Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our investigation, we crawl the Gnutella P2P network over a 12 day period collecting file names and file popularity statistics. We are then able to extract the highly popular files and identify worm/malware files within them with high accuracy.
{"title":"Passive Worm and Malware Detection in Peer-to-Peer Networks","authors":"Sahar Fahimian, Amirvala Movahed, M. Kharrazi","doi":"10.1109/EUC.2010.133","DOIUrl":"https://doi.org/10.1109/EUC.2010.133","url":null,"abstract":"Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our investigation, we crawl the Gnutella P2P network over a 12 day period collecting file names and file popularity statistics. We are then able to extract the highly popular files and identify worm/malware files within them with high accuracy.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128064568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new media access control (MAC) protocol, Preamble-MAC (P-MAC). P-MAC is adaptive and dynamic MAC protocol based on Virtual Distance Level (VDL), which is the estimated, accumulated information of channel status and variation obtained through periodically monitoring underwater environment information such as long, unknown propagation delays and low bandwidth for underwater acoustic sensor networks.
{"title":"Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor Networks","authors":"Jung-Il Namgung, S. Shin, N. Yun, Soo-Hyun Park","doi":"10.1109/EUC.2010.149","DOIUrl":"https://doi.org/10.1109/EUC.2010.149","url":null,"abstract":"This paper proposes a new media access control (MAC) protocol, Preamble-MAC (P-MAC). P-MAC is adaptive and dynamic MAC protocol based on Virtual Distance Level (VDL), which is the estimated, accumulated information of channel status and variation obtained through periodically monitoring underwater environment information such as long, unknown propagation delays and low bandwidth for underwater acoustic sensor networks.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
a cloud computing prototype system, UbiCloud, is developed to enable the ubiquitous terminals access to powerful and reliable computing resources anywhere and anytime through building a virtual computing environment between the front-end ubiquitous terminals and the back-end servers (cloud). The experiment results show that the system performance is good enough to support most applications deployment on resource- poor terminals.
{"title":"UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User Virtualization","authors":"Yuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He","doi":"10.1109/EUC.2010.150","DOIUrl":"https://doi.org/10.1109/EUC.2010.150","url":null,"abstract":"a cloud computing prototype system, UbiCloud, is developed to enable the ubiquitous terminals access to powerful and reliable computing resources anywhere and anytime through building a virtual computing environment between the front-end ubiquitous terminals and the back-end servers (cloud). The experiment results show that the system performance is good enough to support most applications deployment on resource- poor terminals.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134425130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiayin Li, Meikang Qiu, J. Niu, Tianzhou Chen, Yongxin Zhu
Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more functionalities and providing higher performance. The high temperature on chip is a critical issue for the 3D architecture. In this paper, we propose an online thermal prediction model for 3D chip. Using this model, we present a task scheduling algorithm based on rotation scheduling to reduce the peak temperature on chip. We consider the data dependencies, especially the inter-iteration dependencies which are not well considered in most of the current thermal-aware task scheduling algorithms. Our simulation result shows that our algorithm can efficiently reduce the peak temperature up to 10C.
{"title":"Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature","authors":"Jiayin Li, Meikang Qiu, J. Niu, Tianzhou Chen, Yongxin Zhu","doi":"10.1109/EUC.2010.33","DOIUrl":"https://doi.org/10.1109/EUC.2010.33","url":null,"abstract":"Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more functionalities and providing higher performance. The high temperature on chip is a critical issue for the 3D architecture. In this paper, we propose an online thermal prediction model for 3D chip. Using this model, we present a task scheduling algorithm based on rotation scheduling to reduce the peak temperature on chip. We consider the data dependencies, especially the inter-iteration dependencies which are not well considered in most of the current thermal-aware task scheduling algorithms. Our simulation result shows that our algorithm can efficiently reduce the peak temperature up to 10C.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130300166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All above makes it very difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition, we present a pattern of multi-dimensional fuzzy decision making with feedback. The analysis and experimental computation shows that this scheme is efficient in risk assessment of Ad hoc networks.
{"title":"Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making","authors":"Zhang Feng, Z. Jia, Li Xin, Xia Hui","doi":"10.1109/EUC.2010.84","DOIUrl":"https://doi.org/10.1109/EUC.2010.84","url":null,"abstract":"Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All above makes it very difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition, we present a pattern of multi-dimensional fuzzy decision making with feedback. The analysis and experimental computation shows that this scheme is efficient in risk assessment of Ad hoc networks.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114180929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the challenged networks, such as interplanetary networks, satellite networks, military networks and so on, a complete path from the source to the destination does not exist for most of the time. The lack of end-to-end path makes the message delivery a great challenge in these networks. In this paper, we propose the spray and routing message delivery mechanism, which combines the simplicity of epidemic routing and the efficiency of direct routing. We evaluate the performance of Spray and Routing via simulation using the ONE simulator, in comparison with the traditional Epidemic, Prophet and Spray and Waiting protocols. The simulation results show that our method can achieve better performance.
在面临挑战的网络中,如行星际网络、卫星网络、军事网络等,在大多数情况下,不存在从源到目的的完整路径。在这些网络中,缺乏端到端路径使得消息传递成为一个巨大的挑战。本文提出了一种结合了流行病路由的简单性和直接路由的高效性的喷雾路由消息传递机制。我们使用ONE模拟器对Spray and Routing的性能进行了仿真评估,并与传统的Epidemic、Prophet和Spray and Waiting协议进行了比较。仿真结果表明,该方法具有较好的性能。
{"title":"Spray and Routing for Message Delivery in Challenged Networks","authors":"Wanrong Yu, Chunqing Wu, Xiaofeng Hu","doi":"10.1109/EUC.2010.78","DOIUrl":"https://doi.org/10.1109/EUC.2010.78","url":null,"abstract":"In the challenged networks, such as interplanetary networks, satellite networks, military networks and so on, a complete path from the source to the destination does not exist for most of the time. The lack of end-to-end path makes the message delivery a great challenge in these networks. In this paper, we propose the spray and routing message delivery mechanism, which combines the simplicity of epidemic routing and the efficiency of direct routing. We evaluate the performance of Spray and Routing via simulation using the ONE simulator, in comparison with the traditional Epidemic, Prophet and Spray and Waiting protocols. The simulation results show that our method can achieve better performance.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flexible Application Specific Instruction set Processors (ASIPs) are starting to replace monolithic ASICs in a wide variety of fields. However the construction of an ASIP is today associated with a substantial design effort. No GAP (Novel Generator of Micro Architecture and Processor) is a tool for ASIP design utilizing hardware multiplexed data paths. One of the main advantages of No GAP compared to other EDA tools for processor design, is that No GAP imposes few limits on the architecture and thus design freedom. To prove that No GAP can be used to design complex data paths a reimplementation of a floating point adder/subtracter previously implemented using Verilog with FPGA specific optimizations was reimplemented using the No GAP-CL. The adder/subtracter implemented in Verilog can operate at a frequency of 377 MHz in a Virtex-4SX35 (speed grade-12) as compared with the No GAP implementation which had a maximum operation frequency of 276 Mhz, using the hand optimized mantissa adder from the original Verilog code, the No GAP implementation reached timing closure at 326 Mhz.
灵活的专用指令集处理器(asip)开始在各种领域取代单片asic。然而,ASIP的构建今天与大量的设计工作联系在一起。No GAP (Novel Generator of microarchitecture and Processor)是一个利用硬件多路数据路径进行ASIP设计的工具。与其他用于处理器设计的EDA工具相比,No GAP的主要优点之一是,No GAP对体系结构施加的限制很少,因此设计自由。为了证明No GAP可以用于设计复杂的数据路径,使用No GAP- cl重新实现了先前使用Verilog实现的带有FPGA特定优化的浮点加/减法器。在Verilog中实现的加/减法器可以在Virtex-4SX35(速度等级12)中以377 MHz的频率工作,而No GAP实现的最大工作频率为276 MHz,使用原始Verilog代码中的手动优化尾数加法器,No GAP实现在326 MHz达到时序关闭。
{"title":"Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case Study","authors":"Per Karlström, Wenbiao Zhou, Dake Liu","doi":"10.1109/EUC.2010.20","DOIUrl":"https://doi.org/10.1109/EUC.2010.20","url":null,"abstract":"Flexible Application Specific Instruction set Processors (ASIPs) are starting to replace monolithic ASICs in a wide variety of fields. However the construction of an ASIP is today associated with a substantial design effort. No GAP (Novel Generator of Micro Architecture and Processor) is a tool for ASIP design utilizing hardware multiplexed data paths. One of the main advantages of No GAP compared to other EDA tools for processor design, is that No GAP imposes few limits on the architecture and thus design freedom. To prove that No GAP can be used to design complex data paths a reimplementation of a floating point adder/subtracter previously implemented using Verilog with FPGA specific optimizations was reimplemented using the No GAP-CL. The adder/subtracter implemented in Verilog can operate at a frequency of 377 MHz in a Virtex-4SX35 (speed grade-12) as compared with the No GAP implementation which had a maximum operation frequency of 276 Mhz, using the hand optimized mantissa adder from the original Verilog code, the No GAP implementation reached timing closure at 326 Mhz.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim
Underwater sensor network (USN) enables various services implemented over terrestrial wireless sensor network previously and underwater robot control service is one of the applications of USN. For wirelessly controlling an underwater robot, development of an underwater acoustic modem for transmitting robot control frame as well as analysis of the robot control protocol should be carried out properly. In this paper, we have developed an underwater modem suitable for underwater robot control and designed a protocol to handle the robot. We have also verified the robot control system by experimenting in an underwater environment.
{"title":"Robot Control Using an Underwater Acoustic Modem","authors":"Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim","doi":"10.1109/EUC.2010.55","DOIUrl":"https://doi.org/10.1109/EUC.2010.55","url":null,"abstract":"Underwater sensor network (USN) enables various services implemented over terrestrial wireless sensor network previously and underwater robot control service is one of the applications of USN. For wirelessly controlling an underwater robot, development of an underwater acoustic modem for transmitting robot control frame as well as analysis of the robot control protocol should be carried out properly. In this paper, we have developed an underwater modem suitable for underwater robot control and designed a protocol to handle the robot. We have also verified the robot control system by experimenting in an underwater environment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Much research exists for the efficient processing of spatio-temporal data streams. However, all methods ultimately rely on an ill-equipped processor [22], namely a CPU, to evaluate concurrent, continuous spatio-temporal queries over these data streams. This paper presents GEDS, a scalable, Graphics Processing Unit (GPU)-based framework for the evaluation of continuous spatio-temporal queries over spatio-temporal data streams. GEDS employs the computation sharing and parallel processing paradigms to deliver scalability in the evaluation of continuous spatio-temporal queries. The GEDS framework utilizes the parallel processing capability of the GPU, a stream processor by trade, to handle the computation required in this application. Experimental evaluation shows promising performance and shows the scalability and efficacy of GEDS in spatio-temporal data streaming environments.
{"title":"GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams","authors":"Jonathan M. Cazalas, R. Guha","doi":"10.1109/EUC.2010.26","DOIUrl":"https://doi.org/10.1109/EUC.2010.26","url":null,"abstract":"Much research exists for the efficient processing of spatio-temporal data streams. However, all methods ultimately rely on an ill-equipped processor [22], namely a CPU, to evaluate concurrent, continuous spatio-temporal queries over these data streams. This paper presents GEDS, a scalable, Graphics Processing Unit (GPU)-based framework for the evaluation of continuous spatio-temporal queries over spatio-temporal data streams. GEDS employs the computation sharing and parallel processing paradigms to deliver scalability in the evaluation of continuous spatio-temporal queries. The GEDS framework utilizes the parallel processing capability of the GPU, a stream processor by trade, to handle the computation required in this application. Experimental evaluation shows promising performance and shows the scalability and efficacy of GEDS in spatio-temporal data streaming environments.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution that fits into this context. This paper proposes a formal trust specification which covers a wide range of intuitive trust characteristics such as trust transitivity and mutual relationship. We develop a new trust definition and three modes of trust with algebraic operators to form specification formulas. A method for determining the closeness of a matched trust value on a service using Euclidean Distance is presented and the basic analysis is conducted.
{"title":"Formal Trust Specification in Service Workflows","authors":"W. Viriyasitavat, Andrew P. Martin","doi":"10.1109/EUC.2010.111","DOIUrl":"https://doi.org/10.1109/EUC.2010.111","url":null,"abstract":"The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution that fits into this context. This paper proposes a formal trust specification which covers a wide range of intuitive trust characteristics such as trust transitivity and mutual relationship. We develop a new trust definition and three modes of trust with algebraic operators to form specification formulas. A method for determining the closeness of a matched trust value on a service using Euclidean Distance is presented and the basic analysis is conducted.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125158630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}