首页 > 最新文献

2013 Proceedings IEEE INFOCOM最新文献

英文 中文
Data confidentiality and availability via secret sharing and node mobility in UWSN UWSN中基于秘密共享和节点移动的数据保密性和可用性
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566764
R. D. Pietro, Stefano Guarino
In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. In this paper, we address the fundamental issue of quantifying to which extent secret sharing schemes, combined with nodes mobility, can help in assuring data availability and confidentiality. We provide accurate analytical results binding the fraction of the network accessed by the sink and the adversary to the amount of information they can successfully recover. Extensive simulations support our findings.
在移动无人值守无线传感器网络(muwsn)中,节点感知环境并存储获取的数据,直到可信数据接收器到达。在本文中,我们解决了量化秘密共享方案与节点移动性相结合在多大程度上有助于确保数据可用性和机密性的基本问题。我们提供了准确的分析结果,将接收器和攻击者访问的网络比例与他们可以成功恢复的信息量绑定在一起。大量的模拟支持了我们的发现。
{"title":"Data confidentiality and availability via secret sharing and node mobility in UWSN","authors":"R. D. Pietro, Stefano Guarino","doi":"10.1109/INFCOM.2013.6566764","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566764","url":null,"abstract":"In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. In this paper, we address the fundamental issue of quantifying to which extent secret sharing schemes, combined with nodes mobility, can help in assuring data availability and confidentiality. We provide accurate analytical results binding the fraction of the network accessed by the sink and the adversary to the amount of information they can successfully recover. Extensive simulations support our findings.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Inferring the periodicity in large-scale Internet measurements 推断大规模互联网测量的周期性
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566964
Oded Argon, Y. Shavitt, Udi Weinsberg
Many Internet events exhibit periodical patterns. Such events include the availability of end-hosts, usage of internetwork links for balancing load and cost of transit, traffic shaping during peak hours, etc. Internet monitoring systems that collect huge amount of data can leverage periodicity information for improving resource utilization. However, automatic periodicity inference is a non trivial task, especially when facing measurement “noise”. In this paper we present two methods for assessing the periodicity of network events and inferring their periodical patterns. The first method uses Power Spectral Density for inferring a single dominant period that exists in a signal representing the sampling process. This method is highly robust to noise, but is most useful for single-period processes. Thus, we present a novel method for detecting multiple periods that comprise a single process, using iterative relaxation of the time-domain autocorrelation function. We evaluate these methods using extensive simulations, and show their applicability on real Internet measurements of end-host availability and IP address alternations.
许多互联网事件表现出周期性的模式。这些事件包括终端主机的可用性、用于平衡负载和传输成本的互连链路的使用、高峰时段的流量塑造等。互联网监测系统收集了大量的数据,可以利用周期性信息来提高资源利用率。然而,自动周期推断是一项艰巨的任务,特别是在面对测量“噪声”时。本文提出了两种评估网络事件周期性和推断其周期模式的方法。第一种方法使用功率谱密度来推断存在于代表采样过程的信号中的单个主导周期。该方法对噪声具有很强的鲁棒性,但对单周期过程最有用。因此,我们提出了一种新的方法来检测包含单个过程的多个周期,使用时域自相关函数的迭代松弛。我们使用广泛的模拟来评估这些方法,并展示了它们在终端主机可用性和IP地址变更的真实互联网测量中的适用性。
{"title":"Inferring the periodicity in large-scale Internet measurements","authors":"Oded Argon, Y. Shavitt, Udi Weinsberg","doi":"10.1109/INFCOM.2013.6566964","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566964","url":null,"abstract":"Many Internet events exhibit periodical patterns. Such events include the availability of end-hosts, usage of internetwork links for balancing load and cost of transit, traffic shaping during peak hours, etc. Internet monitoring systems that collect huge amount of data can leverage periodicity information for improving resource utilization. However, automatic periodicity inference is a non trivial task, especially when facing measurement “noise”. In this paper we present two methods for assessing the periodicity of network events and inferring their periodical patterns. The first method uses Power Spectral Density for inferring a single dominant period that exists in a signal representing the sampling process. This method is highly robust to noise, but is most useful for single-period processes. Thus, we present a novel method for detecting multiple periods that comprise a single process, using iterative relaxation of the time-domain autocorrelation function. We evaluate these methods using extensive simulations, and show their applicability on real Internet measurements of end-host availability and IP address alternations.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124936194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the capacity of wireless CSMA/CA multihop networks 无线CSMA/CA多跳网络容量研究
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566924
R. Laufer, L. Kleinrock
Due to a poor understanding of the interactions among transmitters, wireless multihop networks have commonly been stigmatized as unpredictable in nature. Even elementary questions regarding the throughput limitations of these networks cannot be answered in general. In this paper we investigate the behavior of wireless multihop networks using carrier sense multiple access with collision avoidance (CSMA/CA). Our goal is to understand how the transmissions of a particular node affect the medium access, and ultimately the throughput, of other nodes in the network. We introduce a theory which accurately models the behavior of these networks and show that, contrary to popular belief, their performance is easily predictable and can be described by a system of equations. Using the proposed theory, we provide the analytical expressions necessary to fully characterize the capacity region of any wireless CSMA/CA multihop network. We show that this region is nonconvex in general and entirely agnostic to the probability distributions of all network parameters, depending only on their expected values.
由于对发射器之间的相互作用了解不足,无线多跳网络通常被认为是不可预测的。即使是关于这些网络的吞吐量限制的基本问题,一般也不能回答。在本文中,我们研究了无线多跳网络使用载波感知多址与碰撞避免(CSMA/CA)的行为。我们的目标是了解特定节点的传输如何影响网络中其他节点的媒体访问,并最终影响吞吐量。我们引入了一个理论,该理论准确地模拟了这些网络的行为,并表明,与普遍的看法相反,它们的表现很容易预测,可以用方程组来描述。利用提出的理论,我们提供了充分表征任何无线CSMA/CA多跳网络容量区域所需的解析表达式。我们证明了该区域一般是非凸的,并且对所有网络参数的概率分布完全不可知,仅取决于它们的期望值。
{"title":"On the capacity of wireless CSMA/CA multihop networks","authors":"R. Laufer, L. Kleinrock","doi":"10.1109/INFCOM.2013.6566924","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566924","url":null,"abstract":"Due to a poor understanding of the interactions among transmitters, wireless multihop networks have commonly been stigmatized as unpredictable in nature. Even elementary questions regarding the throughput limitations of these networks cannot be answered in general. In this paper we investigate the behavior of wireless multihop networks using carrier sense multiple access with collision avoidance (CSMA/CA). Our goal is to understand how the transmissions of a particular node affect the medium access, and ultimately the throughput, of other nodes in the network. We introduce a theory which accurately models the behavior of these networks and show that, contrary to popular belief, their performance is easily predictable and can be described by a system of equations. Using the proposed theory, we provide the analytical expressions necessary to fully characterize the capacity region of any wireless CSMA/CA multihop network. We show that this region is nonconvex in general and entirely agnostic to the probability distributions of all network parameters, depending only on their expected values.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122717418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
NSFIB construction & aggregation with next hop of strict partial order 具有严格偏序下一跳的NSFIB构造与聚合
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566833
Qing Li, Mingwei Xu, Meng Chen
The Internet global routing tables have been expanding at a dramatic and increasing rate. In this paper, we propose the next hop of strict partial order to construct and aggregate the Nexthop-Selectable FIB (NSFIB). We control the path stretch caused by NSFIB aggregation by setting an upper limit number of next hops. According to our simulation, our aggregation algorithms shrink the FIB to 5-15%, compared with 20-60% of single-nexthop FIB aggregation algorithms; our method works very well in controlling the path stretch.
互联网全球路由表一直在以惊人的速度增长。本文提出了严格偏序的下一跳来构造和聚合下一跳可选择FIB (NSFIB)。我们通过设置下一跳的上限数目来控制由NSFIB聚合引起的路径拉伸。根据我们的仿真,与单下一跳FIB聚合算法的20-60%相比,我们的聚合算法将FIB缩小到5-15%;我们的方法在控制路径延伸方面效果很好。
{"title":"NSFIB construction & aggregation with next hop of strict partial order","authors":"Qing Li, Mingwei Xu, Meng Chen","doi":"10.1109/INFCOM.2013.6566833","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566833","url":null,"abstract":"The Internet global routing tables have been expanding at a dramatic and increasing rate. In this paper, we propose the next hop of strict partial order to construct and aggregate the Nexthop-Selectable FIB (NSFIB). We control the path stretch caused by NSFIB aggregation by setting an upper limit number of next hops. According to our simulation, our aggregation algorithms shrink the FIB to 5-15%, compared with 20-60% of single-nexthop FIB aggregation algorithms; our method works very well in controlling the path stretch.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131401751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Beam scheduling and relay assignment in wireless relay networks with smart antennas 智能天线无线中继网络中的波束调度与中继分配
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566749
B. Mumey, Jian Tang, I. Judson, R. Wolff
Relay Stations (RSs) can be deployed in a wireless network to extend its coverage and improve its capacity. Smart (directional) antennas can enhance the functionalities of RSs by forming the beam only towards intended receiving Subscriber Stations (SSs). In this paper, we study a joint problem of selecting a beam width and direction for the smart antenna at each RS and determining the RS assignment for SSs in each scheduling period. The objective is to maximize a utility function that can lead to a stable and high-throughput system. We define this as the Beam Scheduling and Relay Assignment Problem (BS-RAP). We show that BS-RAP is NP-hard, present a Mixed Integer Linear Programming (MILP) formulation to provide optimal solutions and present two polynomial-time greedy algorithms, one of which is shown to have a constant factor approximation ratio.
中继站(RSs)可以部署在无线网络中,以扩大其覆盖范围和提高其容量。智能(定向)天线可以增强RSs的功能,通过形成只针对预定接收用户站(ss)的波束。本文研究了智能天线在各调度时段的波束宽度和波束方向选择以及各调度时段智能天线的波束分配问题。目标是最大化效用函数,从而导致稳定和高吞吐量的系统。我们将其定义为波束调度和中继分配问题(BS-RAP)。我们证明了BS-RAP是np困难的,提出了一个混合整数线性规划(MILP)公式来提供最优解,并提出了两种多项式时间贪婪算法,其中一种算法被证明具有常数因子近似比。
{"title":"Beam scheduling and relay assignment in wireless relay networks with smart antennas","authors":"B. Mumey, Jian Tang, I. Judson, R. Wolff","doi":"10.1109/INFCOM.2013.6566749","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566749","url":null,"abstract":"Relay Stations (RSs) can be deployed in a wireless network to extend its coverage and improve its capacity. Smart (directional) antennas can enhance the functionalities of RSs by forming the beam only towards intended receiving Subscriber Stations (SSs). In this paper, we study a joint problem of selecting a beam width and direction for the smart antenna at each RS and determining the RS assignment for SSs in each scheduling period. The objective is to maximize a utility function that can lead to a stable and high-throughput system. We define this as the Beam Scheduling and Relay Assignment Problem (BS-RAP). We show that BS-RAP is NP-hard, present a Mixed Integer Linear Programming (MILP) formulation to provide optimal solutions and present two polynomial-time greedy algorithms, one of which is shown to have a constant factor approximation ratio.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131488571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing the collection of local decisions for time-constrained distributed detection in WSNs 基于时间约束的分布式检测的局部决策集合优化
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566992
Seksan Laitrakun, E. Coyle
We consider a distributed detection application for a fusion center that has a limited time to make a global decision by collecting, weighting, and fusing local decisions made by nodes in a wireless sensor network that uses a random access channel. When this time is not long enough to collect decisions from all nodes in the network, a strategy is needed for collecting those with the highest reliability. This is accomplished with an easily implemented modification of the random access protocol: the collection time is divided into frames and only nodes with a particular range of reliabilities compete for the channel within each frame. Nodes with the most reliable decisions attempt transmission in the first frame; nodes with the next most reliable set of decisions attempt in the next frame; etc. We formulate an optimization problem that determines the reliability interval that defines who attempts in each frame in order to minimize the Detection Error Probability (DEP) at the fusion center. When the noise distribution affecting nodes' local decisions is continuous, symmetric, unimodal, and has a monotone likelihood ratio, reliability thresholds that maximize the channel throughput in each frame are optimal when the ratio of the collection time to the number of nodes is small. The number of frames that should be used depends on whether the average reliability or the worst-case reliability of local decisions in each frame is used to determine the DEP.
我们考虑了一个融合中心的分布式检测应用程序,该中心通过收集、加权和融合无线传感器网络中使用随机接入信道的节点所做的本地决策,在有限的时间内做出全局决策。当这个时间不足以收集网络中所有节点的决策时,需要一种策略来收集那些具有最高可靠性的决策。这可以通过对随机访问协议的简单修改来实现:将收集时间划分为帧,并且只有具有特定可靠性范围的节点才能在每个帧内竞争信道。决策最可靠的节点尝试在第一帧传输;具有下一个最可靠决策集的节点在下一帧中尝试;等。为了最小化融合中心的检测错误概率(DEP),我们制定了一个优化问题,该问题确定了可靠性间隔,该间隔定义了在每帧中尝试的人。当影响节点局部决策的噪声分布是连续、对称、单峰且具有单调似然比时,当采集时间与节点数之比较小时,使每帧信道吞吐量最大化的可靠性阈值最优。应该使用的帧数取决于是否使用每帧本地决策的平均可靠性或最坏情况可靠性来确定DEP。
{"title":"Optimizing the collection of local decisions for time-constrained distributed detection in WSNs","authors":"Seksan Laitrakun, E. Coyle","doi":"10.1109/INFCOM.2013.6566992","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566992","url":null,"abstract":"We consider a distributed detection application for a fusion center that has a limited time to make a global decision by collecting, weighting, and fusing local decisions made by nodes in a wireless sensor network that uses a random access channel. When this time is not long enough to collect decisions from all nodes in the network, a strategy is needed for collecting those with the highest reliability. This is accomplished with an easily implemented modification of the random access protocol: the collection time is divided into frames and only nodes with a particular range of reliabilities compete for the channel within each frame. Nodes with the most reliable decisions attempt transmission in the first frame; nodes with the next most reliable set of decisions attempt in the next frame; etc. We formulate an optimization problem that determines the reliability interval that defines who attempts in each frame in order to minimize the Detection Error Probability (DEP) at the fusion center. When the noise distribution affecting nodes' local decisions is continuous, symmetric, unimodal, and has a monotone likelihood ratio, reliability thresholds that maximize the channel throughput in each frame are optimal when the ratio of the collection time to the number of nodes is small. The number of frames that should be used depends on whether the average reliability or the worst-case reliability of local decisions in each frame is used to determine the DEP.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134445945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hybrid pricing for TV white space database 电视空白空间数据库的混合定价
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567000
Xiaojun Feng, Qian Zhang, Jin Zhang
According to the recent rulings of the Federal Communications Commission (FCC), TV white spaces (TVWS) can now be accessed by secondary users (SUs) after a list of vacant TV channels is obtained via a geo-location database. Proper business models are essential for database operators to manage the cost of maintaining geo-location databases. Database access can be simultaneously priced under two different schemes: the registration scheme and the service plan scheme. In the registration scheme, the database reserves part of the TV bandwidth for registered White Space Devices (WSD) in a soft-license way. In the service plan scheme, WSDs are charged according to their queries. In this paper, we investigate the business model for the TVWS database under a hybrid pricing scheme. We consider the scenario where a database operator employs both the registration scheme and the service plan scheme to serve the SUs. The SUs' choices of different pricing schemes are modeled as a non-cooperative game and we derive distributed algorithms to achieve the Nash Equilibrium (NE). Considering the NE of the SUs, the database operator optimally determines the pricing parameters for both pricing schemes in terms of bandwidth reservation, registration fee and query plans.
根据联邦通信委员会(FCC)最近的规定,在通过地理位置数据库获得空闲电视频道列表后,二级用户(su)现在可以访问电视空白空间(TVWS)。正确的商业模式对于数据库运营商管理维护地理位置数据库的成本至关重要。数据库访问可以在两种不同的方案下同时定价:注册方案和服务计划方案。在注册方案中,数据库以软许可的方式为注册的白色空间设备(WSD)保留部分电视带宽。在服务计划方案中,按查询次数收费。本文研究了一种混合定价方案下的TVWS数据库业务模型。我们考虑这样一个场景:数据库运营商同时使用注册方案和服务计划方案来为SUs提供服务。将SUs对不同定价方案的选择建模为非合作博弈,并推导出实现纳什均衡(NE)的分布式算法。考虑到单节点的网元,数据库运营商从带宽预留、注册费用和查询计划三个方面对两种定价方案的定价参数进行了优化。
{"title":"Hybrid pricing for TV white space database","authors":"Xiaojun Feng, Qian Zhang, Jin Zhang","doi":"10.1109/INFCOM.2013.6567000","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567000","url":null,"abstract":"According to the recent rulings of the Federal Communications Commission (FCC), TV white spaces (TVWS) can now be accessed by secondary users (SUs) after a list of vacant TV channels is obtained via a geo-location database. Proper business models are essential for database operators to manage the cost of maintaining geo-location databases. Database access can be simultaneously priced under two different schemes: the registration scheme and the service plan scheme. In the registration scheme, the database reserves part of the TV bandwidth for registered White Space Devices (WSD) in a soft-license way. In the service plan scheme, WSDs are charged according to their queries. In this paper, we investigate the business model for the TVWS database under a hybrid pricing scheme. We consider the scenario where a database operator employs both the registration scheme and the service plan scheme to serve the SUs. The SUs' choices of different pricing schemes are modeled as a non-cooperative game and we derive distributed algorithms to achieve the Nash Equilibrium (NE). Considering the NE of the SUs, the database operator optimally determines the pricing parameters for both pricing schemes in terms of bandwidth reservation, registration fee and query plans.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Intra-data-center traffic engineering with ensemble routing 集成路由的数据中心内流量工程
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567017
Ziyu Shao, Xin Jin, Wenjie Jiang, Minghua Chen, M. Chiang
Today's data centers are shared among multiple tenants running a wide range of applications. These applications require a network with a scalable and robust layer-2 network management solution that enables load-balancing and QoS provisioning. Ensemble routing was proposed to achieve management scalability and robustness by using Virtual Local Area Networks (VLANs) and operating on the granularity of flow ensembles, i.e. group of flows. The key challenge of intra-data-center traffic engineering with ensemble routing is the combinatorial optimization of VLAN assignment, i.e., optimally assigning flow ensembles to VLANs to achieve load balancing and low network costs. Based on the Markov approximation framework, we solve the VLAN assignment problem with a general objective function and arbitrary network topologies by designing approximation algorithms with close-to-optimal performance guarantees. We study several properties of our algorithms, including performance optimality, perturbation bound, convergence of algorithms and impacts of algorithmic parameter choices. Then we extend these results to variants of VLAN assignment problem, including interaction with TCP congestion and QoS considerations. We validate our analytical results by conducting extensive numerical experiments. The results show that our algorithms can be tuned to meet different temporal constraints, incorporate fine-grained traffic management, overcome traffic measurement limitations, and tolerate imprecise and incomplete traffic matrices.
今天的数据中心是在运行各种应用程序的多个租户之间共享的。这些应用程序需要具有可扩展且健壮的第二层网络管理解决方案的网络,该解决方案支持负载平衡和QoS供应。集成路由利用虚拟局域网(Virtual Local Area Networks, vlan),在流集成(flow ensembles)的粒度(即流组)上进行操作,以实现管理的可扩展性和鲁棒性。集成路由下的数据中心内流量工程面临的关键挑战是VLAN分配的组合优化,即将流量集成最优地分配到VLAN中,以实现负载均衡和低网络成本。基于马尔可夫近似框架,通过设计性能保证接近最优的近似算法,解决了具有一般目标函数和任意网络拓扑的VLAN分配问题。我们研究了算法的性能最优性、摄动界、算法的收敛性和算法参数选择的影响。然后,我们将这些结果扩展到VLAN分配问题的变体,包括与TCP拥塞的交互和QoS考虑。我们通过大量的数值实验来验证我们的分析结果。结果表明,我们的算法可以调整以满足不同的时间约束,结合细粒度的交通管理,克服交通测量限制,并容忍不精确和不完整的交通矩阵。
{"title":"Intra-data-center traffic engineering with ensemble routing","authors":"Ziyu Shao, Xin Jin, Wenjie Jiang, Minghua Chen, M. Chiang","doi":"10.1109/INFCOM.2013.6567017","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567017","url":null,"abstract":"Today's data centers are shared among multiple tenants running a wide range of applications. These applications require a network with a scalable and robust layer-2 network management solution that enables load-balancing and QoS provisioning. Ensemble routing was proposed to achieve management scalability and robustness by using Virtual Local Area Networks (VLANs) and operating on the granularity of flow ensembles, i.e. group of flows. The key challenge of intra-data-center traffic engineering with ensemble routing is the combinatorial optimization of VLAN assignment, i.e., optimally assigning flow ensembles to VLANs to achieve load balancing and low network costs. Based on the Markov approximation framework, we solve the VLAN assignment problem with a general objective function and arbitrary network topologies by designing approximation algorithms with close-to-optimal performance guarantees. We study several properties of our algorithms, including performance optimality, perturbation bound, convergence of algorithms and impacts of algorithmic parameter choices. Then we extend these results to variants of VLAN assignment problem, including interaction with TCP congestion and QoS considerations. We validate our analytical results by conducting extensive numerical experiments. The results show that our algorithms can be tuned to meet different temporal constraints, incorporate fine-grained traffic management, overcome traffic measurement limitations, and tolerate imprecise and incomplete traffic matrices.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
SpamTracer: How stealthy are spammers? SpamTracer:垃圾邮件发送者有多隐秘?
Pub Date : 2013-04-14 DOI: 10.1109/INFCOMW.2013.6562916
Pierre-Antoine Vervier, Olivier Thonnard
The Internet routing infrastructure is vulnerable to the injection of erroneous routing information resulting in BGP hijacking. Some spammers, also known as fly-by spammers, have been reported using this attack to steal blocks of IP addresses and use them for spamming. Using stolen IP addresses may allow spammers to elude spam filters based on sender IP address reputation and remain stealthy. This remains a open conjecture despite some anecdotal evidences published several years ago. In order to confirm the first observations and reproduce the experiments at large scale, a system called SpamTracer has been developed to monitor the routing behavior of spamming networks using BGP data and IP/AS traceroutes. We then propose a set of specifically tailored heuristics for detecting possible BGP hijacks. Through an extensive experimentation on a six months dataset, we did find a limited number of cases of spamming networks likely hijacked. In one case, the network owner confirmed the hijack. However, from the experiments performed so far, we can conclude that the fly-by spammers phenomenon does not seem to currently be a significant threat.
Internet路由基础设施很容易被错误的路由信息注入,从而导致BGP劫持。据报道,一些垃圾邮件发送者,也被称为垃圾邮件发送者,使用这种攻击来窃取IP地址块并使用它们发送垃圾邮件。使用窃取的IP地址可以让垃圾邮件发送者避开基于发送者IP地址声誉的垃圾邮件过滤器,并保持隐身。尽管几年前发表了一些轶事证据,但这仍然是一个公开的猜想。为了证实最初的观察结果并大规模重现实验,我们开发了一个名为SpamTracer的系统,该系统使用BGP数据和IP/AS traceroutes来监控垃圾邮件网络的路由行为。然后,我们提出了一套专门定制的启发式方法来检测可能的BGP劫持。通过对六个月的数据集进行广泛的实验,我们确实发现了有限数量的垃圾邮件网络可能被劫持的案例。在一个案例中,网络所有者证实了劫持。然而,从目前进行的实验来看,我们可以得出这样的结论:垃圾邮件发送者的飞行现象目前似乎并不是一个重大的威胁。
{"title":"SpamTracer: How stealthy are spammers?","authors":"Pierre-Antoine Vervier, Olivier Thonnard","doi":"10.1109/INFCOMW.2013.6562916","DOIUrl":"https://doi.org/10.1109/INFCOMW.2013.6562916","url":null,"abstract":"The Internet routing infrastructure is vulnerable to the injection of erroneous routing information resulting in BGP hijacking. Some spammers, also known as fly-by spammers, have been reported using this attack to steal blocks of IP addresses and use them for spamming. Using stolen IP addresses may allow spammers to elude spam filters based on sender IP address reputation and remain stealthy. This remains a open conjecture despite some anecdotal evidences published several years ago. In order to confirm the first observations and reproduce the experiments at large scale, a system called SpamTracer has been developed to monitor the routing behavior of spamming networks using BGP data and IP/AS traceroutes. We then propose a set of specifically tailored heuristics for detecting possible BGP hijacks. Through an extensive experimentation on a six months dataset, we did find a limited number of cases of spamming networks likely hijacked. In one case, the network owner confirmed the hijack. However, from the experiments performed so far, we can conclude that the fly-by spammers phenomenon does not seem to currently be a significant threat.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimal incentive-driven design of participatory sensing systems 参与式传感系统的最优激励驱动设计
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566934
I. Koutsopoulos
Participatory sensing has emerged as a novel paradigm for data collection and collective knowledge formation about a state or condition of interest, sometimes linked to a geographic area. In this paper, we address the problem of incentive mechanism design for data contributors for participatory sensing applications. The service provider receives service queries in an area from service requesters and initiates an auction for user participation. Upon request, each user reports its perceived cost per unit of amount of participation, which essentially maps to a requested amount of compensation for participation. The participation cost quantifies the dissatisfaction caused to user due to participation. This cost is considered to be private information for each device, as it strongly depends on various factors inherent to it, such as the energy cost for sensing, data processing and transmission to the closest point of wireless access, the residual battery level, the number of concurrent jobs at the device processor, the required bandwidth to transmit data and the related charges of the mobile network operator, or even the user discomfort due to manual effort to submit data. Hence, participants have strong motive to mis-report their cost, i.e. declare a higher cost that the actual one, so as to obtain higher payment. We seek a mechanism for user participation level determination and payment allocation which is most viable for the provider, that is, it minimizes the total cost of compensating participants, while delivering a certain quality of experience to service requesters. We cast the problem in the context of optimal reverse auction design, and we show how the different quality of submitted information by participants can be tracked by the service provider and used in the participation level and payment selection procedures. We derive a mechanism that optimally solves the problem above, and at the same time it is individually rational (i.e., it motivates users to participate) and incentive-compatible (i.e. it motivates truthful cost reporting by participants). Finally, a representative participatory sensing case study involving parameter estimation is presented, which exemplifies the incentive mechanism above.
参与式感知已成为数据收集和集体知识形成的一种新模式,这种模式有时与地理区域有关。在本文中,我们解决了参与式传感应用中数据贡献者的激励机制设计问题。服务提供者接收来自服务请求者的某个区域内的服务查询,并为用户参与发起拍卖。根据请求,每个用户报告其单位参与量的感知成本,这本质上映射为参与的请求补偿量。参与成本量化了用户因参与而产生的不满意。该成本被认为是每个设备的私有信息,因为它很大程度上取决于其固有的各种因素,例如传感、数据处理和传输到最近的无线接入点的能源成本、剩余电池电量、设备处理器并发作业的数量、传输数据所需的带宽和移动网络运营商的相关费用,甚至是用户因手动提交数据而感到的不适。因此,参与者有很强的动机谎报他们的成本,即宣布比实际成本更高的成本,以获得更高的报酬。我们寻求一种对提供者来说最可行的用户参与水平确定和支付分配机制,即最小化补偿参与者的总成本,同时向服务请求者提供一定质量的体验。我们将问题置于最优逆向拍卖设计的背景下,并展示了服务提供商如何跟踪参与者提交的不同质量的信息,并将其用于参与水平和付款选择程序。我们推导了一种机制,可以最优地解决上述问题,同时它是个体理性的(即,它激励用户参与)和激励兼容的(即,它激励参与者真实的成本报告)。最后,提出了一个具有代表性的涉及参数估计的参与式感知案例研究,以说明上述激励机制。
{"title":"Optimal incentive-driven design of participatory sensing systems","authors":"I. Koutsopoulos","doi":"10.1109/INFCOM.2013.6566934","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566934","url":null,"abstract":"Participatory sensing has emerged as a novel paradigm for data collection and collective knowledge formation about a state or condition of interest, sometimes linked to a geographic area. In this paper, we address the problem of incentive mechanism design for data contributors for participatory sensing applications. The service provider receives service queries in an area from service requesters and initiates an auction for user participation. Upon request, each user reports its perceived cost per unit of amount of participation, which essentially maps to a requested amount of compensation for participation. The participation cost quantifies the dissatisfaction caused to user due to participation. This cost is considered to be private information for each device, as it strongly depends on various factors inherent to it, such as the energy cost for sensing, data processing and transmission to the closest point of wireless access, the residual battery level, the number of concurrent jobs at the device processor, the required bandwidth to transmit data and the related charges of the mobile network operator, or even the user discomfort due to manual effort to submit data. Hence, participants have strong motive to mis-report their cost, i.e. declare a higher cost that the actual one, so as to obtain higher payment. We seek a mechanism for user participation level determination and payment allocation which is most viable for the provider, that is, it minimizes the total cost of compensating participants, while delivering a certain quality of experience to service requesters. We cast the problem in the context of optimal reverse auction design, and we show how the different quality of submitted information by participants can be tracked by the service provider and used in the participation level and payment selection procedures. We derive a mechanism that optimally solves the problem above, and at the same time it is individually rational (i.e., it motivates users to participate) and incentive-compatible (i.e. it motivates truthful cost reporting by participants). Finally, a representative participatory sensing case study involving parameter estimation is presented, which exemplifies the incentive mechanism above.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 326
期刊
2013 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1