首页 > 最新文献

2010 Proceedings IEEE INFOCOM最新文献

英文 中文
A Tractable and Accurate Cross-Layer Model for Multi-Hop MIMO Networks 多跳MIMO网络的一种可处理且精确的跨层模型
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462061
Jia Liu, Yi Shi, Yiwei Thomas Hou
MIMO-based communications have great potential to improve network capacity for multi-hop wireless networks. Although there has been significant progress on MIMO at the physical layer or single-hop communication, advances in the theory of MIMO for multi-hop wireless networks remain limited. This stagnation is mainly due to the lack of an accurate and more important, analytically tractable model that can be used by networking researchers. In this paper, we propose such a model to enable the networking community to carry out cross-layer research for multi-hop MIMO networks. In particular, at the physical layer, we develop a simple model for MIMO channel capacity computation that captures the essence of spatial multiplexing and transmit power limit without involving complex matrix operations and the water-filling algorithm. We show that the approximation gap in this model is negligible. At the link layer, we devise a space-time scheduling scheme called OBIC that significantly advances the existing zero-forcing beamforming (ZFBF) to handle interference in a multi-hop network setting. The proposed OBIC scheme employs simple algebraic computation on matrix dimensions to simplify ZFBF in a multi-hop network. As a result, we can characterize link layer scheduling behavior without entangling with beamforming details. Finally, we apply both the new physical and link layer models in cross-layer performance optimization for a multi-hop MIMO network.
基于mimo的通信在提高多跳无线网络的网络容量方面具有很大的潜力。尽管在物理层或单跳通信的MIMO方面已经取得了重大进展,但在多跳无线网络的MIMO理论方面的进展仍然有限。这种停滞主要是由于缺乏一个准确的、更重要的、分析上易于处理的模型,可供网络研究人员使用。在本文中,我们提出了这样一个模型,使网络社区能够对多跳MIMO网络进行跨层研究。特别是,在物理层,我们开发了一个简单的MIMO信道容量计算模型,该模型捕捉了空间复用和发射功率限制的本质,而不涉及复杂的矩阵运算和注水算法。我们证明了该模型的近似间隙可以忽略不计。在链路层,我们设计了一种称为OBIC的时空调度方案,该方案大大改进了现有的零强制波束形成(ZFBF),以处理多跳网络设置中的干扰。提出的OBIC方案采用简单的矩阵维数代数计算,简化了多跳网络中的ZFBF。因此,我们可以在不受波束形成细节纠缠的情况下描述链路层调度行为。最后,我们将新的物理层和链路层模型应用于多跳MIMO网络的跨层性能优化。
{"title":"A Tractable and Accurate Cross-Layer Model for Multi-Hop MIMO Networks","authors":"Jia Liu, Yi Shi, Yiwei Thomas Hou","doi":"10.1109/INFCOM.2010.5462061","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462061","url":null,"abstract":"MIMO-based communications have great potential to improve network capacity for multi-hop wireless networks. Although there has been significant progress on MIMO at the physical layer or single-hop communication, advances in the theory of MIMO for multi-hop wireless networks remain limited. This stagnation is mainly due to the lack of an accurate and more important, analytically tractable model that can be used by networking researchers. In this paper, we propose such a model to enable the networking community to carry out cross-layer research for multi-hop MIMO networks. In particular, at the physical layer, we develop a simple model for MIMO channel capacity computation that captures the essence of spatial multiplexing and transmit power limit without involving complex matrix operations and the water-filling algorithm. We show that the approximation gap in this model is negligible. At the link layer, we devise a space-time scheduling scheme called OBIC that significantly advances the existing zero-forcing beamforming (ZFBF) to handle interference in a multi-hop network setting. The proposed OBIC scheme employs simple algebraic computation on matrix dimensions to simplify ZFBF in a multi-hop network. As a result, we can characterize link layer scheduling behavior without entangling with beamforming details. Finally, we apply both the new physical and link layer models in cross-layer performance optimization for a multi-hop MIMO network.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay Constraints 具有带宽和差分延迟约束的可靠自适应多路径配置
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462042
Weiyi Zhang, Jian Tang, Chonggang Wang, Shanaka de Soysa
Robustness and reliability are critical issues in network management. To provide resiliency against network failures, a popular protection scheme against network failures is the simultaneous routing along multiple disjoint paths. Most previous protection and restoration schemes were designed for all-ornothing protection and thus, an overkill for data traffic. In this work, we study the Reliable Adaptive Multipath Provisioning (RAMP) problem with reliability and differential delay constraints. We aim to route the connections in a manner such that link failure does not shut down the entire stream but allows a continuing flow for a significant portion of the traffic along multiple (not necessary disjoint) paths, allowing the whole network to carry sufficient traffic even when link/node failure occurs. The flexibility enabled by a multipath scheme has the tradeoff of differential delay among the diversely routed paths. This requires increased memory in the destination node in order to buffer the traffic until the data arrives on all the paths. Increased buffer size will raise the network element cost and could cause buffer overflow and data corruption. Therefore, differential delay between the multiple paths should be bounded by containing the delay of a path in a range from dmin to dmax. We first prove that RAMP is a NP-hard problem. Then we present a pseudo-polynomial time solution to solve a special case of RAMP, representing edge delays as integers. Next, a (1 + epsilon)-approximation is proposed to solve the optimization version of the RAMP problem. We also present numerical results confirming the advantage of our scheme over the current state of art.
鲁棒性和可靠性是网络管理中的关键问题。为了提供针对网络故障的弹性,一种流行的针对网络故障的保护方案是沿着多条不相交的路径同时路由。大多数以前的保护和恢复方案都是为全有或全无的保护而设计的,因此,对数据流量来说是多余的。在这项工作中,我们研究了具有可靠性和差分延迟约束的可靠自适应多路径配置(RAMP)问题。我们的目标是以这样一种方式路由连接,即链路故障不会关闭整个流,而是允许沿多条(不必要的不相交)路径的大部分流量继续流动,即使链路/节点发生故障,也允许整个网络承载足够的流量。多路径方案的灵活性在于权衡不同路由路径之间的差分延迟。这需要在目标节点中增加内存,以便缓冲流量,直到数据到达所有路径。增加缓冲区大小将增加网络元素成本,并可能导致缓冲区溢出和数据损坏。因此,多路径之间的差分延迟应该以包含在dmin到dmax范围内的路径延迟为界。我们首先证明了RAMP是一个np困难问题。然后,我们给出了一个伪多项式时间解来解决RAMP的一个特殊情况,将边缘延迟表示为整数。接下来,提出了一个(1 + epsilon)近似来解决RAMP问题的优化版本。我们还给出了数值结果,证实了我们的方案优于目前的技术水平。
{"title":"Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay Constraints","authors":"Weiyi Zhang, Jian Tang, Chonggang Wang, Shanaka de Soysa","doi":"10.1109/INFCOM.2010.5462042","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462042","url":null,"abstract":"Robustness and reliability are critical issues in network management. To provide resiliency against network failures, a popular protection scheme against network failures is the simultaneous routing along multiple disjoint paths. Most previous protection and restoration schemes were designed for all-ornothing protection and thus, an overkill for data traffic. In this work, we study the Reliable Adaptive Multipath Provisioning (RAMP) problem with reliability and differential delay constraints. We aim to route the connections in a manner such that link failure does not shut down the entire stream but allows a continuing flow for a significant portion of the traffic along multiple (not necessary disjoint) paths, allowing the whole network to carry sufficient traffic even when link/node failure occurs. The flexibility enabled by a multipath scheme has the tradeoff of differential delay among the diversely routed paths. This requires increased memory in the destination node in order to buffer the traffic until the data arrives on all the paths. Increased buffer size will raise the network element cost and could cause buffer overflow and data corruption. Therefore, differential delay between the multiple paths should be bounded by containing the delay of a path in a range from dmin to dmax. We first prove that RAMP is a NP-hard problem. Then we present a pseudo-polynomial time solution to solve a special case of RAMP, representing edge delays as integers. Next, a (1 + epsilon)-approximation is proposed to solve the optimization version of the RAMP problem. We also present numerical results confirming the advantage of our scheme over the current state of art.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Distributed Dynamic Speed Scaling 分布式动态速度缩放
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462197
R. Stanojevic, R. Shorten
In recent years we have witnessed a great interest in large distributed computing platforms, also known as clouds. While these systems offer enormous computing power, they are major energy consumers. In existing data centers CPUs are responsible for approximately half of the energy consumed by the servers. A promising technique for saving CPU energy consumption is dynamic speed scaling, in which the speed at which the processor is run is adjusted based on demand and performance constraints. In this paper we look at the problem of allocating the demand in the network of processors (each being capable to perform dynamic speed scaling) to minimize the global energy consumption/cost subject to a performance constraint. The nonlinear dependence between the energy consumption and the performance as well as the high variability in the energy prices result in a nontrivial resource allocation. The problem can be abstracted as a fully distributed convex optimization with a linear constraint. On the theoretical side, we propose two low-overhead fully decentralized algorithms for solving the problem of interest and provide closed-form conditions that ensure stability of the algorithms. Then we evaluate the efficacy of the optimal solution using simulations driven by the real-world energy prices. Our findings indicate a possible cost reduction of $10-40%$ compared to power-oblivious $1/N$ load balancing, for a wide range of load factors.
近年来,我们见证了对大型分布式计算平台(也称为云)的极大兴趣。虽然这些系统提供了巨大的计算能力,但它们是主要的能源消耗者。在现有的数据中心中,cpu消耗的能量约占服务器消耗能量的一半。一种很有前途的节省CPU能耗的技术是动态速度缩放,即根据需求和性能约束来调整处理器的运行速度。在本文中,我们研究了在处理器网络中分配需求的问题(每个处理器都能够执行动态速度缩放),以在性能约束下最小化全局能耗/成本。能源消耗与性能之间的非线性依赖关系以及能源价格的高度可变性导致了一个非平凡的资源配置问题。该问题可以抽象为具有线性约束的全分布凸优化问题。在理论方面,我们提出了两种低开销的完全分散算法来解决感兴趣的问题,并提供了确保算法稳定性的封闭形式条件。然后,我们使用现实世界能源价格驱动的模拟来评估最优解决方案的有效性。我们的研究结果表明,对于广泛的负载因素,与功率无关的1/N负载平衡相比,成本可能降低10- 40%。
{"title":"Distributed Dynamic Speed Scaling","authors":"R. Stanojevic, R. Shorten","doi":"10.1109/INFCOM.2010.5462197","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462197","url":null,"abstract":"In recent years we have witnessed a great interest in large distributed computing platforms, also known as clouds. While these systems offer enormous computing power, they are major energy consumers. In existing data centers CPUs are responsible for approximately half of the energy consumed by the servers. A promising technique for saving CPU energy consumption is dynamic speed scaling, in which the speed at which the processor is run is adjusted based on demand and performance constraints. In this paper we look at the problem of allocating the demand in the network of processors (each being capable to perform dynamic speed scaling) to minimize the global energy consumption/cost subject to a performance constraint. The nonlinear dependence between the energy consumption and the performance as well as the high variability in the energy prices result in a nontrivial resource allocation. The problem can be abstracted as a fully distributed convex optimization with a linear constraint. On the theoretical side, we propose two low-overhead fully decentralized algorithms for solving the problem of interest and provide closed-form conditions that ensure stability of the algorithms. Then we evaluate the efficacy of the optimal solution using simulations driven by the real-world energy prices. Our findings indicate a possible cost reduction of $10-40%$ compared to power-oblivious $1/N$ load balancing, for a wide range of load factors.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Two Samples are Enough: Opportunistic Flow-level Latency Estimation using NetFlow 两个样本就足够了:使用NetFlow进行机会流级延迟估计
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462044
Myungjin Lee, N. Duffield, R. Kompella
The inherent support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problems and hence, the aggregate behavior within a router appears normal. To address this problem, in this paper, we propose a Consistent NetFlow (CNF) architecture for measuring per-flow performance measurements within routers. CNF utilizes NetFlow architecture that already reports the first and last timestamps per-flow, and hash-based sampling for ensuring that two routers record same flows. We devise a novel Multiflow estimator that approximates the intermediate delay samples from other background flows to improve the per-flow latency estimates significantly compared to the naive estimator that only uses actual flow samples. In our experiments using real backbone traces and realistic delay models, we show that Multiflow estimator is accurate with a median relative error of less than 20% for flows of size greater than 100 packets. We also show that prior approach based on trajectory sampling performs about 2-3x worse.
路由器(SNMP计数器或NetFlow)的固有支持不足以诊断IP网络中的性能问题,特别是针对特定于流的问题,因此,路由器内的聚合行为看起来正常。为了解决这个问题,在本文中,我们提出了一个一致NetFlow (CNF)架构,用于测量路由器内的每流性能测量。CNF利用NetFlow架构,该架构已经报告了每个流的第一个和最后一个时间戳,以及基于散列的采样,以确保两个路由器记录相同的流。我们设计了一种新的Multiflow估计器,它近似于来自其他背景流的中间延迟样本,与仅使用实际流样本的朴素估计器相比,显著提高了每流延迟估计。在我们使用真实骨干跟踪和现实延迟模型的实验中,我们表明Multiflow估计器对于大于100个数据包的流是准确的,中位数相对误差小于20%。我们还表明,基于轨迹采样的先验方法的性能大约差2-3倍。
{"title":"Two Samples are Enough: Opportunistic Flow-level Latency Estimation using NetFlow","authors":"Myungjin Lee, N. Duffield, R. Kompella","doi":"10.1109/INFCOM.2010.5462044","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462044","url":null,"abstract":"The inherent support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problems and hence, the aggregate behavior within a router appears normal. To address this problem, in this paper, we propose a Consistent NetFlow (CNF) architecture for measuring per-flow performance measurements within routers. CNF utilizes NetFlow architecture that already reports the first and last timestamps per-flow, and hash-based sampling for ensuring that two routers record same flows. We devise a novel Multiflow estimator that approximates the intermediate delay samples from other background flows to improve the per-flow latency estimates significantly compared to the naive estimator that only uses actual flow samples. In our experiments using real backbone traces and realistic delay models, we show that Multiflow estimator is accurate with a median relative error of less than 20% for flows of size greater than 100 packets. We also show that prior approach based on trajectory sampling performs about 2-3x worse.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks 一种阻止Ad Hoc网络中恶意访问的自组织机制
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462232
N. Fernandes, M. D. D. Moreira, O. Duarte
This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed mechanism authenticates and monitors nodes with the so-called controller sets, which are resistant to the dynamic network membership. The analysis shows that the proposed scheme is robust even to collusion attacks and provides availability up to 90% better than proposals based on threshold cryptography. The performance improvement arises mostly from the controller sets autonomy to recover after network partitions.
本文介绍了一种自组织机制来控制ad hoc网络中的用户访问,而不需要任何基础设施或中央管理实体。该机制使用所谓的控制器集对节点进行身份验证和监控,这些控制器集可以抵抗动态网络成员关系。分析表明,该方案对合谋攻击具有较强的鲁棒性,可用性比基于阈值加密的方案提高90%以上。性能提升主要来自于控制器设置了网络分区后恢复的自主权。
{"title":"A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks","authors":"N. Fernandes, M. D. D. Moreira, O. Duarte","doi":"10.1109/INFCOM.2010.5462232","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462232","url":null,"abstract":"This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed mechanism authenticates and monitors nodes with the so-called controller sets, which are resistant to the dynamic network membership. The analysis shows that the proposed scheme is robust even to collusion attacks and provides availability up to 90% better than proposals based on threshold cryptography. The performance improvement arises mostly from the controller sets autonomy to recover after network partitions.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding 大规模操作点播流与随机网络编码
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462030
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao
Since the inception of network coding in information theory, we have witnessed a sharp increase of research interest in its applications in communications and networking, where the focus has been on more practical aspects. However, thus far, network coding has not been deployed in real-world commercial systems in operation at a large scale, and in a production setting. In this paper, we present the objectives, rationale, and design in the first production deployment of random network coding, where it has been used in the past year as the cornerstone of a large-scale production on-demand streaming system, operated by UUSee Inc., delivering thousands of on-demand video channels to millions of unique visitors each month. To achieve a thorough understanding of the performance of network coding, we have collected 200 Gigabytes worth of real-world traces throughout the 17-day Summer Olympic Games in August 2008, and present our lessons learned after an in-depth trace-driven analysis.
自信息论中网络编码出现以来,我们目睹了对其在通信和网络中的应用的研究兴趣急剧增加,重点是更实际的方面。然而,到目前为止,网络编码还没有在实际的商业系统中大规模地部署,也没有在生产环境中部署。在本文中,我们介绍了随机网络编码首次生产部署的目标、基本原理和设计,在过去的一年中,随机网络编码已被用作大规模生产点播流媒体系统的基石,该系统由UUSee公司运营,每月向数百万独立访问者提供数千个点播视频频道。为了彻底了解网络编码的性能,我们在2008年8月为期17天的夏季奥运会期间收集了200 gb的真实世界痕迹,并在深入的痕迹驱动分析后给出了我们的经验教训。
{"title":"UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding","authors":"Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao","doi":"10.1109/INFCOM.2010.5462030","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462030","url":null,"abstract":"Since the inception of network coding in information theory, we have witnessed a sharp increase of research interest in its applications in communications and networking, where the focus has been on more practical aspects. However, thus far, network coding has not been deployed in real-world commercial systems in operation at a large scale, and in a production setting. In this paper, we present the objectives, rationale, and design in the first production deployment of random network coding, where it has been used in the past year as the cornerstone of a large-scale production on-demand streaming system, operated by UUSee Inc., delivering thousands of on-demand video channels to millions of unique visitors each month. To achieve a thorough understanding of the performance of network coding, we have collected 200 Gigabytes worth of real-world traces throughout the 17-day Summer Olympic Games in August 2008, and present our lessons learned after an in-depth trace-driven analysis.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"86 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120865476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 191
SafeQ: Secure and Efficient Query Processing in Sensor Networks 传感器网络中安全高效的查询处理
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462094
Fei Chen, A. Liu
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. In this paper, we propose SafeQ, a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, we propose a new data structure called neighborhood chains that allows a sink to verify whether the result of a query contains exactly the data items that satisfy the query. In addition, we propose a solution to adapt SafeQ for event-driven sensor networks.
存储节点作为传感器和存储节点之间的中间层,用于存储数据和处理查询,由于节省传感器的功耗和存储以及查询处理效率的优势,双层传感器网络架构已被广泛采用。然而,存储节点的重要性也使它们对攻击者具有吸引力。在本文中,我们提出了SafeQ,一种防止攻击者从传感器收集的数据和接收器发出的查询中获取信息的协议。SafeQ还允许接收器在受损存储节点行为不当时检测到它们。为了保护隐私,SafeQ使用一种新颖的技术对数据和查询进行编码,这样存储节点就可以在不知道编码数据值的情况下正确处理编码查询。为了保持完整性,我们提出了一种称为邻域链的新数据结构,它允许接收器验证查询结果是否恰好包含满足查询的数据项。此外,我们提出了一种使SafeQ适应事件驱动传感器网络的解决方案。
{"title":"SafeQ: Secure and Efficient Query Processing in Sensor Networks","authors":"Fei Chen, A. Liu","doi":"10.1109/INFCOM.2010.5462094","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462094","url":null,"abstract":"The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. In this paper, we propose SafeQ, a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, we propose a new data structure called neighborhood chains that allows a sink to verify whether the result of a query contains exactly the data items that satisfy the query. In addition, we propose a solution to adapt SafeQ for event-driven sensor networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
An Interaction-Based Mobility Model for Dynamic Hot Spot Analysis 一种基于交互的动态热点分析移动模型
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462055
F. Morlot, S. Elayoubi, F. Baccelli
In this paper, we analyze phenomena related to user clumps and hot spots occuring in mobile networks at the occasion of large urban mass gatherings. Our analysis is based on observations made on mobility traces of GSM users in several large cities. Classical mobility models, such as the random waypoint, do not allow one to represent the observed dynamics of clumps in a proper manner. This motivates the introduction and the mathematical analysis of a new interaction-based mobility model, which is the main contribution of the present paper. This model is shown to allow one to describe the dynamics of clumps and in particular to predict key phenomena such as the building of hot spots and the scattering between hot spots, which play a key role in the engineering of wireless networks. We show how to obtain the main parameters of this model from simple communication activity measurements and we illustrate this calibration process on real cases.
本文分析了城市大型人群聚集时移动网络中出现的用户聚集和热点现象。我们的分析是基于对几个大城市GSM用户移动轨迹的观察。经典的迁移模型,如随机路径点,不允许人们以适当的方式表示观察到的团块动力学。这促使我们引入并分析了一种新的基于相互作用的移动模型,这是本文的主要贡献。这个模型被证明允许人们描述团块的动力学,特别是预测关键现象,如热点的建立和热点之间的散射,这在无线网络工程中起着关键作用。我们展示了如何从简单的通信活动测量中获得该模型的主要参数,并通过实际案例说明了该校准过程。
{"title":"An Interaction-Based Mobility Model for Dynamic Hot Spot Analysis","authors":"F. Morlot, S. Elayoubi, F. Baccelli","doi":"10.1109/INFCOM.2010.5462055","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462055","url":null,"abstract":"In this paper, we analyze phenomena related to user clumps and hot spots occuring in mobile networks at the occasion of large urban mass gatherings. Our analysis is based on observations made on mobility traces of GSM users in several large cities. Classical mobility models, such as the random waypoint, do not allow one to represent the observed dynamics of clumps in a proper manner. This motivates the introduction and the mathematical analysis of a new interaction-based mobility model, which is the main contribution of the present paper. This model is shown to allow one to describe the dynamics of clumps and in particular to predict key phenomena such as the building of hot spots and the scattering between hot spots, which play a key role in the engineering of wireless networks. We show how to obtain the main parameters of this model from simple communication activity measurements and we illustrate this calibration process on real cases.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Risk-Aware Routing for Optical Transport Networks 光传输网络的风险感知路由
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462168
Ming Xia, M. Tornatore, C. Martel, B. Mukherjee
A Service Level Agreement (SLA) typically specifies the availability a Service Provider (SP) promises to a customer. In an Optical Transport Network, finding a lightpath for a connection is commonly based on whether the availability of a lightpath availability complies with the connection's SLA-requested availability. Because of the stochastic nature of network failures, the actual availability of a lightpath over a specific time period is subject to uncertainty, and the SLA is usually at risk. We consider the network uncertainty, and study routing to minimize the probability of SLA violation. First, we use a single-link model to study SLA Violation Risk (i.e., the probability of SLA violation) under different settings. We show that SLA Violation Risk may vary by paths and is affected by other factors (e.g., failure rate, connection holding time, etc.), and hence cannot be simply described by path availability. We then formulate the problem of risk-aware routing in mesh networks, in which routing decisions are dictated by SLA Violation Risk. In particular, we focus on devising a scheme capable of computing lightpath(s) that are likely to successfully accommodate a connection's SLA-requested availability. A novel technique is applied to convert links with heterogeneous failure profiles to reference links which capture the main risk features in a relative manner. Based on the "reference link" concept, we present a polynomial Risk-Aware Routing scheme using only limited failure information. In addition, we extend our Risk-Aware Routing scheme to incorporate shared path protection (SPP) when protection is needed. We evaluate the performance and demonstrate the effectiveness of our schemes in terms of SLA violation ratio and, more generally, contrast them with the generic availability-aware approaches.
服务水平协议(SLA)通常指定服务提供者(SP)向客户承诺的可用性。在光传输网络中,查找连接的光路通常基于光路可用性是否符合连接的sla请求的可用性。由于网络故障的随机性,特定时间段内光路的实际可用性受到不确定性的影响,SLA通常处于风险之中。我们考虑网络的不确定性,并研究路由以最小化SLA违反的概率。首先,我们使用单链路模型研究了不同设置下的SLA违反风险(即SLA违反的概率)。我们表明,SLA违反风险可能因路径而异,并受其他因素(例如,故障率、连接保持时间等)的影响,因此不能简单地用路径可用性来描述。然后,我们制定了网状网络中风险感知路由的问题,其中路由决策由SLA违反风险决定。特别是,我们专注于设计一种能够计算光路的方案,这种方案很可能成功地适应连接的sla请求的可用性。采用一种新颖的技术,将具有异质失效特征的链路转换为以相对方式捕获主要风险特征的参考链路。基于“参考链路”的概念,提出了一种仅使用有限故障信息的多项式风险感知路由方案。此外,我们扩展了我们的风险感知路由方案,在需要保护时纳入共享路径保护(SPP)。我们从SLA违反率的角度评估了我们的方案的性能和有效性,并且更一般地将它们与通用的可用性感知方法进行了对比。
{"title":"Risk-Aware Routing for Optical Transport Networks","authors":"Ming Xia, M. Tornatore, C. Martel, B. Mukherjee","doi":"10.1109/INFCOM.2010.5462168","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462168","url":null,"abstract":"A Service Level Agreement (SLA) typically specifies the availability a Service Provider (SP) promises to a customer. In an Optical Transport Network, finding a lightpath for a connection is commonly based on whether the availability of a lightpath availability complies with the connection's SLA-requested availability. Because of the stochastic nature of network failures, the actual availability of a lightpath over a specific time period is subject to uncertainty, and the SLA is usually at risk. We consider the network uncertainty, and study routing to minimize the probability of SLA violation. First, we use a single-link model to study SLA Violation Risk (i.e., the probability of SLA violation) under different settings. We show that SLA Violation Risk may vary by paths and is affected by other factors (e.g., failure rate, connection holding time, etc.), and hence cannot be simply described by path availability. We then formulate the problem of risk-aware routing in mesh networks, in which routing decisions are dictated by SLA Violation Risk. In particular, we focus on devising a scheme capable of computing lightpath(s) that are likely to successfully accommodate a connection's SLA-requested availability. A novel technique is applied to convert links with heterogeneous failure profiles to reference links which capture the main risk features in a relative manner. Based on the \"reference link\" concept, we present a polynomial Risk-Aware Routing scheme using only limited failure information. In addition, we extend our Risk-Aware Routing scheme to incorporate shared path protection (SPP) when protection is needed. We evaluate the performance and demonstrate the effectiveness of our schemes in terms of SLA violation ratio and, more generally, contrast them with the generic availability-aware approaches.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Robust and Scalable Integrated Routing in MANETs Using Context-Aware Ordered Meshes 基于上下文感知有序网格的manet鲁棒可扩展集成路由
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462130
R. Menchaca-Méndez, J. Garcia-Luna-Aceves
A new context-aware routing framework for multicast and unicast routing in mobile ad hoc networks is introduced. This framework, which is called CAROM (Context-Aware Routing over Ordered Meshes), uses regions of interest to identify connected componnets of the network that span sources and destinations of interest to restrict signaling to occur mostly within these regions. Context information is used to compute routing meshes composed of shortest-paths located inside of regions of interest. Experimental results based on extensive simulations show that CAROM attains similar or better data delivery and end-to-end delays than traditional unicast and multicast routing schemes for MANETs (AODV, OLSR, ODMRP), and that CAROM incurs only a fraction of the signaling overhead of traditional routing schemes.
针对移动自组织网络中的组播和单播路由,提出了一种新的上下文感知路由框架。这个框架被称为CAROM(有序网格上的上下文感知路由),它使用感兴趣的区域来识别跨越感兴趣的源和目的地的网络连接组件,以限制信令主要发生在这些区域内。上下文信息用于计算由位于感兴趣区域内的最短路径组成的路由网格。基于大量模拟的实验结果表明,与传统的单播和多播路由方案(AODV, OLSR, ODMRP)相比,CAROM实现了类似或更好的数据传输和端到端延迟,并且CAROM只产生传统路由方案的一小部分信令开销。
{"title":"Robust and Scalable Integrated Routing in MANETs Using Context-Aware Ordered Meshes","authors":"R. Menchaca-Méndez, J. Garcia-Luna-Aceves","doi":"10.1109/INFCOM.2010.5462130","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462130","url":null,"abstract":"A new context-aware routing framework for multicast and unicast routing in mobile ad hoc networks is introduced. This framework, which is called CAROM (Context-Aware Routing over Ordered Meshes), uses regions of interest to identify connected componnets of the network that span sources and destinations of interest to restrict signaling to occur mostly within these regions. Context information is used to compute routing meshes composed of shortest-paths located inside of regions of interest. Experimental results based on extensive simulations show that CAROM attains similar or better data delivery and end-to-end delays than traditional unicast and multicast routing schemes for MANETs (AODV, OLSR, ODMRP), and that CAROM incurs only a fraction of the signaling overhead of traditional routing schemes.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1