首页 > 最新文献

Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications最新文献

英文 中文
End-to-end quality of service in multi-class service high-speed networks via optimal least weight routing 基于最优最小权重路由的多业务高速网络端到端服务质量研究
Jun Jiang, S. Papavassiliou
We propose the use of the optimal least weight routing (OLWR) algorithm for routing QoS flows in high-speed networks. The main principle of our algorithm is that the choice of the most appropriate route, is based on a set of parameters that estimate the impact that, the acceptance and routing decision of a call request belonging to a specific class, would have on the network and other classes of service. The performance evaluation results demonstrated that OLWR outperforms both the multi-hop least-loaded routing algorithms and the multihop most-loaded routing algorithms in terms of both revenue and carried load.
我们提出使用最优最小权重路由(OLWR)算法在高速网络中路由QoS流。我们算法的主要原则是,选择最合适的路由,是基于一组参数,这些参数估计了属于特定类的呼叫请求的接受和路由决策对网络和其他服务类的影响。性能评估结果表明,OLWR在收益和承载负载方面都优于多跳最小负载路由算法和多跳最大负载路由算法。
{"title":"End-to-end quality of service in multi-class service high-speed networks via optimal least weight routing","authors":"Jun Jiang, S. Papavassiliou","doi":"10.1109/ISCC.2002.1021714","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021714","url":null,"abstract":"We propose the use of the optimal least weight routing (OLWR) algorithm for routing QoS flows in high-speed networks. The main principle of our algorithm is that the choice of the most appropriate route, is based on a set of parameters that estimate the impact that, the acceptance and routing decision of a call request belonging to a specific class, would have on the network and other classes of service. The performance evaluation results demonstrated that OLWR outperforms both the multi-hop least-loaded routing algorithms and the multihop most-loaded routing algorithms in terms of both revenue and carried load.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signalling performance evaluation of large ATM networks based on measurements of isolated switches 基于隔离交换机测量的大型ATM网络信令性能评估
S. Székely
In the year 2000 the telecommunication market entered a very deep recession. In the current marketplace the service providers must improve network management to reduce operation costs. ATM network service providers offered mainly permanent virtual circuit connections to customers in the last few years, but recently there is an increasing interest in offering switched virtual circuit (SVC) connections to end users. The SVC is based on the use of signalling protocols. Our paper focuses on the performance of call processing in ATM networks. Based on a series of measurement results that have a wide generality among ATM switches, we have built up a node-model to design large ATM signalling networks. The paper shows that a cascaded network is a good estimator for the signalling performance of an arbitrary network. In addition, it is shown that the call density of the network is an important network parameter, which is closely related to the maximum network-level call arrival rate. The case studies are extended from homogeneous networks to hybrid networks.
2000年,电信市场陷入了严重的衰退。在当前的市场中,服务提供商必须改进网络管理以降低运营成本。在过去几年中,ATM网络服务提供商主要向客户提供永久虚拟电路连接,但最近,向最终用户提供交换虚拟电路(SVC)连接的兴趣越来越大。SVC基于信令协议的使用。本文主要研究ATM网络中的呼叫处理性能。在一系列具有广泛通用性的ATM交换机测试结果的基础上,建立了用于大型ATM信令网络设计的节点模型。本文证明了级联网络是任意网络信号性能的良好估计器。此外,研究表明网络的呼叫密度是一个重要的网络参数,它与最大网络级呼叫到达率密切相关。案例研究从同构网络扩展到混合网络。
{"title":"Signalling performance evaluation of large ATM networks based on measurements of isolated switches","authors":"S. Székely","doi":"10.1109/ISCC.2002.1021746","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021746","url":null,"abstract":"In the year 2000 the telecommunication market entered a very deep recession. In the current marketplace the service providers must improve network management to reduce operation costs. ATM network service providers offered mainly permanent virtual circuit connections to customers in the last few years, but recently there is an increasing interest in offering switched virtual circuit (SVC) connections to end users. The SVC is based on the use of signalling protocols. Our paper focuses on the performance of call processing in ATM networks. Based on a series of measurement results that have a wide generality among ATM switches, we have built up a node-model to design large ATM signalling networks. The paper shows that a cascaded network is a good estimator for the signalling performance of an arbitrary network. In addition, it is shown that the call density of the network is an important network parameter, which is closely related to the maximum network-level call arrival rate. The case studies are extended from homogeneous networks to hybrid networks.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carrier frequency offset estimation and correction for Hiperlan/2 WLANs Hiperlan/2无线局域网载波频偏估计与校正
A. Miaoudakis, Apostolos Koukourgiannis, G. Kalivas
The performance of carrier frequency offset (CFO) estimators is examined when applied to Hiperlan2 modems. The performance of various estimator procedures is evaluated by means of simulation. A new estimation scheme is proposed for Hiperlan2 that takes advantage of the structure of the physical frames. Its major advantage is that the estimator operating range is extended to fulfil a worst-case scenario of CFO for Hiperlan2. A CFO correction architecture is also proposed which consists of 2 parts; a coarse CFO estimator that feeds a numerically controlled oscillator (NCO) to remove a part of CFO, and a fine CFO estimator-corrector that uses linear phase extrapolation to correct the phase shift caused by the remaining CFO.
研究了载波频偏估计器应用于Hiperlan2调制解调器的性能。通过仿真对各种估计方法的性能进行了评价。提出了一种新的利用物理帧结构的Hiperlan2估计方案。它的主要优点是,估计器的操作范围扩大到满足Hiperlan2的CFO的最坏情况。提出了一种CFO修正体系,该体系由两部分组成;一个粗略的CFO估计器,它输入一个数控振荡器(NCO)来去除一部分CFO,以及一个精细的CFO估计校正器,它使用线性相位外推来纠正由剩余CFO引起的相移。
{"title":"Carrier frequency offset estimation and correction for Hiperlan/2 WLANs","authors":"A. Miaoudakis, Apostolos Koukourgiannis, G. Kalivas","doi":"10.1109/ISCC.2002.1021749","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021749","url":null,"abstract":"The performance of carrier frequency offset (CFO) estimators is examined when applied to Hiperlan2 modems. The performance of various estimator procedures is evaluated by means of simulation. A new estimation scheme is proposed for Hiperlan2 that takes advantage of the structure of the physical frames. Its major advantage is that the estimator operating range is extended to fulfil a worst-case scenario of CFO for Hiperlan2. A CFO correction architecture is also proposed which consists of 2 parts; a coarse CFO estimator that feeds a numerically controlled oscillator (NCO) to remove a part of CFO, and a fine CFO estimator-corrector that uses linear phase extrapolation to correct the phase shift caused by the remaining CFO.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117233218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Active hardware attacks and proactive countermeasures 主动硬件攻击和主动对策
A. Voyiatzis, D. Serpanos
Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir (1988) scheme, and Schnorr's scheme. Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typically cryptographic keys, owned by the service provider and often implement the Fiat-Shamir identification scheme. Given the strength of active attacks and the increasingly wide deployment of client systems, it is desirable to design proactive countermeasures for them. We focus on the Fiat-Shamir scheme. We prove that the conventional active attack can be easily avoided through appropriate system and protocol configuration; we denote this configuration as the precautious Fiat-Shamir Scheme. We argue that proactive countermeasures against active attacks are feasible and lead to systems that are inherently resistant to active attacks by careful protocol design, rather than ad hoc solutions.
主动硬件攻击可以成功地从目标设备中获取加密秘密。它们最初是为实现RSA、Fiat-Shamir(1988)方案和Schnorr方案的系统提出的。这些攻击的常见目标是用于客户端身份验证以访问服务的系统,例如,按次付费电视,视频分发和蜂窝电话。这些客户端系统保存由服务提供商拥有的秘密,通常是加密密钥,并且通常实现Fiat-Shamir标识方案。鉴于主动攻击的强度和客户端系统日益广泛的部署,需要为它们设计主动对策。我们关注的是菲亚特-沙米尔计划。通过适当的系统和协议配置,可以很容易地避免传统的主动攻击;我们将这种配置称为预防性的菲亚特-沙米尔方案。我们认为,针对主动攻击的主动对策是可行的,并通过仔细的协议设计导致系统固有地抵抗主动攻击,而不是临时解决方案。
{"title":"Active hardware attacks and proactive countermeasures","authors":"A. Voyiatzis, D. Serpanos","doi":"10.1109/ISCC.2002.1021702","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021702","url":null,"abstract":"Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir (1988) scheme, and Schnorr's scheme. Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typically cryptographic keys, owned by the service provider and often implement the Fiat-Shamir identification scheme. Given the strength of active attacks and the increasingly wide deployment of client systems, it is desirable to design proactive countermeasures for them. We focus on the Fiat-Shamir scheme. We prove that the conventional active attack can be easily avoided through appropriate system and protocol configuration; we denote this configuration as the precautious Fiat-Shamir Scheme. We argue that proactive countermeasures against active attacks are feasible and lead to systems that are inherently resistant to active attacks by careful protocol design, rather than ad hoc solutions.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124739497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Authenticating real time packet streams and multicasts 验证实时数据包流和组播
Alain Pannetrat, R. Molva
We propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are signed together in a block and the recipient can authenticate this block if the loss rate per block is lower than a certain threshold, which can be chosen based on the characteristic of the communication channel. This scheme provides both integrity and non repudiation of origin, and in a majority of situations, it performs with less overhead in bytes per packet than previously proposed practical live stream authentication schemes.
我们提出了一种新的流认证方案,该方案适用于分布在有损通道上的实时数据包流,例如ip多播组。数据包被签名在一个块中,如果每个块的损失率低于某个阈值,接收方就可以对该块进行认证,该阈值可以根据通信通道的特性选择。该方案同时提供完整性和来源不可否认性,并且在大多数情况下,与以前提出的实际实时流身份验证方案相比,它在每个数据包上的字节开销更少。
{"title":"Authenticating real time packet streams and multicasts","authors":"Alain Pannetrat, R. Molva","doi":"10.1109/ISCC.2002.1021720","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021720","url":null,"abstract":"We propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are signed together in a block and the recipient can authenticate this block if the loss rate per block is lower than a certain threshold, which can be chosen based on the characteristic of the communication channel. This scheme provides both integrity and non repudiation of origin, and in a majority of situations, it performs with less overhead in bytes per packet than previously proposed practical live stream authentication schemes.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A linear programming based approach for computing optimal fair splittable routing 基于线性规划的最优公平可分路由计算方法
D. Nace
We consider the fair flow problem in a multiple source multiple sink network, as applied to telecommunication networks. We present an iterative algorithm for computing fair routing in networks where the available resources are shared among competing flows according to a max-min fair sharing criterion. Our main objective is computing optimal routing paths, with regard to max-min fairness, in stable and known traffic conditions. It is a linear programming based approach which permits a lexicographical maximization of the vector of fair-share attributed to the connections competing for network resources. An optimality proof and some computational results are also presented.
我们考虑了多源多汇网络中的公平流问题,并将其应用于电信网络。本文提出了一种基于最大最小公平共享准则的网络公平路由计算迭代算法。我们的主要目标是在稳定和已知的交通条件下计算关于最大最小公平性的最优路由路径。它是一种基于线性规划的方法,允许在字典上最大化归因于竞争网络资源的连接的公平份额向量。给出了最优性证明和一些计算结果。
{"title":"A linear programming based approach for computing optimal fair splittable routing","authors":"D. Nace","doi":"10.1109/ISCC.2002.1021717","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021717","url":null,"abstract":"We consider the fair flow problem in a multiple source multiple sink network, as applied to telecommunication networks. We present an iterative algorithm for computing fair routing in networks where the available resources are shared among competing flows according to a max-min fair sharing criterion. Our main objective is computing optimal routing paths, with regard to max-min fairness, in stable and known traffic conditions. It is a linear programming based approach which permits a lexicographical maximization of the vector of fair-share attributed to the connections competing for network resources. An optimality proof and some computational results are also presented.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"81 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126066533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Resource management in differentiated services: a prototype implementation 差异化服务中的资源管理:原型实现
M. Jacobsson, S. Oosthoek, G. Karagiannis
The wide deployment of IP technologies has driven the development of IP-based solutions for wireless networks, like the IP-based radio access networks (RAN). Such wireless networks have different characteristics than traditional IP networks, imposing very strict requirements on quality of service (QoS) solutions. Current QoS solutions are not able to satisfy these requirements. This paper describes the prototype implementation of a QoS-framework, called resource management in differentiated services (RMD), which aims to correct this situation. RMD is a framework offering scalable fine-grained QoS guarantees in differentiated services (DiffServ) networks. It extends the DiffServ architecture with new admission control and resource reservation concepts in a scalable way.
IP技术的广泛应用推动了基于IP的无线网络解决方案的发展,如基于IP的无线接入网(RAN)。这种无线网络具有与传统IP网络不同的特点,对服务质量(QoS)解决方案提出了非常严格的要求。当前的QoS解决方案无法满足这些要求。本文描述了一个qos框架的原型实现,称为差异化服务中的资源管理(RMD),旨在纠正这种情况。RMD是一个框架,在差异化服务(DiffServ)网络中提供可伸缩的细粒度QoS保证。它以一种可扩展的方式扩展了DiffServ体系结构,使用了新的准入控制和资源保留概念。
{"title":"Resource management in differentiated services: a prototype implementation","authors":"M. Jacobsson, S. Oosthoek, G. Karagiannis","doi":"10.1109/ISCC.2002.1021653","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021653","url":null,"abstract":"The wide deployment of IP technologies has driven the development of IP-based solutions for wireless networks, like the IP-based radio access networks (RAN). Such wireless networks have different characteristics than traditional IP networks, imposing very strict requirements on quality of service (QoS) solutions. Current QoS solutions are not able to satisfy these requirements. This paper describes the prototype implementation of a QoS-framework, called resource management in differentiated services (RMD), which aims to correct this situation. RMD is a framework offering scalable fine-grained QoS guarantees in differentiated services (DiffServ) networks. It extends the DiffServ architecture with new admission control and resource reservation concepts in a scalable way.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fair-rate GPS: a new class for decoupling delay and bandwidth properties 公平速率GPS:一类新的解耦延迟和带宽特性
H. Mokhtar, R. Pereira, M. Merabti
Generalized processor sharing (GPS) is an idealized fluid scheduling discipline that has desirable properties for integrated services networks. It provides tight end-to-end guarantees to leaky-bucket constrained streams regardless of the behavior of other connections. It also allocates bandwidth fairly among all connections regardless of whether or not their traffic is constrained. According to their weight assignments, GPS networks are categorized into three classes: rate proportional processor sharing (RPPS), consistent relative session treatment (CRST) and arbitrary weighting. These classes achieve different degrees of complexity, stability, coupling between delay and bandwidth, and utilization gain. We present a new GPS class: the fair-rate GPS. For this class, the weights are set in proportion to both bandwidth and required delay, thus achieving higher utilization while avoiding the coupling. problem. We evaluate the new class using MPEG video traces and show that higher utilization gain can be achieved.
广义处理器共享(GPS)是一种理想的流体调度方法,它对综合业务网络具有理想的特性。它为受泄漏桶约束的流提供了严格的端到端保证,而不考虑其他连接的行为。它还在所有连接之间公平地分配带宽,而不管它们的流量是否受到限制。根据GPS网络的权重分配,将GPS网络分为三种类型:速率比例处理器共享(RPPS)、一致相对会话处理(CRST)和任意加权。这些类实现了不同程度的复杂性、稳定性、延迟和带宽之间的耦合以及利用率增益。我们提出了一种新的GPS类:公平速率GPS。对于该类,权重与带宽和所需延迟成比例设置,从而在避免耦合的同时实现更高的利用率。问题。我们使用MPEG视频跟踪对新类进行了评估,并表明可以实现更高的利用率增益。
{"title":"Fair-rate GPS: a new class for decoupling delay and bandwidth properties","authors":"H. Mokhtar, R. Pereira, M. Merabti","doi":"10.1109/ISCC.2002.1021733","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021733","url":null,"abstract":"Generalized processor sharing (GPS) is an idealized fluid scheduling discipline that has desirable properties for integrated services networks. It provides tight end-to-end guarantees to leaky-bucket constrained streams regardless of the behavior of other connections. It also allocates bandwidth fairly among all connections regardless of whether or not their traffic is constrained. According to their weight assignments, GPS networks are categorized into three classes: rate proportional processor sharing (RPPS), consistent relative session treatment (CRST) and arbitrary weighting. These classes achieve different degrees of complexity, stability, coupling between delay and bandwidth, and utilization gain. We present a new GPS class: the fair-rate GPS. For this class, the weights are set in proportion to both bandwidth and required delay, thus achieving higher utilization while avoiding the coupling. problem. We evaluate the new class using MPEG video traces and show that higher utilization gain can be achieved.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"410 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122791292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Latent multicast monitoring 潜在组播监控
R. State
This paper addresses the problem of monitoring packet loss in multicast networks. The proposed approach consists of monitoring a latent factor which is supposed to stand for and cause the observed network behavior. Our paper proposes a scheme based on principal component analysis in order to extract monitoring information and statistical process control in order to provide a methodology for monitoring multicast communication.
本文研究了组播网络中丢包的监控问题。该方法包括监测潜在因素,该潜在因素代表并导致被观察到的网络行为。本文提出了一种基于主成分分析的监控信息提取和统计过程控制方案,为组播通信监控提供了一种方法。
{"title":"Latent multicast monitoring","authors":"R. State","doi":"10.1109/ISCC.2002.1021786","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021786","url":null,"abstract":"This paper addresses the problem of monitoring packet loss in multicast networks. The proposed approach consists of monitoring a latent factor which is supposed to stand for and cause the observed network behavior. Our paper proposes a scheme based on principal component analysis in order to extract monitoring information and statistical process control in order to provide a methodology for monitoring multicast communication.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122117726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-securing ad hoc wireless networks 自保护特设无线网络
Haiyun Luo, P. Zerfos, J. Kong, Songwu Lu, Lixia Zhang
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive eavesdropping over the wireless channel, denial of service attacks by malicious nodes and attacks from compromised nodes or stolen devices. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well.This work provides scalable, distributed authentication services in ad hoc networks. Our design takes a self-securing approach, in which multiple nodes (say, k) collaboratively provide authentication services for other nodes in the network. We first formalize a localized trust model that lays the foundation for the design. We further propose refined localized certification services based on our previous work, and develop a new scalable share update to resist more powerful adversaries. Finally, we evaluate the solution through simulation and implementation.
移动自组织网络在共享无线信道上提供方便的无基础设施通信。然而,自组织网络的性质使它们容易受到安全攻击。此类攻击的示例包括通过无线信道进行被动窃听、恶意节点的拒绝服务攻击以及来自受损节点或被盗设备的攻击。与有线网络不同,无基础设施的自组织网络没有明确的防线,每个节点都必须为遇到对手做好准备。因此,集中式或分层的网络安全解决方案不能很好地发挥作用。这项工作在自组织网络中提供可扩展的分布式身份验证服务。我们的设计采用自保护方法,其中多个节点(例如k)协作为网络中的其他节点提供身份验证服务。我们首先形式化一个本地化的信任模型,它为设计奠定了基础。我们在之前工作的基础上进一步提出了改进的本地化认证服务,并开发了一个新的可扩展共享更新来抵御更强大的对手。最后,通过仿真和实现对方案进行了评价。
{"title":"Self-securing ad hoc wireless networks","authors":"Haiyun Luo, P. Zerfos, J. Kong, Songwu Lu, Lixia Zhang","doi":"10.1109/ISCC.2002.1021731","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021731","url":null,"abstract":"Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive eavesdropping over the wireless channel, denial of service attacks by malicious nodes and attacks from compromised nodes or stolen devices. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well.This work provides scalable, distributed authentication services in ad hoc networks. Our design takes a self-securing approach, in which multiple nodes (say, k) collaboratively provide authentication services for other nodes in the network. We first formalize a localized trust model that lays the foundation for the design. We further propose refined localized certification services based on our previous work, and develop a new scalable share update to resist more powerful adversaries. Finally, we evaluate the solution through simulation and implementation.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 442
期刊
Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1