首页 > 最新文献

2010 Proceedings IEEE INFOCOM最新文献

英文 中文
Estimating Link Reliability in Wireless Networks: An Empirical Study and Interference Modeling 无线网络链路可靠性评估:实证研究与干扰建模
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462250
Shinuk Woo, Hwangnam Kim
Recently, it has been received in the community that the link reliability is strongly related to RSSI (or SINR) and the external interference makes it unpredictable, but the unpredictability has not been fully explained yet. In order to examine the causes of the unpredictable link state, we first configured an empirical testbed, performed a measurement study, and observed that the link reliability actually depends on an intra-frame SINR distribution. We also discovered that a RSSI (or SINR) value is not always a good indicator to estimate the link state. Based on these results, we propose a modeling framework for estimating the link state in the presence of the wireless interference. We vision that the framework can be used for developing link-aware protocols to achieve their optimal performance in a hostile wireless environment.
最近,学界普遍认为链路可靠性与RSSI(或SINR)密切相关,外部干扰使其不可预测,但这种不可预测性尚未得到充分解释。为了研究不可预测链路状态的原因,我们首先配置了一个经验测试平台,进行了测量研究,并观察到链路可靠性实际上取决于帧内SINR分布。我们还发现,RSSI(或SINR)值并不总是估计链路状态的好指标。基于这些结果,我们提出了一个建模框架来估计存在无线干扰的链路状态。我们设想该框架可用于开发链路感知协议,以在恶劣的无线环境中实现其最佳性能。
{"title":"Estimating Link Reliability in Wireless Networks: An Empirical Study and Interference Modeling","authors":"Shinuk Woo, Hwangnam Kim","doi":"10.1109/INFCOM.2010.5462250","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462250","url":null,"abstract":"Recently, it has been received in the community that the link reliability is strongly related to RSSI (or SINR) and the external interference makes it unpredictable, but the unpredictability has not been fully explained yet. In order to examine the causes of the unpredictable link state, we first configured an empirical testbed, performed a measurement study, and observed that the link reliability actually depends on an intra-frame SINR distribution. We also discovered that a RSSI (or SINR) value is not always a good indicator to estimate the link state. Based on these results, we propose a modeling framework for estimating the link state in the presence of the wireless interference. We vision that the framework can be used for developing link-aware protocols to achieve their optimal performance in a hostile wireless environment.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131939223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Retiring Replicants: Congestion Control for Intermittently-Connected Networks 退役复制人:间歇连接网络的拥塞控制
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461934
N. Thompson, S. Nelson, Mehedi Bakht, T. Abdelzaher, R. Kravets
The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These intermittently-connected networks (ICNs) typically lack stable end-to-end paths. In order to improve the delivery rates of the networks, new store-carry-and-forward protocols have been proposed which often use message replication as a forwarding mechanism. Message replication is effective at improving delivery, but given the limited resources of ICN nodes, such as buffer space, bandwidth and energy, as well as the highly dynamic nature of these networks, replication can easily overwhelm node resources. In this work we propose a novel node-based replication management algorithm which addresses buffer congestion by dynamically limiting the replication a node performs during each encounter. The insight for our algorithm comes from a stochastic model of message delivery in ICNs with constrained buffer space. We show through simulation that our algorithm is effective, nearly tripling delivery rates in some scenarios, and imposes little overhead.
移动无线设备的广泛使用为形成只有间歇性连接的临时网络提供了越来越多的机会。这些间歇性连接的网络(icn)通常缺乏稳定的端到端路径。为了提高网络的传输速率,人们提出了新的存储-携带-转发协议,这些协议通常使用消息复制作为转发机制。消息复制在改进传递方面是有效的,但是考虑到ICN节点的有限资源(如缓冲空间、带宽和能量)以及这些网络的高度动态特性,复制很容易使节点资源不堪重负。在这项工作中,我们提出了一种新的基于节点的复制管理算法,该算法通过动态限制节点在每次遇到时执行的复制来解决缓冲区拥塞问题。我们的算法的洞察力来自具有约束缓冲空间的icn中的消息传递的随机模型。我们通过模拟表明,我们的算法是有效的,在某些情况下,几乎是三倍的交付率,并施加很少的开销。
{"title":"Retiring Replicants: Congestion Control for Intermittently-Connected Networks","authors":"N. Thompson, S. Nelson, Mehedi Bakht, T. Abdelzaher, R. Kravets","doi":"10.1109/INFCOM.2010.5461934","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461934","url":null,"abstract":"The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These intermittently-connected networks (ICNs) typically lack stable end-to-end paths. In order to improve the delivery rates of the networks, new store-carry-and-forward protocols have been proposed which often use message replication as a forwarding mechanism. Message replication is effective at improving delivery, but given the limited resources of ICN nodes, such as buffer space, bandwidth and energy, as well as the highly dynamic nature of these networks, replication can easily overwhelm node resources. In this work we propose a novel node-based replication management algorithm which addresses buffer congestion by dynamically limiting the replication a node performs during each encounter. The insight for our algorithm comes from a stochastic model of message delivery in ICNs with constrained buffer space. We show through simulation that our algorithm is effective, nearly tripling delivery rates in some scenarios, and imposes little overhead.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks 长寿命可替换传感器网络的可靠调度方案研究
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462010
Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang
To address energy constraint problem in sensor networks, node reclamation and replacement strategy has been proposed for networks accessible to human beings and robots. The major challenge in realizing the strategy is how to minimize the system maintenance cost, especially the frequency in replacing sensor nodes with limited number of backup nodes. New duty cycle scheduling schemes are required in order to address the challenge. Tong et al. have proposed a staircase-based scheme to address the problem based on ideal assumptions of sensor nodes that are free of failure and have regular energy consumption rate. Since sensor nodes are often deployed in outdoor unattended environment, node failures are inevitable. Energy consumption rates of sensor nodes are irregular due to manufacture or environmental reasons. Hence, this paper proposes several new schemes to achieve reliable scheduling for node reclamation and replacement. Extensive simulations have been conducted to verify that the proposed scheme is effective and efficient.
针对传感器网络中的能量约束问题,提出了面向人类和机器人可达网络的节点回收和替换策略。实现该策略的主要挑战是如何使系统维护成本最小化,特别是在有限数量的备份节点下更换传感器节点的频率。为了应对这一挑战,需要新的占空比调度方案。Tong等人提出了一种基于楼梯的方案来解决这个问题,该方案基于传感器节点无故障且能量消耗率正常的理想假设。由于传感器节点通常部署在室外无人值守的环境中,节点故障是不可避免的。由于制造或环境原因,传感器节点的能耗率不规律。为此,本文提出了几种新的方案来实现节点回收和替换的可靠调度。大量的仿真验证了该方案的有效性和高效性。
{"title":"Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks","authors":"Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang","doi":"10.1109/INFCOM.2010.5462010","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462010","url":null,"abstract":"To address energy constraint problem in sensor networks, node reclamation and replacement strategy has been proposed for networks accessible to human beings and robots. The major challenge in realizing the strategy is how to minimize the system maintenance cost, especially the frequency in replacing sensor nodes with limited number of backup nodes. New duty cycle scheduling schemes are required in order to address the challenge. Tong et al. have proposed a staircase-based scheme to address the problem based on ideal assumptions of sensor nodes that are free of failure and have regular energy consumption rate. Since sensor nodes are often deployed in outdoor unattended environment, node failures are inevitable. Energy consumption rates of sensor nodes are irregular due to manufacture or environmental reasons. Hence, this paper proposes several new schemes to achieve reliable scheduling for node reclamation and replacement. Extensive simulations have been conducted to verify that the proposed scheme is effective and efficient.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Opportunistic Spectrum Access with Multiple Users: Learning under Competition 多用户的机会频谱接入:竞争下的学习
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462144
Anima Anandkumar, Nithin Michael, A. Tang
The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total regret in distributed learning and allocation are proposed. The first scheme assumes minimal prior information in terms of pre-allocated ranks for secondary users while the second scheme is fully distributed and assumes no such prior information. The two schemes have sum regret which is provably logarithmic in the number of sensing time slots. A lower bound is derived for any learning scheme which is asymptotically logarithmic in the number of slots. Hence, our schemes achieve asymptotic order optimality in terms of regret in distributed learning and allocation.
考虑了以认知系统吞吐量最大化为目标的多辅助用户协同分配问题。信道可用性统计数据最初对次要用户是未知的,并通过传感样本学习。提出了两种分布式学习和分配方案,即在分布式学习和分配中使认知系统吞吐量最大化或总遗憾最小化。第一种方案假定次要用户的预分配秩方面的最小先验信息,而第二种方案是完全分布的,并且假定没有这种先验信息。这两种方案在感知时隙的数量上具有可证明的对数和遗憾。对于槽数渐近对数的任何学习方案,都导出了下界。因此,在分布式学习和分配中,我们的方案在遗憾度方面实现了渐近阶最优性。
{"title":"Opportunistic Spectrum Access with Multiple Users: Learning under Competition","authors":"Anima Anandkumar, Nithin Michael, A. Tang","doi":"10.1109/INFCOM.2010.5462144","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462144","url":null,"abstract":"The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total regret in distributed learning and allocation are proposed. The first scheme assumes minimal prior information in terms of pre-allocated ranks for secondary users while the second scheme is fully distributed and assumes no such prior information. The two schemes have sum regret which is provably logarithmic in the number of sensing time slots. A lower bound is derived for any learning scheme which is asymptotically logarithmic in the number of slots. Hence, our schemes achieve asymptotic order optimality in terms of regret in distributed learning and allocation.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
Survivable Distributed Storage with Progressive Decoding 具有渐进式解码的可生存分布式存储
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462198
Y. Han, Soji Omiwade, Rong Zheng
We propose a storage-optimal and computation efficient primitive to spread information from a single data source to a set of storage nodes, to allow recovery from both crash-stop and Byzantine failures. A progressive data retrieval scheme is employed, which retrieves minimal amount of data from live storage nodes. The scheme adapts the cost of successful data retrieval to the degree of errors in the system. Implementation and evaluation studies demonstrate comparable performance to that of a genie-aid decoding process.
我们提出了一种存储优化和计算效率高的原语,将信息从单个数据源传播到一组存储节点,以允许从崩溃停止和拜占庭故障中恢复。采用渐进式数据检索方案,从活动存储节点中检索最少量的数据。该方案将成功检索数据的代价与系统中的错误程度相适应。实施和评估研究表明,性能相当的一个基因辅助解码过程。
{"title":"Survivable Distributed Storage with Progressive Decoding","authors":"Y. Han, Soji Omiwade, Rong Zheng","doi":"10.1109/INFCOM.2010.5462198","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462198","url":null,"abstract":"We propose a storage-optimal and computation efficient primitive to spread information from a single data source to a set of storage nodes, to allow recovery from both crash-stop and Byzantine failures. A progressive data retrieval scheme is employed, which retrieves minimal amount of data from live storage nodes. The scheme adapts the cost of successful data retrieval to the degree of errors in the system. Implementation and evaluation studies demonstrate comparable performance to that of a genie-aid decoding process.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed Algorithms for Approximating Wireless Network Capacity 近似无线网络容量的分布式算法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461905
M. Dinitz
In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distributed algorithms with provable guarantees in the physical model, and show how they can be generalized to more complicated metrics and settings in which the physical assumptions are slightly violated. We also give the first algorithms in the protocol model that do not assume transmitters can coordinate with their neighbors in the interference graph, so every transmitter chooses whether to broadcast based purely on local events. Our techniques draw heavily from algorithmic game theory and machine learning theory, even though our goal is a distributed algorithm. Indeed, our main results allow every transmitter to run any algorithm it wants, so long as its algorithm has a learning-theoretic property known as no-regret in a game-theoretic setting.
本文从协议模型和物理模型两方面考虑了无线网络容量最大化问题(即单次调度)。我们给出了第一个在物理模型中具有可证明保证的分布式算法,并展示了它们如何被推广到更复杂的度量和设置中,其中物理假设略有违反。我们还给出了协议模型中的第一种算法,该算法不假设发射机可以在干扰图中与其邻居协调,因此每个发射机都选择是否纯粹基于本地事件进行广播。我们的技术很大程度上借鉴了算法博弈论和机器学习理论,尽管我们的目标是分布式算法。事实上,我们的主要结果允许每个发射器运行它想要的任何算法,只要它的算法具有学习理论性质,在博弈论设置中称为无遗憾。
{"title":"Distributed Algorithms for Approximating Wireless Network Capacity","authors":"M. Dinitz","doi":"10.1109/INFCOM.2010.5461905","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461905","url":null,"abstract":"In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distributed algorithms with provable guarantees in the physical model, and show how they can be generalized to more complicated metrics and settings in which the physical assumptions are slightly violated. We also give the first algorithms in the protocol model that do not assume transmitters can coordinate with their neighbors in the interference graph, so every transmitter chooses whether to broadcast based purely on local events. Our techniques draw heavily from algorithmic game theory and machine learning theory, even though our goal is a distributed algorithm. Indeed, our main results allow every transmitter to run any algorithm it wants, so long as its algorithm has a learning-theoretic property known as no-regret in a game-theoretic setting.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Practical Scheduling Algorithms for Concurrent Transmissions in Rate-adaptive Wireless Networks 速率自适应无线网络并发传输的实用调度算法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462013
Zhe Yang, Lin X. Cai, Wu-Sheng Lu
Optimal scheduling for concurrent transmissions in rate-nonadaptive wireless networks is NP-hard. Optimal scheduling in rate-adaptive wireless networks is even more difficult, because, due to mutual interference, each flow's throughput in a time slot is unknown before the scheduling decision of that slot is finalized. The capacity bound derived for rate-nonadaptive networks is no longer applicable either. In this paper, we first formulate the optimal scheduling problems with and without minimum per-flow throughput constraints. Given the hardness of the problems and the fact that the scheduling decisions should be made within a few milliseconds, we propose two simple yet effective searching algorithms which can quickly move towards better scheduling decisions. Thus, the proposed scheduling algorithms can achieve high network throughput and maintain long-term fairness among competing flows with low computational complexity. For the constrained optimization problem involved, we consider its dual problem and apply Lagrangian relaxation. We then incorporate a dual update procedure in the proposed searching algorithm to ensure that the searching results satisfy the constraints. Extensive simulations are conducted to demonstrate the effectiveness and efficiency of the proposed scheduling algorithms which are found to achieve throughputs close to the exhaustive searching results with much lower computational complexity.
速率非自适应无线网络中并发传输的最优调度是np困难问题。速率自适应无线网络的最优调度更加困难,因为由于相互干扰,在确定该时隙的调度决策之前,每个流在该时隙中的吞吐量是未知的。对于速率非自适应网络,导出的容量界也不再适用。在本文中,我们首先给出了具有和不具有最小每流吞吐量约束的最优调度问题。考虑到问题的难度和调度决策需要在几毫秒内做出的事实,我们提出了两种简单而有效的搜索算法,可以快速地实现更好的调度决策。因此,本文提出的调度算法可以在较低的计算复杂度下实现较高的网络吞吐量并保持竞争流之间的长期公平性。对于所涉及的约束优化问题,我们考虑了它的对偶问题并应用拉格朗日松弛。然后,我们在所提出的搜索算法中加入了双重更新过程,以确保搜索结果满足约束条件。大量的仿真实验证明了所提出的调度算法的有效性和高效性,结果表明该算法的吞吐量接近穷举搜索结果,且计算复杂度大大降低。
{"title":"Practical Scheduling Algorithms for Concurrent Transmissions in Rate-adaptive Wireless Networks","authors":"Zhe Yang, Lin X. Cai, Wu-Sheng Lu","doi":"10.1109/INFCOM.2010.5462013","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462013","url":null,"abstract":"Optimal scheduling for concurrent transmissions in rate-nonadaptive wireless networks is NP-hard. Optimal scheduling in rate-adaptive wireless networks is even more difficult, because, due to mutual interference, each flow's throughput in a time slot is unknown before the scheduling decision of that slot is finalized. The capacity bound derived for rate-nonadaptive networks is no longer applicable either. In this paper, we first formulate the optimal scheduling problems with and without minimum per-flow throughput constraints. Given the hardness of the problems and the fact that the scheduling decisions should be made within a few milliseconds, we propose two simple yet effective searching algorithms which can quickly move towards better scheduling decisions. Thus, the proposed scheduling algorithms can achieve high network throughput and maintain long-term fairness among competing flows with low computational complexity. For the constrained optimization problem involved, we consider its dual problem and apply Lagrangian relaxation. We then incorporate a dual update procedure in the proposed searching algorithm to ensure that the searching results satisfy the constraints. Extensive simulations are conducted to demonstrate the effectiveness and efficiency of the proposed scheduling algorithms which are found to achieve throughputs close to the exhaustive searching results with much lower computational complexity.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116606516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication 随机差分DSSS:抗干扰无线广播通信
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462156
Yao Liu, P. Ning, H. Dai, An Liu
Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit ``0'' is encoded using two different spreading codes, which have low correlation with each other, while bit ``1'' is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.
抗干扰对于需要可靠无线通信的应用至关重要。跳频扩频(FHSS)和直接序列扩频(DSSS)等扩频技术已被用于对抗干扰攻击。传统的抗干扰技术要求发送方和接收方共享密钥才能相互通信。然而,这样的要求使这些技术无法有效地用于抗干扰广播通信,其中干扰者可能从受损或恶意的接收器那里学习共享密钥,并破坏正常接收器的接收。在本文中,我们提出了一种随机差分DSSS (RD-DSSS)方案来实现无共享密钥的抗干扰广播通信。RD-DSSS使用不可预测的扩展码的相关性对每个数据位进行编码。其中,“0”位采用两种不同的扩频码编码,相关性较低;“1”位采用两种相同的扩频码编码,相关性较高。为了对抗被动干扰攻击,RD-DSSS使用多个扩频码序列对每条报文进行扩频,并在发送前对扩频输出进行重新排列。理论分析和仿真结果表明,RD-DSSS可以有效地挫败无共享密钥抗干扰广播通信的干扰攻击。
{"title":"Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication","authors":"Yao Liu, P. Ning, H. Dai, An Liu","doi":"10.1109/INFCOM.2010.5462156","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462156","url":null,"abstract":"Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit ``0'' is encoded using two different spreading codes, which have low correlation with each other, while bit ``1'' is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"562 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy 无线局域网中的速率自适应博弈:纳什均衡和无政府状态的价格
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462028
B. Radunovic, P. Chaporkar, A. Proutière
In Wireless LANs, users may adapt their transmission rates depending on the radio conditions of their links so as to maximize their throughput. Recently, there has been a significant research effort in developing distributed rate adaptation schemes. Unlike previous works that mainly focus on channel tracking, this paper characterizes the optimal reaction of a rate adaptation protocol to the contention information received from the MAC. We formulate this problem analytically. We study both competitive and cooperative user behaviors. In the case of competition, users selfishly adapt their rates so as to maximize their own throughput, whereas in the case of cooperation they adapt their rates so as to maximize the overall system throughput. We show that the Nash Equilibrium reached in the case of competition is inefficient (i.e. the price of anarchy goes to infinity as the number of users increases), and provide insightful properties of the socially optimal rate adaptation schemes. We find that recently proposed collision-aware rate adaptation algorithms decrease the price of anarchy. We also propose a novel collision-aware rate adaptation algorithm that further reduces the price of anarchy.
在无线局域网中,用户可以根据其链路的无线电条件调整其传输速率,以最大限度地提高其吞吐量。近年来,人们在开发分布式速率适应方案方面进行了大量的研究。与以往主要关注信道跟踪的工作不同,本文描述了速率自适应协议对从MAC接收的争用信息的最佳反应。我们解析地阐述了这个问题。我们研究竞争性和合作性用户行为。在竞争情况下,用户自私地调整他们的费率以最大化自己的吞吐量,而在合作情况下,他们调整他们的费率以最大化整个系统的吞吐量。我们证明了在竞争情况下达到的纳什均衡是低效的(即随着用户数量的增加,无政府状态的价格趋于无穷大),并提供了社会最优费率适应方案的深刻性质。我们发现最近提出的碰撞感知率自适应算法降低了无政府状态的代价。我们还提出了一种新的碰撞感知率自适应算法,进一步降低了无政府状态的代价。
{"title":"Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy","authors":"B. Radunovic, P. Chaporkar, A. Proutière","doi":"10.1109/INFCOM.2010.5462028","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462028","url":null,"abstract":"In Wireless LANs, users may adapt their transmission rates depending on the radio conditions of their links so as to maximize their throughput. Recently, there has been a significant research effort in developing distributed rate adaptation schemes. Unlike previous works that mainly focus on channel tracking, this paper characterizes the optimal reaction of a rate adaptation protocol to the contention information received from the MAC. We formulate this problem analytically. We study both competitive and cooperative user behaviors. In the case of competition, users selfishly adapt their rates so as to maximize their own throughput, whereas in the case of cooperation they adapt their rates so as to maximize the overall system throughput. We show that the Nash Equilibrium reached in the case of competition is inefficient (i.e. the price of anarchy goes to infinity as the number of users increases), and provide insightful properties of the socially optimal rate adaptation schemes. We find that recently proposed collision-aware rate adaptation algorithms decrease the price of anarchy. We also propose a novel collision-aware rate adaptation algorithm that further reduces the price of anarchy.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements 路径拼接:基于现有测量的全互联网路径和延迟估计
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462243
D. K. Lee, K. Jang, Changhyun Lee, G. Iannaccone, S. Moon
Many measurement systems have been proposed in recent years to shed light on the internal performance of the Internet. Their common goal is to allow distributed applications to improve end-user experience. A common hurdle they face is the need to deploy yet another measurement infrastructure. In this work, we demonstrate that without any new measurement infrastructure or active probing we obtain composite performance estimates from AS-by-AS segments and the estimates are as good as (or even better than) those from existing estimation methodologies that use on-demand, customized active probing. The main contribution of this paper is an estimation algorithm that breaks down measurement data into segments, identifies relevant segments efficiently, and, by carefully stitching segments together, produces delay and path estimates between any two end points. Fittingly, we call our algorithm path stitching. Our results show remarkably good accuracy: error in delay is below 20 ms in 80% of end-to-end paths.
近年来提出了许多测量系统来阐明互联网的内部性能。它们的共同目标是允许分布式应用程序改善最终用户体验。他们面临的一个常见障碍是需要部署另一个度量基础设施。在这项工作中,我们证明了在没有任何新的测量基础设施或主动探测的情况下,我们可以从as - as段获得复合性能估计,并且估计与使用按需定制的主动探测的现有估计方法一样好(甚至更好)。本文的主要贡献是一种估计算法,该算法将测量数据分解成片段,有效地识别相关片段,并通过仔细地将片段拼接在一起,产生任意两个端点之间的延迟和路径估计。恰当地说,我们称之为路径拼接算法。我们的结果显示出非常好的准确性:在80%的端到端路径中延迟误差低于20 ms。
{"title":"Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements","authors":"D. K. Lee, K. Jang, Changhyun Lee, G. Iannaccone, S. Moon","doi":"10.1109/INFCOM.2010.5462243","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462243","url":null,"abstract":"Many measurement systems have been proposed in recent years to shed light on the internal performance of the Internet. Their common goal is to allow distributed applications to improve end-user experience. A common hurdle they face is the need to deploy yet another measurement infrastructure. In this work, we demonstrate that without any new measurement infrastructure or active probing we obtain composite performance estimates from AS-by-AS segments and the estimates are as good as (or even better than) those from existing estimation methodologies that use on-demand, customized active probing. The main contribution of this paper is an estimation algorithm that breaks down measurement data into segments, identifies relevant segments efficiently, and, by carefully stitching segments together, produces delay and path estimates between any two end points. Fittingly, we call our algorithm path stitching. Our results show remarkably good accuracy: error in delay is below 20 ms in 80% of end-to-end paths.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116760224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1