotspots 预测在WiFi热点停留的时间
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567123
Justin Manweiler, N. Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi
Today's smartphones provide a variety of sensors, enabling high-resolution measurements of user behavior. We envision that many services can benefit from short-term predictions of complex human behavioral patterns. While enablement of behavior awareness through sensing is a broad research theme, one possibility is in predicting how quickly a person will move through a space. Such a prediction service could have numerous applications. For one example, we imagine shop owners predicting how long a particular customer is likely to browse merchandise, and issue targeted mobile coupons accordingly - customers in a hurry can be encouraged to stay and consider discounts. Within a space of moderate size, WiFi access points are uniquely positioned to track a statistical framework for user length of stay, passively recording metrics such as WiFI signal strength (RSSI) and potentially receiving client-uploaded sensor data. In this work, we attempt to quantity this opportunity, and show that human dwell time can be predicted with reasonable accuracy, even when restricted to passively observed WiFi RSSI.
如今的智能手机提供了各种传感器,可以对用户行为进行高分辨率测量。我们设想,许多服务可以从复杂的人类行为模式的短期预测中受益。虽然通过感知实现行为意识是一个广泛的研究主题,但一种可能性是预测一个人在空间中移动的速度。这样的预测服务可以有许多应用。举个例子,我们想象店主预测一个特定顾客可能浏览商品的时间,并相应地发放有针对性的移动优惠券——可以鼓励赶时间的顾客留下来并考虑折扣。在中等大小的空间内,WiFi接入点具有独特的定位,可以跟踪用户停留时间的统计框架,被动记录WiFi信号强度(RSSI)等指标,并可能接收客户上传的传感器数据。在这项工作中,我们试图量化这一机会,并表明人类停留时间可以以合理的精度预测,即使局限于被动观察WiFi RSSI。
{"title":"Predicting length of stay at WiFi hotspots","authors":"Justin Manweiler, N. Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi","doi":"10.1109/INFCOM.2013.6567123","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567123","url":null,"abstract":"Today's smartphones provide a variety of sensors, enabling high-resolution measurements of user behavior. We envision that many services can benefit from short-term predictions of complex human behavioral patterns. While enablement of behavior awareness through sensing is a broad research theme, one possibility is in predicting how quickly a person will move through a space. Such a prediction service could have numerous applications. For one example, we imagine shop owners predicting how long a particular customer is likely to browse merchandise, and issue targeted mobile coupons accordingly - customers in a hurry can be encouraged to stay and consider discounts. Within a space of moderate size, WiFi access points are uniquely positioned to track a statistical framework for user length of stay, passively recording metrics such as WiFI signal strength (RSSI) and potentially receiving client-uploaded sensor data. In this work, we attempt to quantity this opportunity, and show that human dwell time can be predicted with reasonable accuracy, even when restricted to passively observed WiFi RSSI.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Cooperative packet recovery in enterprise WLANs 企业无线局域网中的协同包恢复
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566928
Mahanth K. Gowda, Souvik Sen, Romit Roy Choudhury, Sung-Ju Lee
Cooperative packet recovery has been widely investigated in wireless networks, where corrupt copies of a packet are combined to recover the original packet. While previous work such as MRD (Multi Radio Diversity) and Soft apply combining to bits and bit-confidences, combining at the symbol level has been avoided. The reason is rooted in the prohibitive overhead of sharing raw symbol information between different APs of an enterprise WLAN. We present Epicenter that overcomes this constraint, and combines multiple copies of incorrectly received “symbols” to infer the actual transmitted symbol. Our core finding is that symbols need not be represented in full fidelity - coarse representation of symbols can preserve most of their diversity, while substantially lowering the overhead. We then develop a rate estimation algorithm that actually exploits symbol level combining. Our USRP/GNURadio testbed confirms the viability of our ideas, yielding 40% throughput gain over Soft, and 25-90% over 802.11. While the gains are modest, we believe that they are realistic, and available with minimal modifications to today's EWLAN systems.
协作包恢复在无线网络中得到了广泛的研究,在无线网络中,一个包的损坏副本被组合起来恢复原始包。虽然以前的工作如MRD(多无线电分集)和Soft将组合应用于位和位置信度,但避免了符号级的组合。其根源在于在企业WLAN的不同ap之间共享原始符号信息的开销过高。我们提出了克服这一限制的震中,并结合了错误接收的“符号”的多个副本来推断实际传输的符号。我们的核心发现是符号不需要完全保真地表示——符号的粗表示可以保留它们的大部分多样性,同时大大降低开销。然后,我们开发了一种实际利用符号级组合的速率估计算法。我们的USRP/GNURadio测试平台证实了我们想法的可行性,比Soft的吞吐量提高40%,比802.11的吞吐量提高25-90%。虽然收益不大,但我们相信它们是现实的,并且可以对当今的EWLAN系统进行最小的修改。
{"title":"Cooperative packet recovery in enterprise WLANs","authors":"Mahanth K. Gowda, Souvik Sen, Romit Roy Choudhury, Sung-Ju Lee","doi":"10.1109/INFCOM.2013.6566928","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566928","url":null,"abstract":"Cooperative packet recovery has been widely investigated in wireless networks, where corrupt copies of a packet are combined to recover the original packet. While previous work such as MRD (Multi Radio Diversity) and Soft apply combining to bits and bit-confidences, combining at the symbol level has been avoided. The reason is rooted in the prohibitive overhead of sharing raw symbol information between different APs of an enterprise WLAN. We present Epicenter that overcomes this constraint, and combines multiple copies of incorrectly received “symbols” to infer the actual transmitted symbol. Our core finding is that symbols need not be represented in full fidelity - coarse representation of symbols can preserve most of their diversity, while substantially lowering the overhead. We then develop a rate estimation algorithm that actually exploits symbol level combining. Our USRP/GNURadio testbed confirms the viability of our ideas, yielding 40% throughput gain over Soft, and 25-90% over 802.11. While the gains are modest, we believe that they are realistic, and available with minimal modifications to today's EWLAN systems.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126279671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Environment aware connectivity for wireless underground sensor networks 无线地下传感器网络的环境感知连接
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566853
Xin Dong, M. Vuran
Wireless underground sensor networks (WUSNs) consist of sensors that are buried in and communicate through soil. The channel quality of WUSNs is strongly impacted by environmental parameters such soil moisture. Thus, the communication range of the nodes and the network connectivity vary over time. To address the challenges in underground communication, above ground nodes are deployed to maintain connectivity. In this paper, the connectivity of WUSNs under varying environmental conditions is captured by modeling the cluster size distribution under sub-critical conditions and through a novel aboveground communication coverage model for underground clusters. The resulting connectivity model is utilized to analyze two communication schemes: transmit power control and environment-aware routing, which maintain connectivity while reducing energy consumption. It is shown that transmit power control can maintain network connectivity under all soil moisture values at the cost of energy consumption. Utilizing relays based on soil moisture levels can decrease this energy consumption. A composite of both approaches is also considered to analyze the tradeoff between connectivity and energy consumption.
无线地下传感器网络(Wireless underground sensor network, WUSNs)是一种将传感器埋入土壤并通过土壤进行通信的网络。土壤湿度等环境参数对WUSNs的通道质量影响较大。因此,节点的通信范围和网络连通性随时间而变化。为了应对地下通信的挑战,部署地上节点以保持连通性。本文通过对亚临界条件下的集群规模分布进行建模,并通过一种新颖的地下集群的地上通信覆盖模型来捕获不同环境条件下WUSNs的连通性。利用所建立的连通性模型,分析了在保持连通性的同时降低能耗的两种通信方案:发射功率控制和环境感知路由。结果表明,在所有土壤湿度值下,传输功率控制都能以能耗为代价保持网络连通性。利用基于土壤湿度水平的继电器可以减少这种能源消耗。还考虑了两种方法的组合,以分析连接性和能耗之间的权衡。
{"title":"Environment aware connectivity for wireless underground sensor networks","authors":"Xin Dong, M. Vuran","doi":"10.1109/INFCOM.2013.6566853","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566853","url":null,"abstract":"Wireless underground sensor networks (WUSNs) consist of sensors that are buried in and communicate through soil. The channel quality of WUSNs is strongly impacted by environmental parameters such soil moisture. Thus, the communication range of the nodes and the network connectivity vary over time. To address the challenges in underground communication, above ground nodes are deployed to maintain connectivity. In this paper, the connectivity of WUSNs under varying environmental conditions is captured by modeling the cluster size distribution under sub-critical conditions and through a novel aboveground communication coverage model for underground clusters. The resulting connectivity model is utilized to analyze two communication schemes: transmit power control and environment-aware routing, which maintain connectivity while reducing energy consumption. It is shown that transmit power control can maintain network connectivity under all soil moisture values at the cost of energy consumption. Utilizing relays based on soil moisture levels can decrease this energy consumption. A composite of both approaches is also considered to analyze the tradeoff between connectivity and energy consumption.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126827639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Prometheus: Privacy-aware data retrieval on hybrid cloud 普罗米修斯:混合云上的隐私感知数据检索
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567072
Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiangzhan Yu
With the advent of cloud computing, data owner is motivated to outsource their data to the cloud platform for great flexibility and economic savings. However, the development is hampered by data privacy concerns: Data owner may have privacy data and the data cannot be outsourced to cloud directly. Previous solutions mainly use encryption. However, encryption causes a lot of inconveniences and large overheads for other data operations, such as search and query. To address the challenge, we adopt hybrid cloud. In this paper, we present a suit of novel techniques for efficient privacy-aware data retrieval. The basic idea is to split data, keeping sensitive data in trusted private cloud while moving insensitive data to public cloud. However, privacy-aware data retrieval on hybrid cloud is not supported by current frameworks. Data owners have to split data manually. Our system, called Prometheus, adopts the popular MapReduce framework, and uses data partition strategy independent to specific applications. Prometheus can automatically separate sensitive information from public data. We formally prove the privacy-preserving feature of Prometheus. We also show that our scheme can defend against the malicious cloud model, in addition to the semi-honest cloud model. We implement Prometheus on Hadoop and evaluate its performance using real data set on a large-scale cloud test-bed. Our extensive experiments demonstrate the validity and practicality of the proposed scheme.
随着云计算的出现,数据所有者被激励将他们的数据外包给云平台,以获得极大的灵活性和经济节约。然而,数据隐私问题阻碍了这一发展:数据所有者可能拥有隐私数据,而数据不能直接外包给云。以前的解决方案主要使用加密。但是,加密会给其他数据操作(如搜索和查询)带来很多不便和大量开销。为了应对这一挑战,我们采用了混合云。在本文中,我们提出了一套新的技术来实现高效的隐私感知数据检索。其基本思想是拆分数据,将敏感数据保存在可信的私有云中,而将不敏感数据移动到公共云。然而,当前的框架并不支持混合云上的隐私感知数据检索。数据所有者必须手动分割数据。我们的系统名为Prometheus,采用流行的MapReduce框架,并使用独立于特定应用程序的数据分区策略。Prometheus可以自动将敏感信息与公共数据分离。我们正式证明了Prometheus的隐私保护特性。我们还表明,除了半诚实云模型之外,我们的方案还可以防御恶意云模型。我们在Hadoop上实现Prometheus,并在大规模云测试平台上使用真实数据集评估其性能。大量的实验证明了该方案的有效性和实用性。
{"title":"Prometheus: Privacy-aware data retrieval on hybrid cloud","authors":"Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiangzhan Yu","doi":"10.1109/INFCOM.2013.6567072","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567072","url":null,"abstract":"With the advent of cloud computing, data owner is motivated to outsource their data to the cloud platform for great flexibility and economic savings. However, the development is hampered by data privacy concerns: Data owner may have privacy data and the data cannot be outsourced to cloud directly. Previous solutions mainly use encryption. However, encryption causes a lot of inconveniences and large overheads for other data operations, such as search and query. To address the challenge, we adopt hybrid cloud. In this paper, we present a suit of novel techniques for efficient privacy-aware data retrieval. The basic idea is to split data, keeping sensitive data in trusted private cloud while moving insensitive data to public cloud. However, privacy-aware data retrieval on hybrid cloud is not supported by current frameworks. Data owners have to split data manually. Our system, called Prometheus, adopts the popular MapReduce framework, and uses data partition strategy independent to specific applications. Prometheus can automatically separate sensitive information from public data. We formally prove the privacy-preserving feature of Prometheus. We also show that our scheme can defend against the malicious cloud model, in addition to the semi-honest cloud model. We implement Prometheus on Hadoop and evaluate its performance using real data set on a large-scale cloud test-bed. Our extensive experiments demonstrate the validity and practicality of the proposed scheme.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Characterizing privacy leakage of public WiFi networks for users on travel 对出行用户公共WiFi网络隐私泄露进行表征
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567086
Ningning Cheng, Xinlei Wang, W. Cheng, P. Mohapatra, A. Seneviratne
Deployment of public wireless access points (also known as public hotspots) and the prevalence of portable computing devices has made it more convenient for people on travel to access the Internet. On the other hand, it also generates large privacy concerns due to the open environment. However, most users are neglecting the privacy threats because currently there is no way for them to know to what extent their privacy is revealed. In this paper, we examine the privacy leakage in public hotspots from activities such as domain name querying, web browsing, search engine querying and online advertising. We discover that, from these activities multiple categories of user privacy can be leaked, such as identity privacy, location privacy, financial privacy, social privacy and personal privacy. We have collected real data from 20 airport datasets in four countries and discover that the privacy leakage can be up to 68%, which means two thirds of users on travel leak their private information while accessing the Internet at airports. Our results indicate that users are not fully aware of the privacy leakage they can encounter in the wireless environment, especially in public WiFi networks. This fact can urge network service providers and website designers to improve their service by developing better privacy preserving mechanisms.
公共无线接入点(也称为公共热点)的部署和便携式计算设备的普及使得人们在旅行中访问互联网更加方便。另一方面,由于开放的环境,它也产生了很大的隐私问题。然而,大多数用户忽略了隐私威胁,因为目前他们没有办法知道他们的隐私暴露到什么程度。本文研究了域名查询、网页浏览、搜索引擎查询和网络广告等活动对公共热点隐私泄露的影响。我们发现,从这些活动中可以泄露多类用户隐私,如身份隐私、位置隐私、财务隐私、社交隐私和个人隐私。我们从四个国家的20个机场数据集中收集了真实数据,发现隐私泄露率高达68%,这意味着三分之二的旅行用户在机场上网时泄露了他们的私人信息。我们的研究结果表明,用户并没有完全意识到他们在无线环境中,特别是在公共WiFi网络中可能遇到的隐私泄露。这一事实可以促使网络服务提供商和网站设计师通过开发更好的隐私保护机制来改善他们的服务。
{"title":"Characterizing privacy leakage of public WiFi networks for users on travel","authors":"Ningning Cheng, Xinlei Wang, W. Cheng, P. Mohapatra, A. Seneviratne","doi":"10.1109/INFCOM.2013.6567086","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567086","url":null,"abstract":"Deployment of public wireless access points (also known as public hotspots) and the prevalence of portable computing devices has made it more convenient for people on travel to access the Internet. On the other hand, it also generates large privacy concerns due to the open environment. However, most users are neglecting the privacy threats because currently there is no way for them to know to what extent their privacy is revealed. In this paper, we examine the privacy leakage in public hotspots from activities such as domain name querying, web browsing, search engine querying and online advertising. We discover that, from these activities multiple categories of user privacy can be leaked, such as identity privacy, location privacy, financial privacy, social privacy and personal privacy. We have collected real data from 20 airport datasets in four countries and discover that the privacy leakage can be up to 68%, which means two thirds of users on travel leak their private information while accessing the Internet at airports. Our results indicate that users are not fully aware of the privacy leakage they can encounter in the wireless environment, especially in public WiFi networks. This fact can urge network service providers and website designers to improve their service by developing better privacy preserving mechanisms.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"533 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Energy-efficient scheduling policy for collaborative execution in mobile cloud computing 移动云计算协同执行的节能调度策略
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566761
Weiwen Zhang, Yonggang Wen, D. Wu
In this paper, we investigate the scheduling policy for collaborative execution in mobile cloud computing. A mobile application is represented by a sequence of fine-grained tasks formulating a linear topology, and each of them is executed either on the mobile device or offloaded onto the cloud side for execution. The design objective is to minimize the energy consumed by the mobile device, while meeting a time deadline. We formulate this minimum-energy task scheduling problem as a constrained shortest path problem on a directed acyclic graph, and adapt the canonical “LARAC” algorithm to solving this problem approximately. Numerical simulation suggests that a one-climb offloading policy is energy efficient for the Markovian stochastic channel, in which at most one migration from mobile device to the cloud is taken place for the collaborative task execution. Moreover, compared to standalone mobile execution and cloud execution, the optimal collaborative execution strategy can significantly save the energy consumed on the mobile device.
本文研究了移动云计算中协同执行的调度策略。移动应用程序由一系列细粒度任务表示,这些任务形成了一个线性拓扑,每个任务要么在移动设备上执行,要么卸载到云中执行。设计目标是尽量减少移动设备消耗的能量,同时满足时间期限。我们将这一最小能量任务调度问题表述为有向无环图上的约束最短路径问题,并采用经典的LARAC算法对其进行近似求解。数值模拟表明,对于马尔可夫随机信道,一次爬升卸载策略是节能的,其中最多发生一次从移动设备到云的迁移以执行协同任务。此外,与独立移动执行和云执行相比,最优协同执行策略可以显著节省移动设备上消耗的能量。
{"title":"Energy-efficient scheduling policy for collaborative execution in mobile cloud computing","authors":"Weiwen Zhang, Yonggang Wen, D. Wu","doi":"10.1109/INFCOM.2013.6566761","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566761","url":null,"abstract":"In this paper, we investigate the scheduling policy for collaborative execution in mobile cloud computing. A mobile application is represented by a sequence of fine-grained tasks formulating a linear topology, and each of them is executed either on the mobile device or offloaded onto the cloud side for execution. The design objective is to minimize the energy consumed by the mobile device, while meeting a time deadline. We formulate this minimum-energy task scheduling problem as a constrained shortest path problem on a directed acyclic graph, and adapt the canonical “LARAC” algorithm to solving this problem approximately. Numerical simulation suggests that a one-climb offloading policy is energy efficient for the Markovian stochastic channel, in which at most one migration from mobile device to the cloud is taken place for the collaborative task execution. Moreover, compared to standalone mobile execution and cloud execution, the optimal collaborative execution strategy can significantly save the energy consumed on the mobile device.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"61 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 163
期刊
2013 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1