首页 > 最新文献

2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Black Hole Search in Dynamic Rings 动态环中的黑洞搜索
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00098
G. A. D. Luna, P. Flocchini, G. Prencipe, N. Santoro
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dynamic networks. The danger is posed by the presence in the network of a black hole (BH), a harmful site that destroys all incoming agents without leaving any trace. The problem of determining the location of the black hole in a network, known as black hole search (BHS), has been extensively studied in the literature, but always and only assuming that the network is static. At the same time, the existing results on mobile agents computing in dynamic networks never consider the presence of harmful sites. In this paper we start filling this research gap by studying black hole search in temporal rings, specifically focusing on 1-interval connectivity adversarial dynamics. The main complexity parameter of BHS is the number of agents (called size) needed to solve the problem; other parameters are the number of moves (called cost) performed by the agents, and the time until termination. Feasibility and complexity depend on many factors; the size n of the ring, whether or not n is known, and the type of inter-agent communication (whiteboards, tokens, face-to-face, visual). In this paper, we provide a complete feasibility characterization presenting size optimal algorithms. Furthermore, we establish lower bounds on the cost and time of size-optimal solutions and show that our algorithms achieve those bounds.
本文开始研究危险动态网络中移动代理的分布式计算问题。这种危险是由黑洞(BH)网络中的存在造成的,黑洞是一个有害的地方,它会摧毁所有进入的物质,不留任何痕迹。确定网络中黑洞位置的问题,即黑洞搜索(BHS),已经在文献中得到了广泛的研究,但总是且仅假设网络是静态的。同时,现有的动态网络移动代理计算结果没有考虑有害站点的存在。在本文中,我们通过研究时间环中的黑洞搜索来填补这一研究空白,特别是关注1区间连通性对抗动力学。BHS的主要复杂度参数是解决问题所需的agent数量(称为size);其他参数是代理执行的移动次数(称为成本),以及直到终止的时间。可行性和复杂性取决于许多因素;环的大小n,无论n是否已知,以及代理间通信的类型(白板、令牌、面对面、视觉)。在本文中,我们提供了一个完整的可行性表征,提出了尺寸优化算法。此外,我们建立了规模最优解的成本和时间的下界,并证明我们的算法达到了这些下界。
{"title":"Black Hole Search in Dynamic Rings","authors":"G. A. D. Luna, P. Flocchini, G. Prencipe, N. Santoro","doi":"10.1109/ICDCS51616.2021.00098","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00098","url":null,"abstract":"In this paper, we start the investigation of distributed computing by mobile agents in dangerous dynamic networks. The danger is posed by the presence in the network of a black hole (BH), a harmful site that destroys all incoming agents without leaving any trace. The problem of determining the location of the black hole in a network, known as black hole search (BHS), has been extensively studied in the literature, but always and only assuming that the network is static. At the same time, the existing results on mobile agents computing in dynamic networks never consider the presence of harmful sites. In this paper we start filling this research gap by studying black hole search in temporal rings, specifically focusing on 1-interval connectivity adversarial dynamics. The main complexity parameter of BHS is the number of agents (called size) needed to solve the problem; other parameters are the number of moves (called cost) performed by the agents, and the time until termination. Feasibility and complexity depend on many factors; the size n of the ring, whether or not n is known, and the type of inter-agent communication (whiteboards, tokens, face-to-face, visual). In this paper, we provide a complete feasibility characterization presenting size optimal algorithms. Furthermore, we establish lower bounds on the cost and time of size-optimal solutions and show that our algorithms achieve those bounds.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115146791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Poster: Fragmentation Attacks on DNS over TCP 海报:基于TCP的DNS分片攻击
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00118
Tianxiang Dai, Haya Shulman, M. Waidner
The research and operational community believe that TCP provides protection against IP fragmentation based attacks and recommend that servers avoid sending responses over UDP and use TCP instead. In this work we show for the first time that IP fragmentation attacks may also apply to communication over TCP. We perform a study of the nameservers in the 100K-top Alexa domains and find that 454 domains are vulnerable to IP fragmentation attacks. Of these domains, we find 366 additional domains that are vulnerable only to IP fragmentation attacks on communication with TCP. We also find that the servers vulnerable to TCP fragmentation can be forced to fragment packets to much smaller sizes (of less than 292 bytes) than servers vulnerable to UDP fragmentation (not below 548 bytes). This makes the impact of the attacks against servers vulnerable to fragmentation of TCP segments much more detrimental. Our study not only shows that the recommendation to use TCP and avoid UDP is risky but it also shows that the attack surface due to fragmentation is larger than was previously believed. We evaluate known IP fragmentation-based DNS cache poisoning attacks against DNS responses over TCP.
研究和运营社区认为,TCP提供了针对基于IP碎片的攻击的保护,并建议服务器避免通过UDP发送响应,而是使用TCP。在这项工作中,我们首次展示了IP碎片攻击也可以应用于TCP上的通信。我们对100k顶级Alexa域名中的域名服务器进行了研究,发现454个域名容易受到IP碎片攻击。在这些域中,我们发现366个附加域仅容易受到与TCP通信的IP碎片攻击。我们还发现,易受TCP碎片攻击的服务器可以被迫将数据包碎片化到比易受UDP碎片攻击的服务器(不低于548字节)小得多的大小(小于292字节)。这使得针对易受TCP段碎片影响的服务器的攻击的影响更加有害。我们的研究不仅表明使用TCP和避免UDP的建议是有风险的,而且还表明由于碎片的攻击面比以前认为的要大。我们评估了已知的基于IP碎片的DNS缓存中毒攻击,针对TCP上的DNS响应。
{"title":"Poster: Fragmentation Attacks on DNS over TCP","authors":"Tianxiang Dai, Haya Shulman, M. Waidner","doi":"10.1109/ICDCS51616.2021.00118","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00118","url":null,"abstract":"The research and operational community believe that TCP provides protection against IP fragmentation based attacks and recommend that servers avoid sending responses over UDP and use TCP instead. In this work we show for the first time that IP fragmentation attacks may also apply to communication over TCP. We perform a study of the nameservers in the 100K-top Alexa domains and find that 454 domains are vulnerable to IP fragmentation attacks. Of these domains, we find 366 additional domains that are vulnerable only to IP fragmentation attacks on communication with TCP. We also find that the servers vulnerable to TCP fragmentation can be forced to fragment packets to much smaller sizes (of less than 292 bytes) than servers vulnerable to UDP fragmentation (not below 548 bytes). This makes the impact of the attacks against servers vulnerable to fragmentation of TCP segments much more detrimental. Our study not only shows that the recommendation to use TCP and avoid UDP is risky but it also shows that the attack surface due to fragmentation is larger than was previously believed. We evaluate known IP fragmentation-based DNS cache poisoning attacks against DNS responses over TCP.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: An Efficient Permissioned Blockchain with Provable Reputation Mechanism 海报:具有可证明信誉机制的高效许可区块链
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00123
Hongyin Chen, Zhaohua Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Jichen Li, Hongyi Ling, Mengqian Zhang
Permissioned blockchains take more reliability on participants than permissionless ones. In this poster, we focus on a hierarchical scenario of permissioned blockchains, which includes three types of participants: providers, collectors, and governors. Such a scenario has many applications in the field of IoT data collection, horizontal strategic alliances, etc. Our object is to reduce the cost of the governor's transaction verification. For this purpose, we propose a reputation protocol to help the governor measure the reliability of collectors. Based on the measurement of collectors' reputations, governors can pack high-quality transactions from reliable collectors into blocks, and thus the cost of verifying transactions can be decreased effectively. Through theoretical analysis, our protocol dramatically reduces the verification loss of governors.
有许可的区块链比无许可的区块链对参与者的可靠性更高。在这张海报上,我们专注于许可区块链的分层场景,其中包括三种类型的参与者:提供者、收集器和管理者。这种场景在物联网数据采集、横向战略联盟等领域有很多应用。我们的目标是降低调控器事务验证的成本。为此,我们提出了一个信誉协议来帮助调控器测量收集器的可靠性。基于对收集器声誉的度量,管理者可以将来自可靠收集器的高质量交易打包到块中,从而有效地降低验证交易的成本。通过理论分析,我们的方案大大降低了调控器的验证损失。
{"title":"Poster: An Efficient Permissioned Blockchain with Provable Reputation Mechanism","authors":"Hongyin Chen, Zhaohua Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Jichen Li, Hongyi Ling, Mengqian Zhang","doi":"10.1109/ICDCS51616.2021.00123","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00123","url":null,"abstract":"Permissioned blockchains take more reliability on participants than permissionless ones. In this poster, we focus on a hierarchical scenario of permissioned blockchains, which includes three types of participants: providers, collectors, and governors. Such a scenario has many applications in the field of IoT data collection, horizontal strategic alliances, etc. Our object is to reduce the cost of the governor's transaction verification. For this purpose, we propose a reputation protocol to help the governor measure the reliability of collectors. Based on the measurement of collectors' reputations, governors can pack high-quality transactions from reliable collectors into blocks, and thus the cost of verifying transactions can be decreased effectively. Through theoretical analysis, our protocol dramatically reduces the verification loss of governors.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132896734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MinSum Movement of Barrier and Target Coverage using Sink-based Mobile Sensors on the Plane 基于sink的平面移动传感器对障碍物和目标覆盖的最小和运动
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00072
Longkun Guo, Wenjie Zou, Chenchen Wu, Dachuan Xu, D. Du
Emerging IoT applications have brought up new coverage problems with sink-based mobile sensors. In this paper, we first focus on the MinSum Sink-based Line Barrier Coverage (SLBC) problem of covering a line barrier with mobile sensors originated at sink stations distributed on the plane. The objective is to minimize the movement sum of the sensors for the sake of energy efficiency. When the sinks emit sensors with non-uniform radii, we prove the MinSum SLBC problem is $mathcal{NP}$ -complete via reducing from the Partition problem that is known $mathcal{NP}$ - complete. Then for the MinSum Sink-based on-a-Line Target Coverage (SLTC) problem of covering targets on a line, an exact algorithm is presented based on grouping the targets and transforming to the shortest path problem in the auxiliary graph induced by the vertices corresponding to the groups. The algorithm runs in time $O(n^{2})$ when sinks emit sensors of uniform sensing radius, and in time $O(vert Rvert ^{2}n^{2})$ for sensors of non-uniform radii, where $n$ and $vert Rvert$ are respectively the number of targets and different radii. Eventually for SLBC, we propose a pseudo additive fully polynomial-time approximation scheme by extending the algorithm for SLTC. The algorithm runs in $O(k^{2}(frac{L}{epsilon})^{2})$ time and computes a coverage with total movement provably bounded by $opt+epsilon$ for any fixed sufficiently small $epsilon > 0$, where $opt, k$ and $L$ are respectively the movement of an optimum solution, the number of sinks and the length of the barrier. At last, experiments are carried out to demonstrate the practical performance gain of our algorithms.
新兴的物联网应用给基于接收器的移动传感器带来了新的覆盖问题。本文首先研究了基于MinSum sink的线路屏障覆盖(SLBC)问题,即利用分布在平面上的汇聚站的移动传感器覆盖线路屏障。其目标是最小化传感器的移动总和,以提高能源效率。当sink发射半径不均匀的传感器时,我们通过将已知的Partition问题简化为$mathcal{NP}$ -complete来证明MinSum SLBC问题是$mathcal{NP}$ -complete的。然后,针对基于MinSum sink的在线目标覆盖问题(SLTC),提出了一种基于目标分组的精确算法,并将其转化为由分组对应的顶点诱导的辅助图中的最短路径问题。当sink发射均匀感知半径的传感器时,算法运行时间为$O(n^{2})$;当sink发射非均匀感知半径的传感器时,算法运行时间为$O(vert Rvert ^{2}n^{2})$,其中$n$和$vert Rvert$分别为目标个数和不同半径。最后,对SLBC算法进行了扩展,提出了一种伪加性全多项式时间逼近格式。该算法在$O(k^{2}(frac{L}{epsilon})^{2})$时间内运行,并计算出对于任何固定的足够小的$epsilon > 0$,总移动的覆盖范围可证明为$opt+epsilon$,其中$opt, k$和$L$分别是最优解的移动,sink的数量和障碍物的长度。最后,通过实验验证了算法的实际性能增益。
{"title":"MinSum Movement of Barrier and Target Coverage using Sink-based Mobile Sensors on the Plane","authors":"Longkun Guo, Wenjie Zou, Chenchen Wu, Dachuan Xu, D. Du","doi":"10.1109/ICDCS51616.2021.00072","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00072","url":null,"abstract":"Emerging IoT applications have brought up new coverage problems with sink-based mobile sensors. In this paper, we first focus on the MinSum Sink-based Line Barrier Coverage (SLBC) problem of covering a line barrier with mobile sensors originated at sink stations distributed on the plane. The objective is to minimize the movement sum of the sensors for the sake of energy efficiency. When the sinks emit sensors with non-uniform radii, we prove the MinSum SLBC problem is $mathcal{NP}$ -complete via reducing from the Partition problem that is known $mathcal{NP}$ - complete. Then for the MinSum Sink-based on-a-Line Target Coverage (SLTC) problem of covering targets on a line, an exact algorithm is presented based on grouping the targets and transforming to the shortest path problem in the auxiliary graph induced by the vertices corresponding to the groups. The algorithm runs in time $O(n^{2})$ when sinks emit sensors of uniform sensing radius, and in time $O(vert Rvert ^{2}n^{2})$ for sensors of non-uniform radii, where $n$ and $vert Rvert$ are respectively the number of targets and different radii. Eventually for SLBC, we propose a pseudo additive fully polynomial-time approximation scheme by extending the algorithm for SLTC. The algorithm runs in $O(k^{2}(frac{L}{epsilon})^{2})$ time and computes a coverage with total movement provably bounded by $opt+epsilon$ for any fixed sufficiently small $epsilon > 0$, where $opt, k$ and $L$ are respectively the movement of an optimum solution, the number of sinks and the length of the barrier. At last, experiments are carried out to demonstrate the practical performance gain of our algorithms.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133114362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SRUF: Low-Latency Path Routing with SRv6 Underlay Federation in Wide Area Network SRUF:基于SRv6底层联合的广域网低延迟路径路由
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00091
Bangbang Ren, Deke Guo, Guoming Tang, Weijun Wang, Lailong Luo, Xiaoming Fu
Existing Internet routing protocols much focus on providing interconnection service for independent autonomous systems (ASes) rather than end-to-end low latency transmission. Nowadays, a growing number of applications and platforms have high requirements for low latency. However, developing new routing protocols in the wide area network that provides low latency routing service is very challenging, and remains an open problem due to the obstacles of compatibility, feasibility, scalability and efficiency. On the other hand, the ignorance of latency performance results in triangle inequality violations (TIV). In this paper, we leverage TIV and a new routing technology, SRv6, to build a new distributed routing protocol, SRv6 underlay federation (SRUF), which aims to provide low-latency routing services in network core. We design a novel method to find alternative paths with lower latency between any pair of ASes in SRUF. This method can achieve high scalability as it incurs only $O(n)$ bandwidth overhead in each member of SRUF. SRv6 is then employed to steer the flows along the selected indirect low-latency paths, while keeping compatibility to legacy routing systems. The experimental results with realworld datasets demonstrate that SRUF can effectively reduce the average end-to-end delay by 5.4% ~ 58.9%.
现有的Internet路由协议更多地侧重于为独立自治系统(as)提供互连服务,而不是端到端的低延迟传输。如今,越来越多的应用程序和平台对低延迟有很高的要求。然而,在广域网中开发新的路由协议以提供低延迟路由服务是非常具有挑战性的,由于兼容性、可行性、可扩展性和效率的障碍,仍然是一个悬而未决的问题。另一方面,忽略延迟性能会导致三角不等式违反(TIV)。在本文中,我们利用TIV和一种新的路由技术SRv6,构建了一种新的分布式路由协议,SRv6底层联邦(SRUF),旨在提供网络核心的低延迟路由服务。我们设计了一种新的方法来寻找SRUF中任意一对ase之间具有较低延迟的替代路径。该方法在每个SRUF成员中只产生$O(n)$带宽开销,具有较高的可扩展性。然后使用SRv6来引导流沿着所选的间接低延迟路径,同时保持与遗留路由系统的兼容性。在实际数据集上的实验结果表明,SRUF可以有效地将端到端平均延迟降低5.4% ~ 58.9%。
{"title":"SRUF: Low-Latency Path Routing with SRv6 Underlay Federation in Wide Area Network","authors":"Bangbang Ren, Deke Guo, Guoming Tang, Weijun Wang, Lailong Luo, Xiaoming Fu","doi":"10.1109/ICDCS51616.2021.00091","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00091","url":null,"abstract":"Existing Internet routing protocols much focus on providing interconnection service for independent autonomous systems (ASes) rather than end-to-end low latency transmission. Nowadays, a growing number of applications and platforms have high requirements for low latency. However, developing new routing protocols in the wide area network that provides low latency routing service is very challenging, and remains an open problem due to the obstacles of compatibility, feasibility, scalability and efficiency. On the other hand, the ignorance of latency performance results in triangle inequality violations (TIV). In this paper, we leverage TIV and a new routing technology, SRv6, to build a new distributed routing protocol, SRv6 underlay federation (SRUF), which aims to provide low-latency routing services in network core. We design a novel method to find alternative paths with lower latency between any pair of ASes in SRUF. This method can achieve high scalability as it incurs only $O(n)$ bandwidth overhead in each member of SRUF. SRv6 is then employed to steer the flows along the selected indirect low-latency paths, while keeping compatibility to legacy routing systems. The experimental results with realworld datasets demonstrate that SRUF can effectively reduce the average end-to-end delay by 5.4% ~ 58.9%.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems 一种实用的基于边信道的增材制造系统入侵检测系统
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00106
Sizhuang Liang, Xirui Peng, H. Qi, Saman A. Zonouz, R. Beyah
We propose NSYNC, a practical framework to compare side-channel signals for real-time intrusion detection in Additive Manufacturing (AM) systems. The motivation to develop NSYNC is that we find AM systems are asynchronous in nature and there is random variation in timing in a printing process. Although this random variation, referred to as time noise, is very small compared with the duration of a printing process, it can cause existing Intrusion Detection Systems (IDSs) to fail. To deal with this problem, NSYNC incorporates a dynamic synchronizer to find the timing relationship between two signals. This timing relationship, referred to as the horizontal displacement, can not only be used to mitigate the adverse effect of time noise on calculating the (vertical) distance between signals, but also be used as indicators for intrusion detection. An existing dynamic synchronizer is Dynamic Time Warping (DTW). However, we found in experiments that DTW not only consumes an excessive amount of computational resources but also has limited accuracy for processing side-channel signals. To solve this problem, we propose a novel dynamic synchronizer, called Dynamic Window Matching (DWM), to replace DTW. To compare NSYNC against existing IDSs, we built a data acquisition system that is capable of collecting six different types of side-channel signals and performed a total of 302 benign printing processes and a total of 200 malicious printing processes with two printers. Our experiment results show that existing IDSs leveraging side-channel signals in AM systems can only achieve an accuracy from 0.50 to 0.88, whereas our proposed NSYNC can reach an accuracy of 0.99.
我们提出了NSYNC,这是一个实用的框架,用于比较增材制造(AM)系统中实时入侵检测的侧信道信号。开发NSYNC的动机是,我们发现AM系统本质上是异步的,并且在打印过程中定时存在随机变化。尽管这种随机变化(称为时间噪声)与打印过程的持续时间相比非常小,但它可能导致现有的入侵检测系统(ids)失败。为了解决这个问题,NSYNC集成了一个动态同步器来查找两个信号之间的时序关系。这种时序关系称为水平位移,不仅可以用来减轻时间噪声对计算信号之间(垂直)距离的不利影响,而且可以作为入侵检测的指标。现有的动态同步器是动态时间规整(DTW)。然而,我们在实验中发现,DTW不仅消耗了过多的计算资源,而且处理侧信道信号的精度也有限。为了解决这个问题,我们提出了一种新的动态同步器,称为动态窗口匹配(DWM),以取代DTW。为了将NSYNC与现有的ids进行比较,我们构建了一个数据采集系统,该系统能够收集六种不同类型的侧通道信号,并在两台打印机上执行了总共302个良性打印过程和总共200个恶意打印过程。我们的实验结果表明,在调幅系统中利用侧信道信号的现有ids只能达到0.50到0.88的精度,而我们提出的NSYNC可以达到0.99的精度。
{"title":"A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems","authors":"Sizhuang Liang, Xirui Peng, H. Qi, Saman A. Zonouz, R. Beyah","doi":"10.1109/ICDCS51616.2021.00106","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00106","url":null,"abstract":"We propose NSYNC, a practical framework to compare side-channel signals for real-time intrusion detection in Additive Manufacturing (AM) systems. The motivation to develop NSYNC is that we find AM systems are asynchronous in nature and there is random variation in timing in a printing process. Although this random variation, referred to as time noise, is very small compared with the duration of a printing process, it can cause existing Intrusion Detection Systems (IDSs) to fail. To deal with this problem, NSYNC incorporates a dynamic synchronizer to find the timing relationship between two signals. This timing relationship, referred to as the horizontal displacement, can not only be used to mitigate the adverse effect of time noise on calculating the (vertical) distance between signals, but also be used as indicators for intrusion detection. An existing dynamic synchronizer is Dynamic Time Warping (DTW). However, we found in experiments that DTW not only consumes an excessive amount of computational resources but also has limited accuracy for processing side-channel signals. To solve this problem, we propose a novel dynamic synchronizer, called Dynamic Window Matching (DWM), to replace DTW. To compare NSYNC against existing IDSs, we built a data acquisition system that is capable of collecting six different types of side-channel signals and performed a total of 302 benign printing processes and a total of 200 malicious printing processes with two printers. Our experiment results show that existing IDSs leveraging side-channel signals in AM systems can only achieve an accuracy from 0.50 to 0.88, whereas our proposed NSYNC can reach an accuracy of 0.99.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"149 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120869297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EPA-Route: Routing Payment Channel Network with High Success Rate and Low Payment Fees EPA-Route:路由支付通道网络,成功率高,支付费用低
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00030
Han Xue, Qun Huang, Yungang Bao
Existing blockchain systems suffer from low throughput and high payment latency. Payment channel networks (PCNs) such as the Lightning Network are proposed as a viable scaling solution. In PCNs, two participants can establish a payment channel to transfer funds without manipulating the blockchain. However, PCNs must route transactions between not directly connected participants on paths with sufficient funds. Since link capacities in PCNs vary as transactions are performed, it is hard to apply classical techniques to route PCN transactions directly. In this paper, we propose EPA-Route, a routing algorithm that aims to achieve both a high success rate and low transaction fees for PCNs. In addition, EPA-Route still maintains high performance and decentralization characteristics. In EPA-Route, every participant maintains a routing table. For every transaction, EPA-Route first probes possible paths based on the routing table and prunes useless paths at every hop to alleviate overheads. After a collection of paths obtained after probing and pruning, EPA-Route splits the transaction into several sub-transactions and allocates them to these paths. The allocation is formulated as an optimization problem to minimize transaction fees. Extensive experiments show that EPA-Route reduces up to 85 % transaction fees and maintains a comparable success rate as state-of-the-art algorithms.
现有的区块链系统存在低吞吐量和高支付延迟的问题。像闪电网络这样的支付通道网络(pcn)被认为是一种可行的扩展解决方案。在pcn中,两个参与者可以建立一个支付通道来转移资金,而无需操纵区块链。然而,pcn必须在没有直接连接的参与者之间路由交易,路径上有足够的资金。由于PCN中的链路容量随事务的执行而变化,因此很难应用经典技术直接路由PCN事务。在本文中,我们提出了EPA-Route,一种旨在实现pcn高成功率和低交易费用的路由算法。此外,EPA-Route仍然保持了高性能和分散性的特点。在EPA-Route中,每个参与者维护一个路由表。对于每个事务,EPA-Route首先根据路由表探测可能的路径,并在每一跳处删除无用的路径,以减少开销。EPA-Route在探测和剪枝得到一组路径后,将事务分成若干子事务,并分配给这些路径。该分配被表述为最小化交易费用的优化问题。大量的实验表明,EPA-Route减少了高达85%的交易费用,并保持了与最先进算法相当的成功率。
{"title":"EPA-Route: Routing Payment Channel Network with High Success Rate and Low Payment Fees","authors":"Han Xue, Qun Huang, Yungang Bao","doi":"10.1109/ICDCS51616.2021.00030","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00030","url":null,"abstract":"Existing blockchain systems suffer from low throughput and high payment latency. Payment channel networks (PCNs) such as the Lightning Network are proposed as a viable scaling solution. In PCNs, two participants can establish a payment channel to transfer funds without manipulating the blockchain. However, PCNs must route transactions between not directly connected participants on paths with sufficient funds. Since link capacities in PCNs vary as transactions are performed, it is hard to apply classical techniques to route PCN transactions directly. In this paper, we propose EPA-Route, a routing algorithm that aims to achieve both a high success rate and low transaction fees for PCNs. In addition, EPA-Route still maintains high performance and decentralization characteristics. In EPA-Route, every participant maintains a routing table. For every transaction, EPA-Route first probes possible paths based on the routing table and prunes useless paths at every hop to alleviate overheads. After a collection of paths obtained after probing and pruning, EPA-Route splits the transaction into several sub-transactions and allocates them to these paths. The allocation is formulated as an optimization problem to minimize transaction fees. Extensive experiments show that EPA-Route reduces up to 85 % transaction fees and maintains a comparable success rate as state-of-the-art algorithms.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121478352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MAD for FANETs: Movement Assisted Delivery for Flying Ad-hoc Networks MAD for FANETs:飞行Ad-hoc网络的运动辅助交付
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00038
N. Bartolini, Andrea Coletta, Andrea Gennaro, G. Maselli, Matteo Prata
The fast and unconstrained mobility of Flying Ad-hoc NETworks (FANETs) brings about the need to develop solutions for packet routing in a highly dynamic topology scenario. Previous works in this direction aim at extending protocols designed for Mobile Ad-hoc NETworks (MANETs) to the more challenging domain of FANETs. Unlike previous approaches, we aim at exploiting the device controllable mobility to facilitate network routing. We propose MAD (Movement Assisted Delivery): a packet routing protocol specifically tailored for networks of aerial vehicles. MAD enables adaptive selection of the most suitable relay nodes for packet delivery, resorting to movement-assisted delivery upon need, which is supported by a reinforcement learning approach. By means of extensive simulations we show that MAD outperforms previous solutions in all the considered performance metrics including average packet delay, delivery ratio, and communication overhead, at the expense of a moderate loss in average device availability.
飞行自组织网络(fanet)的快速和不受约束的移动性带来了在高度动态拓扑场景下开发分组路由解决方案的需求。在此方向上的先前工作旨在将为移动自组织网络(manet)设计的协议扩展到更具挑战性的fanet领域。与以往的方法不同,我们的目标是利用设备的可控移动性来促进网络路由。我们提出了MAD(运动辅助递送):一种专门为空中交通工具网络量身定制的数据包路由协议。MAD能够自适应选择最合适的中继节点进行数据包传递,根据需要采用运动辅助传递,这是由强化学习方法支持的。通过广泛的模拟,我们表明MAD在所有考虑的性能指标上都优于以前的解决方案,包括平均数据包延迟、传输比和通信开销,但代价是平均设备可用性的适度损失。
{"title":"MAD for FANETs: Movement Assisted Delivery for Flying Ad-hoc Networks","authors":"N. Bartolini, Andrea Coletta, Andrea Gennaro, G. Maselli, Matteo Prata","doi":"10.1109/ICDCS51616.2021.00038","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00038","url":null,"abstract":"The fast and unconstrained mobility of Flying Ad-hoc NETworks (FANETs) brings about the need to develop solutions for packet routing in a highly dynamic topology scenario. Previous works in this direction aim at extending protocols designed for Mobile Ad-hoc NETworks (MANETs) to the more challenging domain of FANETs. Unlike previous approaches, we aim at exploiting the device controllable mobility to facilitate network routing. We propose MAD (Movement Assisted Delivery): a packet routing protocol specifically tailored for networks of aerial vehicles. MAD enables adaptive selection of the most suitable relay nodes for packet delivery, resorting to movement-assisted delivery upon need, which is supported by a reinforcement learning approach. By means of extensive simulations we show that MAD outperforms previous solutions in all the considered performance metrics including average packet delay, delivery ratio, and communication overhead, at the expense of a moderate loss in average device availability.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Vertical Cuckoo Filters: A Family of Insertion-friendly Sketches for Online Applications 垂直杜鹃过滤器:一个家庭插入友好的草图在线应用程序
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00015
Pengtao Fu, Lailong Luo, Shangsen Li, Deke Guo, Geyao Cheng, Yun Zhou
Cuckoo filter (CF) and its variants are emerging as replacements of Bloom filters in various networking and distributed systems to support efficient set representation and membership testing. Cuckoo filters store item fingerprints directly with two candidate buckets and a reallocation scheme is implemented to mitigate the bucket overflow problem for higher space utilization. Such a reallocation scheme, once triggered, however, can be time-consuming. This shortcoming makes the existing CFs not applicable for insertion-intensive scenarios such as online applications wherein the items join and leave frequently. To this end, in this paper, we propose the Vertical Cuckoo filter (VCF) which extends the standard Cuckoo filter by providing more candidate buckets to each item. Another challenging issue with such a design is how to ensure that the candidate buckets can be indexed by each other such that no additional hash computation and item access are necessary during fingerprint reallocation. Therefore, we present the vertical hashing, which indexes the candidate buckets with the fingerprint and given bitmasks. We further generalize and improve the VCF by realizing $k$ (≥ 4) candidate buckets and avoiding unnecessary computation. The comprehensive experiments indicate that VCF outperforms its same kinds in terms of space utilization and insertion throughput, with a slight compromise of lookup speed.
布谷鸟过滤器(CF)及其变体正在各种网络和分布式系统中作为布隆过滤器的替代品出现,以支持有效的集合表示和成员测试。Cuckoo过滤器直接在两个候选桶中存储项目指纹,并实现了一种重新分配方案来缓解桶溢出问题,以获得更高的空间利用率。然而,这种重新分配方案一旦被触发,可能会很耗时。这个缺点使得现有的cf不适用于插入密集的场景,例如在线应用程序,其中项目频繁加入和离开。为此,本文提出了垂直杜鹃过滤器(Vertical Cuckoo filter, VCF),它在标准杜鹃过滤器的基础上进行了扩展,为每个项目提供了更多的候选桶。这种设计的另一个具有挑战性的问题是如何确保候选桶可以相互索引,从而在指纹重新分配期间不需要额外的哈希计算和项访问。因此,我们提出了垂直散列,它用指纹和给定的位掩码对候选桶进行索引。通过实现$k$(≥4)个候选桶并避免不必要的计算,进一步推广和改进了VCF。综合实验表明,VCF在空间利用率和插入吞吐量方面优于同类算法,但查找速度略有降低。
{"title":"The Vertical Cuckoo Filters: A Family of Insertion-friendly Sketches for Online Applications","authors":"Pengtao Fu, Lailong Luo, Shangsen Li, Deke Guo, Geyao Cheng, Yun Zhou","doi":"10.1109/ICDCS51616.2021.00015","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00015","url":null,"abstract":"Cuckoo filter (CF) and its variants are emerging as replacements of Bloom filters in various networking and distributed systems to support efficient set representation and membership testing. Cuckoo filters store item fingerprints directly with two candidate buckets and a reallocation scheme is implemented to mitigate the bucket overflow problem for higher space utilization. Such a reallocation scheme, once triggered, however, can be time-consuming. This shortcoming makes the existing CFs not applicable for insertion-intensive scenarios such as online applications wherein the items join and leave frequently. To this end, in this paper, we propose the Vertical Cuckoo filter (VCF) which extends the standard Cuckoo filter by providing more candidate buckets to each item. Another challenging issue with such a design is how to ensure that the candidate buckets can be indexed by each other such that no additional hash computation and item access are necessary during fingerprint reallocation. Therefore, we present the vertical hashing, which indexes the candidate buckets with the fingerprint and given bitmasks. We further generalize and improve the VCF by realizing $k$ (≥ 4) candidate buckets and avoiding unnecessary computation. The comprehensive experiments indicate that VCF outperforms its same kinds in terms of space utilization and insertion throughput, with a slight compromise of lookup speed.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Incentive-Driven Long-term Optimization for Edge Learning by Hierarchical Reinforcement Mechanism 基于层次强化机制的边缘学习激励驱动的长期优化
Pub Date : 2021-07-01 DOI: 10.1109/ICDCS51616.2021.00013
Yi Liu, Leijie Wu, Yufeng Zhan, Song Guo, Zicong Hong
Edge Learning is an emerging distributed machine learning in mobile edge network. Limited works have designed mechanisms to incentivize edge nodes to participate in edge learning. However, their mechanisms only consider myopia optimization on resource consumption, which results in the lack of learning algorithm performance guarantee and longterm sustainability. In this paper, we propose Chiron, an incentive-driven long-term mechanism for edge learning based on hierarchical deep reinforcement learning. First, our optimization goal combines learning-algorithms metric (i.e., model accuracy) with system metric (i.e., learning time, and resource consumption), which can improve edge learning quality under a fixed training budget. Second, we present a two-layer H-DRL design with exterior and inner agents to achieve both long-term and short-term optimization for edge learning, respectively. Finally, experiments on three different real-world datasets are conducted to demonstrate the superiority of our proposed approach. In particular, compared with the state-of-the-art methods under the same budget constraint, the final global model accuracy and time efficiency can be increased by 6.5 % and 39 %, respectively. Our implementation is available at https://github.com/Joey61Liuyi/Chiron.
边缘学习是一种新兴的移动边缘网络分布式机器学习。有限的研究设计了激励边缘节点参与边缘学习的机制。然而,它们的机制只考虑了资源消耗的短视优化,导致学习算法缺乏性能保证和长期可持续性。在本文中,我们提出了一种基于分层深度强化学习的激励驱动的边缘学习长期机制Chiron。首先,我们的优化目标结合了学习算法度量(即模型精度)和系统度量(即学习时间和资源消耗),这可以在固定的训练预算下提高边缘学习质量。其次,我们提出了一种具有外部和内部代理的双层H-DRL设计,分别实现了边缘学习的长期和短期优化。最后,在三个不同的真实数据集上进行了实验,以证明我们提出的方法的优越性。特别是,在相同的预算约束下,与目前最先进的方法相比,最终的全局模型精度和时间效率分别提高了6.5%和39%。我们的实现可以在https://github.com/Joey61Liuyi/Chiron上获得。
{"title":"Incentive-Driven Long-term Optimization for Edge Learning by Hierarchical Reinforcement Mechanism","authors":"Yi Liu, Leijie Wu, Yufeng Zhan, Song Guo, Zicong Hong","doi":"10.1109/ICDCS51616.2021.00013","DOIUrl":"https://doi.org/10.1109/ICDCS51616.2021.00013","url":null,"abstract":"Edge Learning is an emerging distributed machine learning in mobile edge network. Limited works have designed mechanisms to incentivize edge nodes to participate in edge learning. However, their mechanisms only consider myopia optimization on resource consumption, which results in the lack of learning algorithm performance guarantee and longterm sustainability. In this paper, we propose Chiron, an incentive-driven long-term mechanism for edge learning based on hierarchical deep reinforcement learning. First, our optimization goal combines learning-algorithms metric (i.e., model accuracy) with system metric (i.e., learning time, and resource consumption), which can improve edge learning quality under a fixed training budget. Second, we present a two-layer H-DRL design with exterior and inner agents to achieve both long-term and short-term optimization for edge learning, respectively. Finally, experiments on three different real-world datasets are conducted to demonstrate the superiority of our proposed approach. In particular, compared with the state-of-the-art methods under the same budget constraint, the final global model accuracy and time efficiency can be increased by 6.5 % and 39 %, respectively. Our implementation is available at https://github.com/Joey61Liuyi/Chiron.","PeriodicalId":222376,"journal":{"name":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1