首页 > 最新文献

2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)最新文献

英文 中文
Bi-objective optimization of availability and cost for cloud services 云服务可用性和成本的双目标优化
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013618
André Bento, J. Soares, António Ferreira, J. Durães, Jose J. H. Ferreira, R. Carreira, Filipe Araújo, Raul Barbosa
Cloud-based services are a current approach for developing large-scale applications with advantages such as flexibility, access to on-demand resources, and business agility. The overall application functionality results from complex interactions of many decoupled services, each having its operational specificity. Due to this complexity, the manual configuration of these systems is very arduous, error-prone and likely to impair the quality of service, leading to malfunctioning services, lowering availability and accruing costs. Identifying the optimal solution to simultaneously optimize availability and costs, whilst meeting service level objectives remains a challenge for professionals developing solutions using cloud services. This paper proposes a mathematical formulation of a bi-objective problem to identify the optimal set of solutions for the system configuration. Empirical evaluation of the proposed approach in a case study of a real industrial scenario results in an R-Squared of 0.85, an MSE of 0.021 and an optimization accuracy of 0.928. These methods can help practitioners to keep services at an optimum configuration enabling autonomic service operation, whilst improving availability and cost.
基于云的服务是开发大规模应用程序的当前方法,具有灵活性、对按需资源的访问和业务敏捷性等优点。整个应用程序功能来自许多解耦服务的复杂交互,每个服务都有其操作特殊性。由于这种复杂性,这些系统的手动配置非常困难,容易出错,并且可能损害服务质量,导致服务故障,降低可用性并增加成本。对于使用云服务开发解决方案的专业人员来说,确定最佳解决方案以同时优化可用性和成本,同时满足服务水平目标仍然是一个挑战。本文提出了一个双目标问题的数学公式,以确定系统配置的最优解集。在实际工业场景中对该方法进行了实证评估,结果表明,该方法的r平方为0.85,MSE为0.021,优化精度为0.928。这些方法可以帮助从业者将服务保持在最佳配置,从而支持自主服务操作,同时提高可用性和成本。
{"title":"Bi-objective optimization of availability and cost for cloud services","authors":"André Bento, J. Soares, António Ferreira, J. Durães, Jose J. H. Ferreira, R. Carreira, Filipe Araújo, Raul Barbosa","doi":"10.1109/NCA57778.2022.10013618","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013618","url":null,"abstract":"Cloud-based services are a current approach for developing large-scale applications with advantages such as flexibility, access to on-demand resources, and business agility. The overall application functionality results from complex interactions of many decoupled services, each having its operational specificity. Due to this complexity, the manual configuration of these systems is very arduous, error-prone and likely to impair the quality of service, leading to malfunctioning services, lowering availability and accruing costs. Identifying the optimal solution to simultaneously optimize availability and costs, whilst meeting service level objectives remains a challenge for professionals developing solutions using cloud services. This paper proposes a mathematical formulation of a bi-objective problem to identify the optimal set of solutions for the system configuration. Empirical evaluation of the proposed approach in a case study of a real industrial scenario results in an R-Squared of 0.85, an MSE of 0.021 and an optimization accuracy of 0.928. These methods can help practitioners to keep services at an optimum configuration enabling autonomic service operation, whilst improving availability and cost.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analytic hierarchy process (AHP) based UAV selection mechanism for beyond 5G networks 基于层次分析法的超5G网络无人机选择机制
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013547
S. Sridevi, Jacob Augustine, S. K. Ghosh
In beyond 5G (B5G) network, unmanned aerial vehicle (UAV) is considered as a promising solution to improve network coverage and satisfy the wide variety of service requirements. In B5G, mobile terminals (MTs) will be able to connect to UAVs flying in different altitudes and serving different classes of applications such as enhanced mobile broadband (eMBB), ultra reliable low latency communication (uRLLC) and security intensive applications such as security as a service (SaaS). It may be noted that UAVs in high altitude incur high power consumption, but reduced secrecy throughput and packet loss. In contrast, lower altitude UAVs incur high packet loss and secrecy throughput with reduced power consumption. Due to such trade-off and the fact that the traditional user association problem is NP hard, selecting an appropriate UAV to satisfy the user requirement is a computationally challenging task. In this work, an UAV selection mechanism has been proposed for UAV enabled B5G network based on analytic hierarchy process (AHP) which essentially captures the aforementioned trade-off while associating the MTs with the UAVs. The proposed AHP selects the best UAV based on the application class. Simulation results show that the proposed UAV selection mechanism outperforms the existing best downlink (BD) based approach in terms of user throughput, secrecy throughput and packet loss rate.
在超5G (B5G)网络中,无人机(UAV)被认为是提高网络覆盖和满足各种业务需求的有前途的解决方案。在B5G中,移动终端(mt)将能够连接在不同高度飞行的无人机,并服务于不同类别的应用,如增强型移动宽带(eMBB)、超可靠低延迟通信(uRLLC)和安全密集型应用,如安全即服务(SaaS)。值得注意的是,高空无人机产生高功耗,但降低了保密吞吐量和丢包。相比之下,低空无人机在降低功耗的情况下产生高丢包和保密吞吐量。由于这种权衡和传统的用户关联问题是NP困难的,选择合适的无人机来满足用户需求是一项具有计算挑战性的任务。在这项工作中,提出了一种基于层次分析法(AHP)的无人机选择机制,用于支持无人机的B5G网络,该机制在将mt与无人机关联的同时,从本质上捕获了上述权衡。提出的层次分析法根据应用类别选择最佳无人机。仿真结果表明,提出的无人机选择机制在用户吞吐量、保密吞吐量和丢包率方面都优于现有的基于最佳下行链路(best downlink, BD)的方法。
{"title":"An analytic hierarchy process (AHP) based UAV selection mechanism for beyond 5G networks","authors":"S. Sridevi, Jacob Augustine, S. K. Ghosh","doi":"10.1109/NCA57778.2022.10013547","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013547","url":null,"abstract":"In beyond 5G (B5G) network, unmanned aerial vehicle (UAV) is considered as a promising solution to improve network coverage and satisfy the wide variety of service requirements. In B5G, mobile terminals (MTs) will be able to connect to UAVs flying in different altitudes and serving different classes of applications such as enhanced mobile broadband (eMBB), ultra reliable low latency communication (uRLLC) and security intensive applications such as security as a service (SaaS). It may be noted that UAVs in high altitude incur high power consumption, but reduced secrecy throughput and packet loss. In contrast, lower altitude UAVs incur high packet loss and secrecy throughput with reduced power consumption. Due to such trade-off and the fact that the traditional user association problem is NP hard, selecting an appropriate UAV to satisfy the user requirement is a computationally challenging task. In this work, an UAV selection mechanism has been proposed for UAV enabled B5G network based on analytic hierarchy process (AHP) which essentially captures the aforementioned trade-off while associating the MTs with the UAVs. The proposed AHP selects the best UAV based on the application class. Simulation results show that the proposed UAV selection mechanism outperforms the existing best downlink (BD) based approach in terms of user throughput, secrecy throughput and packet loss rate.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation-based state machine replication 基于信誉的状态机复制
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013518
Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
State machine replication (SMR) allows nodes to jointly maintain a consistent ledger, even when a part of nodes are Byzantine. To defend against and/or limit the impact of attacks launched by Byzantine nodes, there have been blocks that combine reputation mechanisms to SMR, where each node has a reputation value based on its historical behaviours, and the node’s voting power will be proportional to its reputation. Despite the promising features of reputation-based SMR, existing studies do not provide formal treatment on the reputation mechanism on SMR protocols, including the types of behaviours affecting the reputation, the security properties of the reputation mechanism, and the extra security properties of SMR using reputation mechanisms.In this paper, we provide the first formal study on the reputation-based SMR. We define the security properties of the reputation mechanism w.r.t. these misbehaviours. Based on the formalisation of the reputation mechanism, we formally define the reputation-based SMR, and identify a new property reputation-consistency that is necessary for ensuring reputation-based SMR’s safety. We then design a simple reputation mechanism that achieves all security properties in our formal model. To demonstrate the practicality, we combine our reputation mechanism to the Sync-HotStuff SMR protocol, yielding a simple and efficient reputation-based SMR at the cost of only an extra ∆ in latency, where ∆ is the maximum delay in synchronous networks.
状态机复制(SMR)允许节点共同维护一致的分类账,即使部分节点是拜占庭式的。为了防御和/或限制拜占庭节点发起的攻击的影响,已经有一些区块将声誉机制与SMR结合起来,其中每个节点根据其历史行为具有声誉值,并且节点的投票权将与其声誉成正比。尽管基于声誉的SMR具有很好的特性,但现有的研究并没有对SMR协议的声誉机制进行正式的处理,包括影响声誉的行为类型、声誉机制的安全属性以及使用声誉机制的SMR的额外安全属性。本文首次对基于声誉的中小企业管理关系进行了正式研究。我们根据这些错误行为定义信誉机制的安全属性。在声誉机制形式化的基础上,我们正式定义了基于声誉的SMR,并确定了确保基于声誉的SMR安全所必需的新属性声誉一致性。然后,我们设计了一个简单的声誉机制来实现我们正式模型中的所有安全属性。为了证明其实用性,我们将我们的声誉机制与Sync-HotStuff SMR协议结合起来,产生了一个简单而高效的基于声誉的SMR,而代价只是额外的延迟∆,其中∆是同步网络中的最大延迟。
{"title":"Reputation-based state machine replication","authors":"Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu","doi":"10.1109/NCA57778.2022.10013518","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013518","url":null,"abstract":"State machine replication (SMR) allows nodes to jointly maintain a consistent ledger, even when a part of nodes are Byzantine. To defend against and/or limit the impact of attacks launched by Byzantine nodes, there have been blocks that combine reputation mechanisms to SMR, where each node has a reputation value based on its historical behaviours, and the node’s voting power will be proportional to its reputation. Despite the promising features of reputation-based SMR, existing studies do not provide formal treatment on the reputation mechanism on SMR protocols, including the types of behaviours affecting the reputation, the security properties of the reputation mechanism, and the extra security properties of SMR using reputation mechanisms.In this paper, we provide the first formal study on the reputation-based SMR. We define the security properties of the reputation mechanism w.r.t. these misbehaviours. Based on the formalisation of the reputation mechanism, we formally define the reputation-based SMR, and identify a new property reputation-consistency that is necessary for ensuring reputation-based SMR’s safety. We then design a simple reputation mechanism that achieves all security properties in our formal model. To demonstrate the practicality, we combine our reputation mechanism to the Sync-HotStuff SMR protocol, yielding a simple and efficient reputation-based SMR at the cost of only an extra ∆ in latency, where ∆ is the maximum delay in synchronous networks.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124664792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Causal Ordering Properties of Byzantine Reliable Broadcast Primitives 拜占庭可靠广播原语的因果排序性质
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013634
Anshuman Misra, A. Kshemkalyani
In this paper, we examine the inherent properties of the Byzantine Reliable Broadcast (BRB) primitive as pertain to the ability to provide causal ordering. We prove the following results. First, we analyze Bracha’s BRB algorithm and show that under the failure-free model, safety is guaranteed across broadcasts. Second, we also prove that Bracha’s BRB algorithm guarantees safety across broadcasts under the crash failure model tolerating any number of crash failures. Third, we prove that Bracha’s BRB algorithm cannot provide weak or strong safety under the Byzantine failure model. Fourth, we prove that neither the Imbs-Raynal BRB protocol nor any (2,*)-round BRB protocol can provide causal order even if all processes are correct, and they must incur additional latency to causally order messages at a higher layer. The inherent causal ordering properties of Bracha’s BRB can be of use under favourable circumstances in practical applications, given the widespread adoption of the protocol.
在本文中,我们研究了拜占庭可靠广播(BRB)原语在提供因果排序能力方面的固有性质。我们证明了以下结果。首先,我们分析了Bracha的BRB算法,证明了在无故障模型下,跨广播的安全性得到了保证。其次,我们还证明了Bracha的BRB算法在允许任意数量的崩溃故障的崩溃故障模型下保证了跨广播的安全性。第三,我们证明了Bracha的BRB算法在拜占庭失效模型下不能提供弱或强安全性。第四,我们证明了imb - raynal BRB协议和任何(2,*)轮BRB协议都不能提供因果顺序,即使所有的进程都是正确的,它们必须产生额外的延迟才能在更高层对消息进行因果顺序。鉴于协议的广泛采用,Bracha BRB固有的因果排序特性在实际应用中可以在有利的情况下使用。
{"title":"Causal Ordering Properties of Byzantine Reliable Broadcast Primitives","authors":"Anshuman Misra, A. Kshemkalyani","doi":"10.1109/NCA57778.2022.10013634","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013634","url":null,"abstract":"In this paper, we examine the inherent properties of the Byzantine Reliable Broadcast (BRB) primitive as pertain to the ability to provide causal ordering. We prove the following results. First, we analyze Bracha’s BRB algorithm and show that under the failure-free model, safety is guaranteed across broadcasts. Second, we also prove that Bracha’s BRB algorithm guarantees safety across broadcasts under the crash failure model tolerating any number of crash failures. Third, we prove that Bracha’s BRB algorithm cannot provide weak or strong safety under the Byzantine failure model. Fourth, we prove that neither the Imbs-Raynal BRB protocol nor any (2,*)-round BRB protocol can provide causal order even if all processes are correct, and they must incur additional latency to causally order messages at a higher layer. The inherent causal ordering properties of Bracha’s BRB can be of use under favourable circumstances in practical applications, given the widespread adoption of the protocol.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"27 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Zero Trust approach for the cybersecurity of Industrial Control Systems 工业控制系统网络安全的零信任方法
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013559
Claudio Zanasi, Federico Magnanini, S. Russo, M. Colajanni
Industrial plants are adopting an increasing number of digital interconnected technologies that are enriched by several software applications. The IT/OT convergence offers several benefits in terms of efficiency and flexibility but it opens as many issues in terms of cyber vulnerabilities because industrial plants were not designed to be open to Internet. The frequency of successful cyber attacks shows that typical security solutions are inadequate to the novel complexity of industrial contexts. This novel scenario requires original approaches differing from traditional multi-layer networking solutions that are applicable just to rigid and stable infrastructures. We explore the applicability of Zero Trust Architecture (ZTA) principles to the industrial context by designing, implementing and testing an integrated defensive solution. The results obtained through a working prototype show that it is possible to implement a Zero Trust identity-centric approach in an industrial context to increase the security and flexibility of the system while providing complete visibility over the entire network. The proposed approach can be used to strengthen legacy industrial systems that were designed for offline use, and to allow the adoption of innovative technologies that minimize the cyber risk for the overall infrastructure.
工业工厂正在采用越来越多的数字互联技术,这些技术被一些软件应用程序所丰富。IT/OT的融合在效率和灵活性方面提供了一些好处,但它也带来了许多网络漏洞问题,因为工业工厂并不是为互联网开放而设计的。成功网络攻击的频率表明,典型的安全解决方案不足以应对工业环境的新复杂性。这种新颖的场景需要与传统的多层网络解决方案不同的原始方法,传统的多层网络解决方案只适用于刚性和稳定的基础设施。我们通过设计、实现和测试一个集成防御解决方案来探索零信任架构(ZTA)原则在工业环境中的适用性。通过工作原型获得的结果表明,可以在工业环境中实现以身份为中心的零信任方法,以提高系统的安全性和灵活性,同时提供整个网络的完整可见性。所提出的方法可用于加强为离线使用而设计的传统工业系统,并允许采用创新技术,将整体基础设施的网络风险降至最低。
{"title":"A Zero Trust approach for the cybersecurity of Industrial Control Systems","authors":"Claudio Zanasi, Federico Magnanini, S. Russo, M. Colajanni","doi":"10.1109/NCA57778.2022.10013559","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013559","url":null,"abstract":"Industrial plants are adopting an increasing number of digital interconnected technologies that are enriched by several software applications. The IT/OT convergence offers several benefits in terms of efficiency and flexibility but it opens as many issues in terms of cyber vulnerabilities because industrial plants were not designed to be open to Internet. The frequency of successful cyber attacks shows that typical security solutions are inadequate to the novel complexity of industrial contexts. This novel scenario requires original approaches differing from traditional multi-layer networking solutions that are applicable just to rigid and stable infrastructures. We explore the applicability of Zero Trust Architecture (ZTA) principles to the industrial context by designing, implementing and testing an integrated defensive solution. The results obtained through a working prototype show that it is possible to implement a Zero Trust identity-centric approach in an industrial context to increase the security and flexibility of the system while providing complete visibility over the entire network. The proposed approach can be used to strengthen legacy industrial systems that were designed for offline use, and to allow the adoption of innovative technologies that minimize the cyber risk for the overall infrastructure.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Causality in the Presence of Byzantine Processes: There is No Holy Grail 在拜占庭过程中发现因果关系:没有圣杯
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013644
Anshuman Misra, A. Kshemkalyani
Detecting causality or the happens before relation between events in an asynchronous distributed system is a fundamental building block for distributed applications. To the best of our knowledge, this problem has not been examined in a system with Byzantine processes. We prove the following results for an asynchronous system with Byzantine processes. (1) We prove that it is impossible to determine causality between events in the presence of even a single Byzantine process when processes communicate by unicasting. (2) We also prove a similar impossibility result when processes communicate by broadcasting. (3) We also prove a similar impossibility result when processes communicate by multicasting. (4) In an execution where there exists a causal path between two events passing through only correct processes, the impossibility result for unicasts remains. (5) However, when processes communicate by broadcasting and there exists a causal path between two events passing through only correct processes, it is possible to detect causality between such a pair of events. (6) In an execution where processes communicate by multicasting and there exists a causal path between two events passing through only correct processes, we prove that the impossibility result for multicasts remains.
在异步分布式系统中,检测事件之间的因果关系或之前发生的关系是分布式应用程序的基本构建块。据我们所知,这个问题还没有在一个具有拜占庭过程的系统中得到检验。对于具有拜占庭进程的异步系统,我们证明了以下结果。(1)我们证明,当过程以单播方式通信时,即使存在单个拜占庭过程,也不可能确定事件之间的因果关系。(2)我们也证明了进程间广播通信的不可能性。(3)我们还证明了进程间通过组播进行通信时的类似不可能结果。(4)在执行过程中,如果两个事件之间存在因果路径,则单播的不可能结果仍然存在。(5)然而,当过程通过广播进行通信,并且两个事件之间存在因果路径时,只有通过正确的过程,才有可能检测到这对事件之间的因果关系。(6)在一个进程间通过组播通信,且两个事件之间存在因果路径的执行中,我们证明了组播的不可能结果仍然存在。
{"title":"Detecting Causality in the Presence of Byzantine Processes: There is No Holy Grail","authors":"Anshuman Misra, A. Kshemkalyani","doi":"10.1109/NCA57778.2022.10013644","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013644","url":null,"abstract":"Detecting causality or the happens before relation between events in an asynchronous distributed system is a fundamental building block for distributed applications. To the best of our knowledge, this problem has not been examined in a system with Byzantine processes. We prove the following results for an asynchronous system with Byzantine processes. (1) We prove that it is impossible to determine causality between events in the presence of even a single Byzantine process when processes communicate by unicasting. (2) We also prove a similar impossibility result when processes communicate by broadcasting. (3) We also prove a similar impossibility result when processes communicate by multicasting. (4) In an execution where there exists a causal path between two events passing through only correct processes, the impossibility result for unicasts remains. (5) However, when processes communicate by broadcasting and there exists a causal path between two events passing through only correct processes, it is possible to detect causality between such a pair of events. (6) In an execution where processes communicate by multicasting and there exists a causal path between two events passing through only correct processes, we prove that the impossibility result for multicasts remains.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
In-depth analysis of the IDA-Gossip protocol 深入分析IDA-Gossip协议
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013564
K. Korkmaz, Joachim Bruneau-Queyreix, Stéphane Delbruel, Sonia Ben Mokhtar, Laurent Réveillère
Gossip-based dissemination protocols are important building blocks of large-scale distributed systems as they may impact both the systems’ efficiency and fault tolerance. There exist many flavors of gossip dissemination protocols. IDA-Gossip is one of the gossip dissemination protocols proposed in the context of blockchains to efficiently disseminate large messages. It relies on multi-chunk gossip dissemination, erasure coding, and Merkle hash trees. However, despite its claimed efficiency, there is no in-depth analysis of this protocol to understand its behavior under different conditions (e.g., with injected faults). In this work, we evaluate the behavior of IDA-Gossip by relying on extensive experiments and simulations. Specifically, we evaluate IDA-Gossip both in terms of performance and resilience to faults by varying its configuration parameters and the number of faulty nodes, respectively. This study results in several takeaways. First, IDA-Gossip provides excellent dissemination latency compared to classic gossip. Second, it provides excellent coverage even with 40 percent of faulty nodes in the system. Finally, the use of erasure coding provides an important advantage to IDA-Gossip compared to classic multi-chunk gossip dissemination protocols.
基于八卦的传播协议是大规模分布式系统的重要组成部分,因为它们可能影响系统的效率和容错性。八卦传播协议有很多种。IDA-Gossip是在区块链背景下提出的八卦传播协议之一,用于高效传播大型消息。它依赖于多块八卦传播、擦除编码和Merkle哈希树。然而,尽管它声称效率高,但没有对该协议进行深入分析,以了解其在不同条件下(例如,注入断层)的行为。在这项工作中,我们通过大量的实验和模拟来评估IDA-Gossip的行为。具体来说,我们分别通过改变其配置参数和故障节点数量来评估IDA-Gossip的性能和故障恢复能力。这项研究得出了几点结论。首先,与经典八卦相比,IDA-Gossip提供了出色的传播延迟。其次,即使系统中有40%的故障节点,它也能提供出色的覆盖。最后,与经典的多块八卦传播协议相比,使用擦除编码为IDA-Gossip提供了一个重要的优势。
{"title":"In-depth analysis of the IDA-Gossip protocol","authors":"K. Korkmaz, Joachim Bruneau-Queyreix, Stéphane Delbruel, Sonia Ben Mokhtar, Laurent Réveillère","doi":"10.1109/NCA57778.2022.10013564","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013564","url":null,"abstract":"Gossip-based dissemination protocols are important building blocks of large-scale distributed systems as they may impact both the systems’ efficiency and fault tolerance. There exist many flavors of gossip dissemination protocols. IDA-Gossip is one of the gossip dissemination protocols proposed in the context of blockchains to efficiently disseminate large messages. It relies on multi-chunk gossip dissemination, erasure coding, and Merkle hash trees. However, despite its claimed efficiency, there is no in-depth analysis of this protocol to understand its behavior under different conditions (e.g., with injected faults). In this work, we evaluate the behavior of IDA-Gossip by relying on extensive experiments and simulations. Specifically, we evaluate IDA-Gossip both in terms of performance and resilience to faults by varying its configuration parameters and the number of faulty nodes, respectively. This study results in several takeaways. First, IDA-Gossip provides excellent dissemination latency compared to classic gossip. Second, it provides excellent coverage even with 40 percent of faulty nodes in the system. Finally, the use of erasure coding provides an important advantage to IDA-Gossip compared to classic multi-chunk gossip dissemination protocols.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternating MPR: a balanced broadcast algorithm for MANETs 交替MPR:一种面向manet的均衡广播算法
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013596
Aymeric Agon-Rambosson, Jonathan Lejeune, Julien Sopena, Pierre Sens
Mobile Ad-Hoc Networks (MANETs) assume no previous network infrastructure and wireless communication between mobile and heterogeneous nodes. An efficient broadcast protocol is therefore paramount. When some neighborhood information is available beforehand through discovery, building a virtual overlay like MultiPoint Relay (MPR) can help improve reliability and decrease cost in messages. However, MPR overlays tend to unfairly stress specific nodes who happen to be well-connected, causing their premature death. We propose the alternating MPR protocol that strives to build several disjoint relay sets for each node, allowing broadcast messages to use each of them in turn. Our simulation of the full network stack of systems of various densities shows that alternating MPR spreads energy costs more evenly across the system, without harming reliability and at little cost in number of messages, allowing battery-powered nodes to survive longer.
移动自组织网络(manet)无需预先建立网络基础设施,在移动和异构节点之间进行无线通信。因此,高效的广播协议至关重要。当一些邻居信息可以通过发现预先获得时,建立像多点中继(MPR)这样的虚拟覆盖层有助于提高消息的可靠性和降低成本。然而,MPR覆盖往往不公平地强调碰巧连接良好的特定节点,导致它们过早死亡。我们提出交替MPR协议,力求为每个节点建立几个不相交的中继集,允许广播消息轮流使用它们。我们对各种密度系统的全网络堆栈的模拟表明,交替MPR在整个系统中更均匀地分散能量成本,而不会损害可靠性,并且在消息数量上的成本很小,从而允许电池供电的节点存活更长时间。
{"title":"Alternating MPR: a balanced broadcast algorithm for MANETs","authors":"Aymeric Agon-Rambosson, Jonathan Lejeune, Julien Sopena, Pierre Sens","doi":"10.1109/NCA57778.2022.10013596","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013596","url":null,"abstract":"Mobile Ad-Hoc Networks (MANETs) assume no previous network infrastructure and wireless communication between mobile and heterogeneous nodes. An efficient broadcast protocol is therefore paramount. When some neighborhood information is available beforehand through discovery, building a virtual overlay like MultiPoint Relay (MPR) can help improve reliability and decrease cost in messages. However, MPR overlays tend to unfairly stress specific nodes who happen to be well-connected, causing their premature death. We propose the alternating MPR protocol that strives to build several disjoint relay sets for each node, allowing broadcast messages to use each of them in turn. Our simulation of the full network stack of systems of various densities shows that alternating MPR spreads energy costs more evenly across the system, without harming reliability and at little cost in number of messages, allowing battery-powered nodes to survive longer.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133189722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of Machine Learning at the Network Edge to Detect Industrial IoT Faults 机器学习在网络边缘检测工业物联网故障的性能研究
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013585
Yuri Santo, B. Dalmazo, R. Immich, Andre Riker
Industrial Internet-of-Things (IoT) massively deploys intelligent computing in industrial production and manufacturing environments seeking automation, reliability, and control. Machine Learning models provide intelligent decisions to drive manufacturing systems to the next level of productivity, efficiency, and safety. One of the critical challenges that must be faced is the deployment of Machine Learning models at the network edge to detect data anomalies caused by Industrial IoT hardware failures, since industrial IoT devices are prone to errors and failures. These anomalies can harm the industrial IoT system by producing false alarms, consuming network resources, and affecting productivity. Because of that, it is critical to rely on low latency and high precision detection systems to verify the data received from industrial IoT devices. In light of this, we assessed key performance indicators of five machine learning models running at edge computing, to provide in-depth discussions. The performance results were obtained from an oil refinery scenario using a real industrial IoT dataset. The performance was measured in terms of (a) Accuracy, (b) Precision, (c) Recall, (d) F1 score, (e) Training time, and (f) Response time.
工业物联网(IoT)在工业生产和制造环境中大规模部署智能计算,寻求自动化、可靠性和控制。机器学习模型提供智能决策,推动制造系统达到更高的生产力、效率和安全性。必须面对的关键挑战之一是在网络边缘部署机器学习模型,以检测由工业物联网硬件故障引起的数据异常,因为工业物联网设备容易出现错误和故障。这些异常会产生假警报,消耗网络资源,影响生产力,从而危害工业物联网系统。因此,依靠低延迟和高精度的检测系统来验证从工业物联网设备接收的数据至关重要。鉴于此,我们评估了在边缘计算下运行的五个机器学习模型的关键性能指标,以提供深入的讨论。性能结果来自使用真实工业物联网数据集的炼油厂场景。性能的衡量标准是:(a)准确性,(b)精度,(c)召回率,(d) F1分数,(e)训练时间,(f)反应时间。
{"title":"On the Performance of Machine Learning at the Network Edge to Detect Industrial IoT Faults","authors":"Yuri Santo, B. Dalmazo, R. Immich, Andre Riker","doi":"10.1109/NCA57778.2022.10013585","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013585","url":null,"abstract":"Industrial Internet-of-Things (IoT) massively deploys intelligent computing in industrial production and manufacturing environments seeking automation, reliability, and control. Machine Learning models provide intelligent decisions to drive manufacturing systems to the next level of productivity, efficiency, and safety. One of the critical challenges that must be faced is the deployment of Machine Learning models at the network edge to detect data anomalies caused by Industrial IoT hardware failures, since industrial IoT devices are prone to errors and failures. These anomalies can harm the industrial IoT system by producing false alarms, consuming network resources, and affecting productivity. Because of that, it is critical to rely on low latency and high precision detection systems to verify the data received from industrial IoT devices. In light of this, we assessed key performance indicators of five machine learning models running at edge computing, to provide in-depth discussions. The performance results were obtained from an oil refinery scenario using a real industrial IoT dataset. The performance was measured in terms of (a) Accuracy, (b) Precision, (c) Recall, (d) F1 score, (e) Training time, and (f) Response time.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123019216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Swarming with (Visual) Secret (Shared) Mission 群集与(视觉)秘密(共享)任务
Pub Date : 2022-12-14 DOI: 10.1109/NCA57778.2022.10013507
S. Dolev, Alexander Fok, M. Segal
Collaborative secure image matching is a problem that is applicable in various domains, for both – data in rest and data in motion. The problem is defined as follows. There is a secret image, and a set of n mobile agents. The set of mobile agents should match (compare) an observed image to the original secret image. In this paper we discuss some of the existing approaches, and present an alternative solution applied and analyzed for different applications. The first application is a swarm of Unmanned Aerial Vehicles (UAV) that search for a target specified by an image. The second application is a social network that serves as a smart storage device capable of performing distributed, secret image matching operations. Our solution is based on the well-known Visual Encryption Scheme (VES) and projections of visual bit maps rather than (quadratic complexity) messages exchange in implementing Secure Multi Party Computation (MPC) scheme. We present a perfect-information-theoretic secure solution for this problem. To keep the original image secrecy, at least k out of n mobile agents are required to retrieve any information about the original image.
协同安全图像匹配是一个适用于各种领域的问题,无论是静态数据还是动态数据。问题的定义如下。有一个秘密图像,和一组n个移动代理。移动代理集应该将观察到的图像与原始秘密图像进行匹配(比较)。在本文中,我们讨论了一些现有的方法,并提出了一种替代解决方案,应用和分析了不同的应用。第一个应用是一群无人驾驶飞行器(UAV),它们搜索图像指定的目标。第二种应用是作为能够执行分布式、秘密图像匹配操作的智能存储设备的社交网络。我们的解决方案是基于众所周知的视觉加密方案(VES)和视觉位映射的投影,而不是实现安全多方计算(MPC)方案的(二次复杂度)消息交换。针对这一问题,我们提出了一个完善的信息论安全解决方案。为了对原始图像保密,至少需要n个移动代理中的k个来检索有关原始图像的任何信息。
{"title":"Swarming with (Visual) Secret (Shared) Mission","authors":"S. Dolev, Alexander Fok, M. Segal","doi":"10.1109/NCA57778.2022.10013507","DOIUrl":"https://doi.org/10.1109/NCA57778.2022.10013507","url":null,"abstract":"Collaborative secure image matching is a problem that is applicable in various domains, for both – data in rest and data in motion. The problem is defined as follows. There is a secret image, and a set of n mobile agents. The set of mobile agents should match (compare) an observed image to the original secret image. In this paper we discuss some of the existing approaches, and present an alternative solution applied and analyzed for different applications. The first application is a swarm of Unmanned Aerial Vehicles (UAV) that search for a target specified by an image. The second application is a social network that serves as a smart storage device capable of performing distributed, secret image matching operations. Our solution is based on the well-known Visual Encryption Scheme (VES) and projections of visual bit maps rather than (quadratic complexity) messages exchange in implementing Secure Multi Party Computation (MPC) scheme. We present a perfect-information-theoretic secure solution for this problem. To keep the original image secrecy, at least k out of n mobile agents are required to retrieve any information about the original image.","PeriodicalId":251728,"journal":{"name":"2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1