首页 > 最新文献

2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)最新文献

英文 中文
Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes 为外包中间件启用保护隐私的报头匹配
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624187
Yu Guo, Cong Wang, Xingliang Yuan, X. Jia
Over the past few years, enterprises start adopting software middlebox services from cloud or NFV service providers. Although this new service model is recognized to be cost-effective and scalable for traffic processing, privacy concerns arise because of traffic redirection to outsourced middleboxes. To ease these concerns, recent efforts are made to design secure middlebox services that can directly function over encrypted traffic and middlebox rules. But prior designs only work for portions of frequently-used network functions. To push forward this area, in this work, we investigate header matching based functions like firewall filtering and packet classification. To enable privacy-preserving processing on encrypted packets, we start from the latest primitive “order-revealing encryption (ORE)” for encrypted range search. In particular, we devise a new practical ORE construction tailored for network functions. The advantages include: 1) guaranteed protection of packet headers and rule specified ranges; 2) reduced accessible information during comparisons; 3) rule-aware size reduction for ORE ciphertexts. We implement a fully functional system prototype and deploy it at Microsoft Azure Cloud. Evaluation results show that our system can achieve per packet matching latency 0.53 to 15.87 millisecond over 1.6K firewall rules.
在过去几年中,企业开始采用云计算或NFV服务提供商提供的软件中间件服务。尽管这种新的服务模型被认为在流量处理方面具有成本效益和可扩展性,但由于流量重定向到外包的中间盒,因此出现了隐私问题。为了缓解这些担忧,最近人们开始努力设计安全的中间箱服务,这些服务可以直接在加密的流量和中间箱规则上运行。但之前的设计只适用于部分常用的网络功能。为了推动这一领域的发展,在本工作中,我们研究了基于头匹配的功能,如防火墙过滤和包分类。为了实现对加密数据包的隐私保护处理,我们从最新的原语“顺序揭示加密(ORE)”开始进行加密范围搜索。特别是,我们为网络功能设计了一种新的实用的ORE结构。其优点包括:1)保证了包头和规则指定范围的保护;2)比较过程中可获取信息减少;3)规则感知的ORE密文大小缩减。我们实现了一个功能齐全的系统原型,并将其部署在Microsoft Azure Cloud上。评估结果表明,在1.6K防火墙规则下,我们的系统可以实现每包匹配延迟0.53 ~ 15.87毫秒。
{"title":"Enabling Privacy-Preserving Header Matching for Outsourced Middleboxes","authors":"Yu Guo, Cong Wang, Xingliang Yuan, X. Jia","doi":"10.1109/IWQoS.2018.8624187","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624187","url":null,"abstract":"Over the past few years, enterprises start adopting software middlebox services from cloud or NFV service providers. Although this new service model is recognized to be cost-effective and scalable for traffic processing, privacy concerns arise because of traffic redirection to outsourced middleboxes. To ease these concerns, recent efforts are made to design secure middlebox services that can directly function over encrypted traffic and middlebox rules. But prior designs only work for portions of frequently-used network functions. To push forward this area, in this work, we investigate header matching based functions like firewall filtering and packet classification. To enable privacy-preserving processing on encrypted packets, we start from the latest primitive “order-revealing encryption (ORE)” for encrypted range search. In particular, we devise a new practical ORE construction tailored for network functions. The advantages include: 1) guaranteed protection of packet headers and rule specified ranges; 2) reduced accessible information during comparisons; 3) rule-aware size reduction for ORE ciphertexts. We implement a fully functional system prototype and deploy it at Microsoft Azure Cloud. Evaluation results show that our system can achieve per packet matching latency 0.53 to 15.87 millisecond over 1.6K firewall rules.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"121 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Online Control of Cloud and Edge Resources Using Inaccurate Predictions 使用不准确的预测在线控制云和边缘资源
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624119
Lei Jiao, A. Tulino, J. Llorca, Yue Jin, A. Sala, Jun Li
We study cloud resource control in the global-local distributed cloud infrastructure. We firstly model and formulate the problem while capturing the multiple challenges such as the inter-dependency between resources and the uncertainty in the inputs. We then propose a novel online algorithm which, via the regularization technique, decouples the original problem into a series of subproblems for individual time slots and solves both the subproblems and the original problem over every prediction time window to jointly make resource allocation decisions. Compared against the offline optimum with accurate inputs, our approach maintains a provable parameterized worst-case performance gap with only inaccurate inputs under certain conditions. Finally, we conduct evaluations with large-scale, real-world data traces and show that our solution outperforms existing methods and works efficiently with near-optimal cost in practice.
研究了全局-局部分布式云基础设施中的云资源控制。我们首先建立模型并制定问题,同时捕捉多重挑战,如资源之间的相互依赖性和输入的不确定性。然后,我们提出了一种新的在线算法,该算法通过正则化技术将原始问题解耦为单个时隙的一系列子问题,并在每个预测时间窗口上同时解决子问题和原始问题,以共同做出资源分配决策。与具有准确输入的离线最优相比,我们的方法在特定条件下仅具有不准确输入时保持可证明的参数化最坏情况性能差距。最后,我们用大规模的真实数据跟踪进行了评估,结果表明我们的解决方案优于现有的方法,并且在实践中以接近最优的成本高效地工作。
{"title":"Online Control of Cloud and Edge Resources Using Inaccurate Predictions","authors":"Lei Jiao, A. Tulino, J. Llorca, Yue Jin, A. Sala, Jun Li","doi":"10.1109/IWQoS.2018.8624119","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624119","url":null,"abstract":"We study cloud resource control in the global-local distributed cloud infrastructure. We firstly model and formulate the problem while capturing the multiple challenges such as the inter-dependency between resources and the uncertainty in the inputs. We then propose a novel online algorithm which, via the regularization technique, decouples the original problem into a series of subproblems for individual time slots and solves both the subproblems and the original problem over every prediction time window to jointly make resource allocation decisions. Compared against the offline optimum with accurate inputs, our approach maintains a provable parameterized worst-case performance gap with only inaccurate inputs under certain conditions. Finally, we conduct evaluations with large-scale, real-world data traces and show that our solution outperforms existing methods and works efficiently with near-optimal cost in practice.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Quality of Experience of Service-Chain Deployment for Multiple Users 提升多用户服务链部署的体验质量
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624167
I-Chih Wang, Charles H.-P. Wen, H. J. Chao
The fifth generation (5G) mobile communication network aims at providing high-rate, low-latency services. When a user subscribes a chain of service functions (a.k.a. service chain) from the telecom providers, a Service Level Agreement (SLA) is specified according to his requirement. Deploying service chains optimally has always been a big issue. Several previous works have presented various strategies of service-chain deployment for optimizing either latency or computational resources; however, over-optimization of latency or computational resource is not necessarily equivalent to improvement on quality of experience. Therefore, in this paper, we formally formulate this problem of optimizing quality of experience with the queuing theory and mixed-integer linear programming. In addition, we propose an efficient algorithm named “QoE-driven Service-Chain Deployment with Latency Prediction” for deploying a service chain for a user in practice. According to the experiments, our algorithm reduces > 99% rejections and > 99% waiting time, notably elevating the quality of experience for users.
第五代(5G)移动通信网络旨在提供高速率、低延迟的服务。当用户向电信运营商订购业务功能链(即服务链)时,根据用户的需求指定服务水平协议SLA (service Level Agreement)。最优地部署服务链一直是一个大问题。以前的一些工作已经提出了各种用于优化延迟或计算资源的服务链部署策略;然而,延迟或计算资源的过度优化并不一定等同于体验质量的提高。因此,本文利用排队论和混合整数线性规划,形式化地表述了这一优化体验质量问题。此外,为了在实践中为用户部署服务链,我们提出了一种高效的算法“qos驱动的带延迟预测的服务链部署”。实验表明,我们的算法减少了> 99%的拒绝率和> 99%的等待时间,显著提高了用户的体验质量。
{"title":"Improving Quality of Experience of Service-Chain Deployment for Multiple Users","authors":"I-Chih Wang, Charles H.-P. Wen, H. J. Chao","doi":"10.1109/IWQoS.2018.8624167","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624167","url":null,"abstract":"The fifth generation (5G) mobile communication network aims at providing high-rate, low-latency services. When a user subscribes a chain of service functions (a.k.a. service chain) from the telecom providers, a Service Level Agreement (SLA) is specified according to his requirement. Deploying service chains optimally has always been a big issue. Several previous works have presented various strategies of service-chain deployment for optimizing either latency or computational resources; however, over-optimization of latency or computational resource is not necessarily equivalent to improvement on quality of experience. Therefore, in this paper, we formally formulate this problem of optimizing quality of experience with the queuing theory and mixed-integer linear programming. In addition, we propose an efficient algorithm named “QoE-driven Service-Chain Deployment with Latency Prediction” for deploying a service chain for a user in practice. According to the experiments, our algorithm reduces > 99% rejections and > 99% waiting time, notably elevating the quality of experience for users.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129846230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Competitive Online Scheduling Algorithms with Applications in Deadline-Constrained EV Charging 竞争在线调度算法在限期约束电动汽车充电中的应用
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624184
B. Alinia, M. S. Talebi, M. Hajiesmaili, Ali Yekkehkhany, N. Crespi
This paper studies the classical problem of online scheduling of deadline-sensitive jobs with partial values and investigates its extension to Electric Vehicle (EV) charging scheduling by taking into account the processing rate limit of jobs and charging station capacity constraint. The problem lies in the category of time-coupled online scheduling problems without availability of future information. This paper proposes two online algorithms, both of which are shown to be $(2-frac{1}{U})$-competitive, where $U$ is the maximum scarcity level, a parameter that indicates demand-to-supply ratio. The first proposed algorithm is deterministic, whereas the second is randomized and enjoys a lower computational complexity. When $U$ grows large, the performance of both algorithms approaches that of the state-of-the-art for the case where there is processing rate limits on the jobs. Nonetheless in realistic cases, where $U$ is typically small, the proposed algorithms enjoy a much lower competitive ratio. To carry out the competitive analysis of our algorithms, we present a proof technique, which is novel to the best of our knowledge. This technique could also be used to simplify the competitive analysis of some existing algorithms, and thus could be of independent interest.
研究了具有偏值的工期敏感作业在线调度的经典问题,并在考虑作业处理速率限制和充电站容量约束的情况下,将其推广到电动汽车充电调度中。该问题属于无未来信息可用性的时间耦合在线调度问题。本文提出了两种在线算法,这两种算法都是$(2-frac{1}{U})$-competitive,其中$U$是最大稀缺水平,一个表示需求供给比的参数。第一种算法是确定性的,而第二种算法是随机的,具有较低的计算复杂度。当$U$变大时,对于有处理速率限制的作业,这两种算法的性能接近最先进的性能。尽管如此,在现实情况下,当$U$通常很小时,所提出的算法享有更低的竞争比率。为了对我们的算法进行竞争性分析,我们提出了一种证明技术,据我们所知,这是一种新颖的技术。这种技术也可以用来简化一些现有算法的竞争性分析,因此可能是独立的兴趣。
{"title":"Competitive Online Scheduling Algorithms with Applications in Deadline-Constrained EV Charging","authors":"B. Alinia, M. S. Talebi, M. Hajiesmaili, Ali Yekkehkhany, N. Crespi","doi":"10.1109/IWQoS.2018.8624184","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624184","url":null,"abstract":"This paper studies the classical problem of online scheduling of deadline-sensitive jobs with partial values and investigates its extension to Electric Vehicle (EV) charging scheduling by taking into account the processing rate limit of jobs and charging station capacity constraint. The problem lies in the category of time-coupled online scheduling problems without availability of future information. This paper proposes two online algorithms, both of which are shown to be $(2-frac{1}{U})$-competitive, where $U$ is the maximum scarcity level, a parameter that indicates demand-to-supply ratio. The first proposed algorithm is deterministic, whereas the second is randomized and enjoys a lower computational complexity. When $U$ grows large, the performance of both algorithms approaches that of the state-of-the-art for the case where there is processing rate limits on the jobs. Nonetheless in realistic cases, where $U$ is typically small, the proposed algorithms enjoy a much lower competitive ratio. To carry out the competitive analysis of our algorithms, we present a proof technique, which is novel to the best of our knowledge. This technique could also be used to simplify the competitive analysis of some existing algorithms, and thus could be of independent interest.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129353394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Slow but Steady: Cap-Based Client-Network Interaction for Improved Streaming Experience 缓慢但稳定:基于cap的客户端网络交互改善流媒体体验
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624170
Vengatanathan Krishnamoorthi, Niklas Carlsson, Emir Halepovic
Due to widespread popularity of streaming services, many streaming clients typically compete over bottleneck links for their own bandwidth share. However, in such environments, the rate adaptation algorithms used by modern streaming clients often result in instability and unfairness, which negatively affects the playback experience. In addition, mobile clients often waste bandwidth by trying to stream excessively high video bitrates. We present and evaluate a cap-based framework in which the network and clients cooperate to improve the overall Quality of Experience (QoE). First, to motivate the framework, we conduct a comprehensive study using the lab setup showing that a fixed rate cap comes with both benefits (e.g., data savings, improved stability and fairness) and drawbacks (e.g., higher startup times and slower recovery after stalls). To address the drawbacks while keeping the benefits, we then introduce and evaluate a framework that includes (i) buffer-aware rate caps in which the network temporarily boosts the rate cap of clients during video startup and under low buffer conditions, and (ii) boost-aware client-side adaptation algorithms that optimize the bitrate selection during the boost periods. Combined with information sharing between the network and clients, these mechanisms are shown to improve QoE, while reducing wasted bandwidth.
由于流媒体服务的广泛普及,许多流媒体客户端通常会在瓶颈链接上竞争自己的带宽份额。然而,在这样的环境下,现代流媒体客户端使用的速率自适应算法往往会导致不稳定和不公平,从而对播放体验产生负面影响。此外,移动客户端经常因为试图传输过高的视频比特率而浪费带宽。我们提出并评估了一个基于cap的框架,在该框架中,网络和客户端合作以提高整体体验质量(QoE)。首先,为了激励框架,我们使用实验室设置进行了全面的研究,表明固定速率上限既有好处(例如,节省数据,提高稳定性和公平性),也有缺点(例如,启动时间较长,失速后恢复较慢)。为了在保持优势的同时解决缺点,我们随后引入并评估了一个框架,该框架包括(i)缓冲感知速率上限,其中网络在视频启动期间和低缓冲条件下暂时提高客户端的速率上限,以及(ii)增强感知的客户端自适应算法,该算法在增强期间优化比特率选择。结合网络和客户机之间的信息共享,这些机制被证明可以提高QoE,同时减少浪费的带宽。
{"title":"Slow but Steady: Cap-Based Client-Network Interaction for Improved Streaming Experience","authors":"Vengatanathan Krishnamoorthi, Niklas Carlsson, Emir Halepovic","doi":"10.1109/IWQoS.2018.8624170","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624170","url":null,"abstract":"Due to widespread popularity of streaming services, many streaming clients typically compete over bottleneck links for their own bandwidth share. However, in such environments, the rate adaptation algorithms used by modern streaming clients often result in instability and unfairness, which negatively affects the playback experience. In addition, mobile clients often waste bandwidth by trying to stream excessively high video bitrates. We present and evaluate a cap-based framework in which the network and clients cooperate to improve the overall Quality of Experience (QoE). First, to motivate the framework, we conduct a comprehensive study using the lab setup showing that a fixed rate cap comes with both benefits (e.g., data savings, improved stability and fairness) and drawbacks (e.g., higher startup times and slower recovery after stalls). To address the drawbacks while keeping the benefits, we then introduce and evaluate a framework that includes (i) buffer-aware rate caps in which the network temporarily boosts the rate cap of clients during video startup and under low buffer conditions, and (ii) boost-aware client-side adaptation algorithms that optimize the bitrate selection during the boost periods. Combined with information sharing between the network and clients, these mechanisms are shown to improve QoE, while reducing wasted bandwidth.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Highlight-Aware Content Placement in Crowdsourced Livecast Services 在众包直播服务中高亮感知的内容放置
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624144
Cong Zhang, Jiangchuan Liu, Haitian Pang, Fangxin Wang
Recent years have witnessed an explosion of crowdsourced livecast (i.e., live broadcast) services, in which any Internet users can act as broadcasters to publish livecasts to fellow viewers. To help grow broadcasters' channels, crowdsourced livecast services provide a past-broadcast saving service, allowing viewers to watch the replays they may have missed. Our real-trace measurement and questionnaire survey show that (1) the duration of most of livecasts is extremely long; (2) a much longer duration largely affects the viewers' Quality-of-Experiences (QoE) when watching the replays. To address this issue and improve viewers' QoE, we propose a crowdsourced framework HighCast based on the interactive messages contributed by the viewers in crowdsourced livecast services. According to a highlight-aware detection module, HighCast can exploit the detection results to schedule the content placement by considering the importance of the predicted streaming highlights. The trace-based evaluations illustrate that the proposed framework improves the prediction accuracy and reduces the viewing latency.
近年来,众包直播(即直播)服务呈爆炸式增长,任何互联网用户都可以作为主播向其他观众发布直播内容。为了帮助广播公司扩大频道,众包直播服务提供了一项保存过去播出的服务,允许观众观看他们可能错过的重播。我们的实时跟踪测量和问卷调查表明:(1)大多数直播的持续时间非常长;(2)较长的持续时间在很大程度上影响了观众观看回放时的体验质量(QoE)。为了解决这一问题,提高观众的QoE,我们提出了一个基于观众在众包直播服务中贡献的互动信息的众包框架HighCast。根据高亮感知检测模块,HighCast可以通过考虑预测的流高亮的重要性来利用检测结果来调度内容放置。基于跟踪的评估表明,该框架提高了预测精度,减少了观看延迟。
{"title":"Highlight-Aware Content Placement in Crowdsourced Livecast Services","authors":"Cong Zhang, Jiangchuan Liu, Haitian Pang, Fangxin Wang","doi":"10.1109/IWQoS.2018.8624144","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624144","url":null,"abstract":"Recent years have witnessed an explosion of crowdsourced livecast (i.e., live broadcast) services, in which any Internet users can act as broadcasters to publish livecasts to fellow viewers. To help grow broadcasters' channels, crowdsourced livecast services provide a past-broadcast saving service, allowing viewers to watch the replays they may have missed. Our real-trace measurement and questionnaire survey show that (1) the duration of most of livecasts is extremely long; (2) a much longer duration largely affects the viewers' Quality-of-Experiences (QoE) when watching the replays. To address this issue and improve viewers' QoE, we propose a crowdsourced framework HighCast based on the interactive messages contributed by the viewers in crowdsourced livecast services. According to a highlight-aware detection module, HighCast can exploit the detection results to schedule the content placement by considering the importance of the predicted streaming highlights. The trace-based evaluations illustrate that the proposed framework improves the prediction accuracy and reduces the viewing latency.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Key Tag Monitoring in RFID Systems RFID系统中实用的关键标签监控
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624117
Jihong Yu, Wei Gong, Jiangchuan Liu, Lin Chen, Fangxin Wang, Haitian Pang
With rapid development of radio frequency identification (RFID) technology, ever-increasing research effort has been dedicated to devising various RFID-enabled services. The key tag monitoring, which is to detect anomaly of key tags, is one of the most important services in such important Internet-of-Things applications as inventory management. Yet prior work assumes that all tags are armed with hashing functionality and a reader would report channel states in every slot, which is not supported by commercial off-the-shelf (COTS) RFID tags and readers. To bridge this gap, this paper is devoted to enabling key tag monitoring service with COTS devices. In particular, we introduce two anomaly monitoring protocols to detect whether there is any key tag absent from the system. The first protocol employs Q-query that works in an analog frame slotted Aloha paradigm to interrogate tags and collect tag IDs. An anomaly event will be found if at least one key tag ID is not present in the collected ones. To reduce time cost of the first protocol resulted from tag collisions, we present a collision-free method that uses select-query to specify a key tag to reply in each slot. Once there is no response in a slot, the specified key tag is regarded as a missing tag. We conduct experiments to evaluate two protocols.
随着无线射频识别(RFID)技术的快速发展,越来越多的研究致力于设计各种支持RFID的服务。在库存管理等重要的物联网应用中,关键标签监控是检测关键标签异常的重要服务之一。然而,先前的工作假设所有标签都配备了散列功能,并且阅读器将报告每个插槽中的通道状态,这是商业现货(COTS) RFID标签和阅读器不支持的。为了弥补这一差距,本文致力于利用COTS设备实现密钥标签监控服务。特别地,我们引入了两种异常监控协议来检测系统中是否缺少密钥标签。第一个协议使用Q-query,它在模拟帧槽Aloha范例中工作,询问标签并收集标签id。如果收集到的关键标签ID中至少有一个不存在,则会发现异常事件。为了减少由于标签冲突而导致的第一种协议的时间开销,我们提出了一种无冲突的方法,该方法使用选择-查询来指定每个槽中要回复的密钥标签。一旦插槽中没有响应,则将指定的密钥标签视为缺失标签。我们进行实验来评估两种方案。
{"title":"Practical Key Tag Monitoring in RFID Systems","authors":"Jihong Yu, Wei Gong, Jiangchuan Liu, Lin Chen, Fangxin Wang, Haitian Pang","doi":"10.1109/IWQoS.2018.8624117","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624117","url":null,"abstract":"With rapid development of radio frequency identification (RFID) technology, ever-increasing research effort has been dedicated to devising various RFID-enabled services. The key tag monitoring, which is to detect anomaly of key tags, is one of the most important services in such important Internet-of-Things applications as inventory management. Yet prior work assumes that all tags are armed with hashing functionality and a reader would report channel states in every slot, which is not supported by commercial off-the-shelf (COTS) RFID tags and readers. To bridge this gap, this paper is devoted to enabling key tag monitoring service with COTS devices. In particular, we introduce two anomaly monitoring protocols to detect whether there is any key tag absent from the system. The first protocol employs Q-query that works in an analog frame slotted Aloha paradigm to interrogate tags and collect tag IDs. An anomaly event will be found if at least one key tag ID is not present in the collected ones. To reduce time cost of the first protocol resulted from tag collisions, we present a collision-free method that uses select-query to specify a key tag to reply in each slot. Once there is no response in a slot, the specified key tag is regarded as a missing tag. We conduct experiments to evaluate two protocols.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125354809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow-Level Traffic Engineering in Conventional Networks with Hop-by-Hop Routing 基于逐跳路由的传统网络流级流量工程
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624179
Nan Geng, Yuan Yang, Mingwei Xu
A fine-grained traffic engineering (TE) that enables per-flow control is considered to be necessary in future Internet. In this paper, we study to realize flow-level TE in conventional networks, where hop-by-hop routing is available, and advanced technologies such as SDN and MPLS are not deployed. Based on analysis and modelling on real Internet traffic, we propose to detect and schedule a few large flows in real time, which dominate the traffic amount. The proposed scheme leverages advanced algorithms for detection, computes the rerouting paths in a centralized server, uses extended OSPF to distribute the routing, and uses a few ACL entries for flow-level forwarding. We formalize the link weight assignment-based large flow scheduling problem and prove that the problem is NP-hard. We develop algorithms to compute the routing and reduce extra LSA number required. We present a set of theoretical results on the TE performance bounds when the number of large flows varies. Experiment and simulation results show that our scheme can reroute large flows within 0.5 second, and the maximum link utilization is within 102% of the optimal solution for source and destination addresses-based flows, while the extra LSA number is small.
细粒度的流量工程(TE)能够实现逐流控制,被认为是未来Internet的必要条件。在本文中,我们研究了在传统网络中实现流级TE,在传统网络中,可以使用逐跳路由,并且没有部署SDN和MPLS等先进技术。在对真实互联网流量进行分析和建模的基础上,提出了实时检测和调度几个在流量中占主导地位的大流量。该方案利用先进的检测算法,在集中服务器上计算重路由路径,使用扩展的OSPF进行路由分配,并使用少量的ACL表项进行流级转发。我们形式化了基于链路权分配的大流量调度问题,并证明了该问题是np困难的。我们开发了计算路由的算法,并减少了额外的LSA数量。我们提出了一组关于大流量数量变化时TE性能界限的理论结果。实验和仿真结果表明,该方案可以在0.5秒内完成大流量的重路由,最大链路利用率在基于源地址和目的地址的流量的最优方案的102%以内,并且额外的LSA数量很小。
{"title":"Flow-Level Traffic Engineering in Conventional Networks with Hop-by-Hop Routing","authors":"Nan Geng, Yuan Yang, Mingwei Xu","doi":"10.1109/IWQoS.2018.8624179","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624179","url":null,"abstract":"A fine-grained traffic engineering (TE) that enables per-flow control is considered to be necessary in future Internet. In this paper, we study to realize flow-level TE in conventional networks, where hop-by-hop routing is available, and advanced technologies such as SDN and MPLS are not deployed. Based on analysis and modelling on real Internet traffic, we propose to detect and schedule a few large flows in real time, which dominate the traffic amount. The proposed scheme leverages advanced algorithms for detection, computes the rerouting paths in a centralized server, uses extended OSPF to distribute the routing, and uses a few ACL entries for flow-level forwarding. We formalize the link weight assignment-based large flow scheduling problem and prove that the problem is NP-hard. We develop algorithms to compute the routing and reduce extra LSA number required. We present a set of theoretical results on the TE performance bounds when the number of large flows varies. Experiment and simulation results show that our scheme can reroute large flows within 0.5 second, and the maximum link utilization is within 102% of the optimal solution for source and destination addresses-based flows, while the extra LSA number is small.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking 通过概率分组标记实现有效的源和路径验证
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624169
Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, M. Reed, Meng Shen, F. Yang
The Internet lacks verification of source authenticity and path compliance between the planned packet delivery paths and the real delivery paths, which allows attackers to construct attacks like source spoofing and traffic hijacking attacks. Thus, it is essential to enable source and path verification in networks to detect forwarding anomalies and ensure correct packet delivery. However, most of the existing security mechanisms can only capture anomalies but are unable to locate the detected anomalies. Besides, they incur significant computation and communication overhead, which exacerbates the packet delivery performance. In this paper, we propose a high-efficient packet forwarding verification mechanism called PPV for networks, which verifies packet source and their forwarding paths in real time. PPV enables probabilistic packet marking in routers instead of verifying all packets. Thus, it can efficiently identify forwarding anomalies by verifying markings. Moreover, it localizes packet forwarding anomalies, e.g., malicious routers, by reconstructing packet forwarding paths based on the packet markings. We implement PPV prototype in Click routers and commodity servers, and conducts real experiments in a real testbed built upon the prototype. The experimental results demonstrate the efficiency and performance of PPV. In particular, PPV significantly improves the throughput and the goodput of forwarding verification, and achieves around 2 times and 3 times improvement compared with the-state-of-art OPT scheme, respectively.
由于Internet缺乏对规划的报文传递路径与实际传输路径之间的源真实性和路径遵从性的验证,使得攻击者可以构造源欺骗、流量劫持等攻击。因此,在网络中启用源路径验证功能,能够及时发现转发异常,保证报文的正确发送。然而,大多数现有的安全机制只能捕获异常,而不能定位检测到的异常。此外,它们还会产生大量的计算和通信开销,从而降低数据包的传输性能。本文提出了一种高效的网络报文转发验证机制PPV,可以实时验证报文的来源和转发路径。PPV在路由器中启用概率标记数据包,而不是对所有数据包进行验证。因此,它可以通过验证标记有效地识别转发异常。此外,它通过基于数据包标记重构数据包转发路径来定位数据包转发异常,例如恶意路由器。我们在Click路由器和商品服务器上实现了PPV原型,并在基于原型的真实测试平台上进行了实际实验。实验结果证明了PPV的效率和性能。特别是,PPV显著提高了转发验证的吞吐量和good - put,与目前最先进的OPT方案相比,分别提高了2倍和3倍左右。
{"title":"Enabling Efficient Source and Path Verification via Probabilistic Packet Marking","authors":"Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, M. Reed, Meng Shen, F. Yang","doi":"10.1109/IWQoS.2018.8624169","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624169","url":null,"abstract":"The Internet lacks verification of source authenticity and path compliance between the planned packet delivery paths and the real delivery paths, which allows attackers to construct attacks like source spoofing and traffic hijacking attacks. Thus, it is essential to enable source and path verification in networks to detect forwarding anomalies and ensure correct packet delivery. However, most of the existing security mechanisms can only capture anomalies but are unable to locate the detected anomalies. Besides, they incur significant computation and communication overhead, which exacerbates the packet delivery performance. In this paper, we propose a high-efficient packet forwarding verification mechanism called PPV for networks, which verifies packet source and their forwarding paths in real time. PPV enables probabilistic packet marking in routers instead of verifying all packets. Thus, it can efficiently identify forwarding anomalies by verifying markings. Moreover, it localizes packet forwarding anomalies, e.g., malicious routers, by reconstructing packet forwarding paths based on the packet markings. We implement PPV prototype in Click routers and commodity servers, and conducts real experiments in a real testbed built upon the prototype. The experimental results demonstrate the efficiency and performance of PPV. In particular, PPV significantly improves the throughput and the goodput of forwarding verification, and achieves around 2 times and 3 times improvement compared with the-state-of-art OPT scheme, respectively.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Software-Defined Label Switching: Scalable Per-Flow Control in SDN 软件定义标签交换:SDN中可扩展的逐流控制
Pub Date : 2018-06-01 DOI: 10.1109/IWQoS.2018.8624177
Nanyang Huang, Qing Li, Dong Lin, Xiaowen Li, Gengbiao Shen, Yong Jiang
Deploying Software-Defined Networks (SDNs) faces various challenges, and one of them is to implement per-flow control while preserving data plane scalability. Due to the limited rule storage space of commodity SDN switches, achieving flexible control and having a low-latency data plane with a low storage cost are often at odds. Unfortunately, existing SDN architectures fail to implement per-flow control efficiently: they either incur extra delays to packets or pose high storage burden to switches. In this paper, we propose Software-Defined Label Switching (SDLS) to achieve both data plane scalability and per-flow control. SDLS combines central control with label switching to reduce storage burden while maintaining per-flow control. SDLS introduces software switches into the data plane and manages the network in regions for scalability. SDLS is OpenFlow-compatible and employs a hybrid data plane to provide efficient flow setups. We evaluate SDLS by comparing with the state-of-the-art SDN architectures and show that SDLS can rival the best on the latency performance while reducing the number of flow entries and overflows by more than 47%.
部署软件定义网络(sdn)面临着各种挑战,其中之一是在保持数据平面可伸缩性的同时实现每流控制。由于商品SDN交换机的规则存储空间有限,实现灵活的控制和具有低存储成本的低延迟数据平面往往是矛盾的。不幸的是,现有的SDN架构不能有效地实现每流控制:它们要么导致数据包的额外延迟,要么给交换机带来很高的存储负担。在本文中,我们提出了软件定义标签交换(SDLS)来实现数据平面可扩展性和每流控制。SDLS将中央控制与标签切换相结合,以减少存储负担,同时保持每流控制。SDLS将软件交换机引入数据平面,并管理区域内的网络以实现可扩展性。SDLS与openflow兼容,并采用混合数据平面来提供高效的流设置。我们通过与最先进的SDN架构进行比较来评估SDLS,并表明SDLS在延迟性能上可以与最佳性能相媲美,同时将流条目和溢出的数量减少了47%以上。
{"title":"Software-Defined Label Switching: Scalable Per-Flow Control in SDN","authors":"Nanyang Huang, Qing Li, Dong Lin, Xiaowen Li, Gengbiao Shen, Yong Jiang","doi":"10.1109/IWQoS.2018.8624177","DOIUrl":"https://doi.org/10.1109/IWQoS.2018.8624177","url":null,"abstract":"Deploying Software-Defined Networks (SDNs) faces various challenges, and one of them is to implement per-flow control while preserving data plane scalability. Due to the limited rule storage space of commodity SDN switches, achieving flexible control and having a low-latency data plane with a low storage cost are often at odds. Unfortunately, existing SDN architectures fail to implement per-flow control efficiently: they either incur extra delays to packets or pose high storage burden to switches. In this paper, we propose Software-Defined Label Switching (SDLS) to achieve both data plane scalability and per-flow control. SDLS combines central control with label switching to reduce storage burden while maintaining per-flow control. SDLS introduces software switches into the data plane and manages the network in regions for scalability. SDLS is OpenFlow-compatible and employs a hybrid data plane to provide efficient flow setups. We evaluate SDLS by comparing with the state-of-the-art SDN architectures and show that SDLS can rival the best on the latency performance while reducing the number of flow entries and overflows by more than 47%.","PeriodicalId":222290,"journal":{"name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124850500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1