首页 > 最新文献

IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications最新文献

英文 中文
Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channels 衰落信道下点播视频流QoE优化的大流量分析
Ping-Chun Hsieh, I.-Hong Hou
This paper proposes online scheduling policies to optimize quality of experience (QoE) for video-on-demand applications in wireless networks. We consider wireless systems where an access point (AP) transmits video content to clients over fading channels. The QoE of each flow is measured by its duration of video playback interruption. We are specifically interested in systems operating in the heavy-traffic regime. We first consider a special case of ON-OFF channels and establish a scheduling policy that achieves every point in the capacity region under heavy-traffic conditions. This policy is then extended for more general fading channels, and we prove that it remains optimal under some mild conditions. We then formulate a network utility maximization problem based on the QoE of each flow. We demonstrate that our policies achieve the optimal overall utility when their parameters are chosen properly. Finally, we compare our policies against three popular policies. Simulation results validate that the proposed policy indeed outperforms existing policies.
为优化无线网络视频点播应用的体验质量,提出了在线调度策略。我们考虑无线系统,其中接入点(AP)通过衰落信道向客户端传输视频内容。每个流的QoE通过其视频播放中断的持续时间来度量。我们对在交通繁忙的情况下运行的系统特别感兴趣。我们首先考虑了一种特殊的ON-OFF通道情况,并建立了在大流量条件下达到容量区域内所有点的调度策略。然后将该策略推广到更一般的衰落信道,并证明了它在一些温和的条件下仍然是最优的。然后,我们根据每个流的QoE制定了一个网络效用最大化问题。我们证明,当我们的策略的参数选择得当时,我们的策略实现了最优的整体效用。最后,我们将我们的政策与三个流行的政策进行比较。仿真结果验证了所提策略确实优于现有策略。
{"title":"Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channels","authors":"Ping-Chun Hsieh, I.-Hong Hou","doi":"10.1109/INFOCOM.2016.7524527","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524527","url":null,"abstract":"This paper proposes online scheduling policies to optimize quality of experience (QoE) for video-on-demand applications in wireless networks. We consider wireless systems where an access point (AP) transmits video content to clients over fading channels. The QoE of each flow is measured by its duration of video playback interruption. We are specifically interested in systems operating in the heavy-traffic regime. We first consider a special case of ON-OFF channels and establish a scheduling policy that achieves every point in the capacity region under heavy-traffic conditions. This policy is then extended for more general fading channels, and we prove that it remains optimal under some mild conditions. We then formulate a network utility maximization problem based on the QoE of each flow. We demonstrate that our policies achieve the optimal overall utility when their parameters are chosen properly. Finally, we compare our policies against three popular policies. Simulation results validate that the proposed policy indeed outperforms existing policies.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1992 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128611306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The quest for resilient (static) forwarding tables 对弹性(静态)转发表的追求
Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, A. Gurtov, A. Madry, Michael Schapira, S. Shenker
Fast Reroute (FRR) and other forms of immediate failover have long been used to recover from certain classes of failures without invoking the network control plane. While the set of such techniques is growing, the level of resiliency to failures that this approach can provide is not adequately understood. We embark upon a systematic algorithmic study of the resiliency of immediate failover in a variety of models (with/without packet marking/duplication, etc.). We leverage our findings to devise new schemes for immediate failover and show, both theoretically and experimentally, that these outperform existing approaches.
快速路由(FRR)和其他形式的即时故障转移长期以来一直用于从某些类型的故障中恢复,而无需调用网络控制平面。虽然这类技术的集合在不断增长,但这种方法所能提供的故障恢复能力还没有得到充分的理解。我们开始对各种模型(带/不带数据包标记/复制等)的即时故障转移的弹性进行系统的算法研究。我们利用我们的发现来设计新的方案,用于即时故障转移,并在理论上和实验上表明,这些方案优于现有的方法。
{"title":"The quest for resilient (static) forwarding tables","authors":"Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, A. Gurtov, A. Madry, Michael Schapira, S. Shenker","doi":"10.1109/INFOCOM.2016.7524552","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524552","url":null,"abstract":"Fast Reroute (FRR) and other forms of immediate failover have long been used to recover from certain classes of failures without invoking the network control plane. While the set of such techniques is growing, the level of resiliency to failures that this approach can provide is not adequately understood. We embark upon a systematic algorithmic study of the resiliency of immediate failover in a variety of models (with/without packet marking/duplication, etc.). We leverage our findings to devise new schemes for immediate failover and show, both theoretically and experimentally, that these outperform existing approaches.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124913404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
CSMA networks in a many-sources regime: A mean-field approach 多源状态下的CSMA网络:平均场方法
Fabio Cecchi, S. Borst, J. V. Leeuwaarden, P. Whiting
With the rapid advance of the Internet of Everything, both the number of devices and the range of applications that rely on wireless connectivity show huge growth. Driven by these pervasive trends, wireless networks grow in size and complexity, supporting immense numbers of nodes and data volumes, with highly diverse traffic profiles and performance requirements. While well-established methods are available for evaluating the throughput of persistent sessions with saturated buffers, these provide no insight in the delay performance of flows with intermittent packet arrivals. The occurrence of empty buffers in the latter scenario results in a complex interaction between activity states and packet queues, which severely complicates the performance analysis. Motivated by these challenges, we develop a mean-field approach to analyze buffer contents and packet delays in wireless networks in a many-sources regime. The mean-field behavior simplifies the analysis of a large-scale network with packet arrivals and buffer dynamics to a low-dimensional fixed-point calculation for a network with saturated buffers. In particular, the analysis yields explicit expressions for the buffer content and packet delay distribution in terms of the fixed-point solution. Extensive simulation experiments demonstrate that these expressions provide highly accurate approximations, even for a fairly moderate number of sources.
随着万物互联的快速发展,依赖无线连接的设备数量和应用范围都呈现出巨大的增长。在这些普遍趋势的推动下,无线网络的规模和复杂性不断增长,支持大量节点和数据量,具有高度多样化的流量概况和性能要求。虽然已有成熟的方法可用于评估具有饱和缓冲区的持久会话的吞吐量,但这些方法无法深入了解具有间歇数据包到达的流的延迟性能。在后一种场景中,空缓冲区的出现会导致活动状态和数据包队列之间的复杂交互,从而严重复杂化性能分析。在这些挑战的激励下,我们开发了一种平均场方法来分析多源状态下无线网络中的缓冲区内容和数据包延迟。平均场行为将具有数据包到达和缓冲区动态的大规模网络的分析简化为具有饱和缓冲区的网络的低维不动点计算。特别地,分析得出了根据不动点解的缓冲区内容和分组延迟分布的显式表达式。大量的模拟实验表明,这些表达式提供了高度精确的近似值,即使对于相当中等数量的源。
{"title":"CSMA networks in a many-sources regime: A mean-field approach","authors":"Fabio Cecchi, S. Borst, J. V. Leeuwaarden, P. Whiting","doi":"10.1109/INFOCOM.2016.7524604","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524604","url":null,"abstract":"With the rapid advance of the Internet of Everything, both the number of devices and the range of applications that rely on wireless connectivity show huge growth. Driven by these pervasive trends, wireless networks grow in size and complexity, supporting immense numbers of nodes and data volumes, with highly diverse traffic profiles and performance requirements. While well-established methods are available for evaluating the throughput of persistent sessions with saturated buffers, these provide no insight in the delay performance of flows with intermittent packet arrivals. The occurrence of empty buffers in the latter scenario results in a complex interaction between activity states and packet queues, which severely complicates the performance analysis. Motivated by these challenges, we develop a mean-field approach to analyze buffer contents and packet delays in wireless networks in a many-sources regime. The mean-field behavior simplifies the analysis of a large-scale network with packet arrivals and buffer dynamics to a low-dimensional fixed-point calculation for a network with saturated buffers. In particular, the analysis yields explicit expressions for the buffer content and packet delay distribution in terms of the fixed-point solution. Extensive simulation experiments demonstrate that these expressions provide highly accurate approximations, even for a fairly moderate number of sources.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"98 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks 能量采集传感器网络中的自适应连通支配集发现算法
Tuo Shi, Siyao Cheng, Zhipeng Cai, Jianzhong Li
A Wireless Sensor Network consists of a number of sensors. The energy of each sensor is limited which limits network lifetime. There are many existing energy efficiency algorithms to prolong network lifetime. Basically, there are two kinds of methods. One is energy-efficiency management, such as duty-cycling using virtual-backbones. The other one is energy provision, such as energy harvest from the environment. In this paper, we introduce a new problem, CDSEH, to combine these two methods together. We also propose a new standard to define the network lifetime of a WSN. We prove that the CDSEH problem is NP-Complete and propose two approximate algorithms accordingly. Extensive simulation results are shown to validate the performance of our algorithms.
无线传感器网络由许多传感器组成。每个传感器的能量是有限的,这限制了网络的生存时间。为了延长网络的生存期,现有的节能算法有很多。基本上,有两种方法。其一是能源效率管理,例如使用虚拟主干网的职责循环。另一个是能源供应,比如从环境中获取能源。在本文中,我们引入了一个新的问题CDSEH,将这两种方法结合在一起。我们还提出了一个新的标准来定义无线传感器网络的网络生存期。我们证明了CDSEH问题是np完全的,并提出了两种近似算法。大量的仿真结果验证了算法的性能。
{"title":"Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks","authors":"Tuo Shi, Siyao Cheng, Zhipeng Cai, Jianzhong Li","doi":"10.1109/INFOCOM.2016.7524504","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524504","url":null,"abstract":"A Wireless Sensor Network consists of a number of sensors. The energy of each sensor is limited which limits network lifetime. There are many existing energy efficiency algorithms to prolong network lifetime. Basically, there are two kinds of methods. One is energy-efficiency management, such as duty-cycling using virtual-backbones. The other one is energy provision, such as energy harvest from the environment. In this paper, we introduce a new problem, CDSEH, to combine these two methods together. We also propose a new standard to define the network lifetime of a WSN. We prove that the CDSEH problem is NP-Complete and propose two approximate algorithms accordingly. Extensive simulation results are shown to validate the performance of our algorithms.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115285600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Using crowdsourced data in location-based social networks to explore influence maximization 在基于位置的社交网络中使用众包数据来探索影响力最大化
Ji Li, Zhipeng Cai, Mingyuan Yan, Yingshu Li
Online social networks have gained significant popularity recently. The problem of influence maximization in online social networks has been extensively studied. However, in prior works, influence propagation in the physical world, which is also an indispensable factor, is not considered. The Location-Based Social Networks (LBSNs) are a special kind of online social networks in which people can share location-embedded information. In this paper, we make use of mobile crowdsourced data obtained from location-based social network services to study influence maximization in LBSNs. A novel network model and an influence propagation model taking influence propagation in both online social networks and the physical world into consideration are proposed. An event activation position selection problem is formalized and a corresponding solution is provided. The experimental results indicate that the proposed influence propagation model is meaningful and the activation position selection algorithm has high performance.
在线社交网络最近变得非常流行。在线社交网络中的影响力最大化问题已经得到了广泛的研究。然而,在之前的作品中,并没有考虑到物理世界中的影响力传播,这也是一个不可缺少的因素。基于位置的社交网络(LBSNs)是一种特殊的在线社交网络,人们可以在其中分享嵌入位置的信息。在本文中,我们利用从基于位置的社交网络服务中获得的移动众包数据来研究LBSNs中的影响力最大化。提出了一种同时考虑在线社交网络和现实世界影响传播的网络模型和影响传播模型。形式化了一个事件激活位置选择问题,并给出了相应的解决方案。实验结果表明,所提出的影响传播模型是有意义的,激活位置选择算法具有较高的性能。
{"title":"Using crowdsourced data in location-based social networks to explore influence maximization","authors":"Ji Li, Zhipeng Cai, Mingyuan Yan, Yingshu Li","doi":"10.1109/INFOCOM.2016.7524471","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524471","url":null,"abstract":"Online social networks have gained significant popularity recently. The problem of influence maximization in online social networks has been extensively studied. However, in prior works, influence propagation in the physical world, which is also an indispensable factor, is not considered. The Location-Based Social Networks (LBSNs) are a special kind of online social networks in which people can share location-embedded information. In this paper, we make use of mobile crowdsourced data obtained from location-based social network services to study influence maximization in LBSNs. A novel network model and an influence propagation model taking influence propagation in both online social networks and the physical world into consideration are proposed. An event activation position selection problem is formalized and a corresponding solution is provided. The experimental results indicate that the proposed influence propagation model is meaningful and the activation position selection algorithm has high performance.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127535301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 162
Price-based friendly jamming in a MISO interference wiretap channel MISO干扰窃听信道中基于价格的友好干扰
Peyman Siyari, M. Krunz, Diep N. Nguyen
In this paper, we expand the scope of PHY-layer security by investigating TX-based friendly jamming (FJ) for the wiretap channel in multi-link settings. For the single-link scenario, creating a TX-based FJ is an effective and practical method in improving the secrecy rate. In a multi-link setting, several information signals must be transmitted simultaneously. Thus, the design must guarantee that the FJ signal of a given transmitter does not interfere with unintended but legitimate receivers. Under the assumption of exact knowledge of the eavesdropping channel, we first propose a distributed price-based approach to improve the secrecy sum-rate of a two-link network with one eavesdropper while satisfying an information-rate constraint for both link. Simulations show that price-based FJ control outperforms greedy FJ, and is close to the performance of a centralized approach. Next, we propose a method based on mixed strategic games that can offer robust solutions to the distributed secrecy sum-rate maximization problem under the assumption of an unknown eavesdropping channel. Lastly, we use simulations to show that in addition to outperforming the greedy approach, our robust optimization also satisfies practical network considerations. In particular, the transmission time for the robust optimization can be determined flexibly to match the channel's coherence time.
在本文中,我们通过研究多链路设置下窃听信道中基于tx的友好干扰(FJ),扩展了物理层安全性的范围。对于单链路场景,创建基于txj的FJ是提高保密率的一种有效且实用的方法。在多链路设置中,必须同时传输多个信息信号。因此,设计必须保证给定发射器的FJ信号不会干扰非预期但合法的接收器。在准确了解窃听通道的假设下,我们首先提出了一种基于分布式价格的方法,以提高一个窃听者的双链路网络的保密和率,同时满足两个链路的信息率约束。仿真结果表明,基于价格的FJ控制优于贪婪的FJ控制,并且接近于集中式方法的性能。接下来,我们提出了一种基于混合策略对策的方法,该方法可以在未知窃听信道假设下提供分布式保密和速率最大化问题的鲁棒解。最后,我们用仿真表明,除了优于贪婪方法,我们的鲁棒优化也满足实际的网络考虑。特别是,鲁棒优化的传输时间可以灵活地确定,以匹配信道的相干时间。
{"title":"Price-based friendly jamming in a MISO interference wiretap channel","authors":"Peyman Siyari, M. Krunz, Diep N. Nguyen","doi":"10.1109/INFOCOM.2016.7524447","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524447","url":null,"abstract":"In this paper, we expand the scope of PHY-layer security by investigating TX-based friendly jamming (FJ) for the wiretap channel in multi-link settings. For the single-link scenario, creating a TX-based FJ is an effective and practical method in improving the secrecy rate. In a multi-link setting, several information signals must be transmitted simultaneously. Thus, the design must guarantee that the FJ signal of a given transmitter does not interfere with unintended but legitimate receivers. Under the assumption of exact knowledge of the eavesdropping channel, we first propose a distributed price-based approach to improve the secrecy sum-rate of a two-link network with one eavesdropper while satisfying an information-rate constraint for both link. Simulations show that price-based FJ control outperforms greedy FJ, and is close to the performance of a centralized approach. Next, we propose a method based on mixed strategic games that can offer robust solutions to the distributed secrecy sum-rate maximization problem under the assumption of an unknown eavesdropping channel. Lastly, we use simulations to show that in addition to outperforming the greedy approach, our robust optimization also satisfies practical network considerations. In particular, the transmission time for the robust optimization can be determined flexibly to match the channel's coherence time.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Demographics inference through Wi-Fi network traffic analysis 通过Wi-Fi网络流量分析进行人口统计推断
Huaxin Li, Zheyu Xu, Haojin Zhu, Di Ma, Shuai Li, Kai Xing
Although privacy leaking through content analysis of Wi-Fi traffic has received an increased attention, privacy inference through meta-data (e.g. IP, Host) analysis of Wi-Fi traffic represents a potentially more serious threat to user privacy. Firstly, it represents a more efficient and scalable approach to infer users' sensitive information without checking the content of Wi-Fi traffic. Secondly, meta-data based demographics inference can work on both unencrypted and encrypted traffic (e.g., HTTPS traffic). In this study, we present a novel approach to infer user demographic information by exploiting the meta-data of Wi-Fi traffic. We develop a proof-of-concept prototype, Demographic Information Predictor (DIP) system, and evaluate its performance on a real-world dataset, which includes the Wi-Fi access of 28,158 users in 5 months. DIP extracts four kinds of features from real-world Wi-Fi traffic and proposes a novel machine learning based inference technique to predict user demographics. Our analytical results show that, for unencrypted traffic, DIP can predict gender and education level of users with an accuracy of 78% and 74% respectively. It is surprising to show that, even for HTTPS traffic, user demographics can still be predicted at a precision of 67% and 72% respectively, which well demonstrates the practicality of the proposed privacy inference scheme.
虽然通过Wi-Fi流量的内容分析泄露隐私受到越来越多的关注,但通过Wi-Fi流量的元数据(如IP、主机)分析进行隐私推断对用户隐私构成了更严重的潜在威胁。首先,它代表了一种更有效和可扩展的方法,可以在不检查Wi-Fi流量内容的情况下推断用户的敏感信息。其次,基于元数据的人口统计推断可以在未加密和加密的流量(例如,HTTPS流量)上工作。在本研究中,我们提出了一种利用Wi-Fi流量元数据推断用户人口统计信息的新方法。我们开发了一个概念验证原型,人口统计信息预测(DIP)系统,并在真实数据集上评估其性能,其中包括28,158个用户在5个月内的Wi-Fi接入。DIP从现实世界的Wi-Fi流量中提取四种特征,并提出了一种新的基于机器学习的推断技术来预测用户人口统计数据。我们的分析结果表明,对于未加密的流量,DIP可以预测用户的性别和教育水平,准确率分别为78%和74%。令人惊讶的是,即使对于HTTPS流量,用户人口统计数据仍然可以分别以67%和72%的精度预测,这很好地证明了所提出的隐私推断方案的实用性。
{"title":"Demographics inference through Wi-Fi network traffic analysis","authors":"Huaxin Li, Zheyu Xu, Haojin Zhu, Di Ma, Shuai Li, Kai Xing","doi":"10.1109/INFOCOM.2016.7524528","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524528","url":null,"abstract":"Although privacy leaking through content analysis of Wi-Fi traffic has received an increased attention, privacy inference through meta-data (e.g. IP, Host) analysis of Wi-Fi traffic represents a potentially more serious threat to user privacy. Firstly, it represents a more efficient and scalable approach to infer users' sensitive information without checking the content of Wi-Fi traffic. Secondly, meta-data based demographics inference can work on both unencrypted and encrypted traffic (e.g., HTTPS traffic). In this study, we present a novel approach to infer user demographic information by exploiting the meta-data of Wi-Fi traffic. We develop a proof-of-concept prototype, Demographic Information Predictor (DIP) system, and evaluate its performance on a real-world dataset, which includes the Wi-Fi access of 28,158 users in 5 months. DIP extracts four kinds of features from real-world Wi-Fi traffic and proposes a novel machine learning based inference technique to predict user demographics. Our analytical results show that, for unencrypted traffic, DIP can predict gender and education level of users with an accuracy of 78% and 74% respectively. It is surprising to show that, even for HTTPS traffic, user demographics can still be predicted at a precision of 67% and 72% respectively, which well demonstrates the practicality of the proposed privacy inference scheme.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125938481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Power adjustment and scheduling in OFDMA femtocell networks OFDMA飞蜂窝网络中的功率调整与调度
Michael Lin, N. Bartolini, T. L. Porta
Densely-deployed femtocell networks are used to enhance wireless coverage in public spaces like office buildings, subways, and academic buildings. These networks can increase throughput for users, but edge users can suffer from co-channel interference, leading to service outages. This paper introduces a distributed algorithm for network configuration, called Radius Reduction and Scheduling (RRS), to improve the performance and fairness of the network. RRS determines cell sizes using a Voronoi-Laguerre framework, then schedules users using a scheduling algorithm that includes vacancy requests to increase fairness in dense femtocell networks. We prove that our algorithm always terminate in a finite time, producing a configuration that guarantees user or area coverage. Simulation results show a decrease in outage probability of up to 50%, as well as an increase in Jain's fairness index of almost 200%.
密集部署的移动蜂窝网络用于增强办公大楼、地铁和学术大楼等公共场所的无线覆盖。这些网络可以增加用户的吞吐量,但边缘用户可能会受到同信道干扰,从而导致服务中断。为了提高网络的性能和公平性,本文提出了一种分布式的网络配置算法——半径缩减和调度(RRS)。RRS使用Voronoi-Laguerre框架确定小区大小,然后使用包含空缺请求的调度算法来调度用户,以增加密集的飞蜂窝网络的公平性。我们证明了我们的算法总是在有限时间内终止,产生保证用户或区域覆盖的配置。仿真结果表明,中断概率降低了50%,Jain公平性指数提高了近200%。
{"title":"Power adjustment and scheduling in OFDMA femtocell networks","authors":"Michael Lin, N. Bartolini, T. L. Porta","doi":"10.1109/INFOCOM.2016.7524487","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524487","url":null,"abstract":"Densely-deployed femtocell networks are used to enhance wireless coverage in public spaces like office buildings, subways, and academic buildings. These networks can increase throughput for users, but edge users can suffer from co-channel interference, leading to service outages. This paper introduces a distributed algorithm for network configuration, called Radius Reduction and Scheduling (RRS), to improve the performance and fairness of the network. RRS determines cell sizes using a Voronoi-Laguerre framework, then schedules users using a scheduling algorithm that includes vacancy requests to increase fairness in dense femtocell networks. We prove that our algorithm always terminate in a finite time, producing a configuration that guarantees user or area coverage. Simulation results show a decrease in outage probability of up to 50%, as well as an increase in Jain's fairness index of almost 200%.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Understanding security group usage in a public IaaS cloud 了解公共IaaS云中的安全组使用情况
Cheng Jin, Abhinav Srivastava, Zhi-Li Zhang
To ensure security, cloud service providers employ security groups as a key tool for cloud tenants to protect their virtual machines (VMs) from attacks. However, security groups can be complex and often hard to configure, which may result in security vulnerabilities that impact the entire cloud platform. The goal of this paper is to investigate and understand how cloud tenants configure security groups and to assist them in designing better security groups. We first conduct a measurement-based analysis of security group configuration and usage by tenants in an IaaS cloud. We then propose and develop a tool called Socrates, which enables tenants to visualize and hence understand the static and dynamic access relations among VMs. Socrates also helps diagnose potential misconfigurations and provides suggestions to refine security group configurations based on observed traffic traversing tenants' VMs. Applying Socrates to all tenants hosted on the IaaS cloud, we analyze the common usage (“good” as well as “bad” practices) of cloud security groups and report the key lessons learned in our study. To the best of our knowledge, our work is the first to analyze cloud security group usage based on real-world datasets, and to develop a system to help cloud tenants understand, diagnose and better refine their security group configurations.
为了确保安全,云服务提供商将安全组作为云租户保护虚拟机免受攻击的关键工具。但是,安全组可能很复杂,通常难以配置,这可能导致影响整个云平台的安全漏洞。本文的目标是调查和理解云租户如何配置安全组,并帮助他们设计更好的安全组。我们首先对IaaS云中租户的安全组配置和使用情况进行基于度量的分析。然后,我们提出并开发了一个名为苏格拉底的工具,它使租户能够可视化并因此理解虚拟机之间的静态和动态访问关系。苏格拉底还可以帮助诊断潜在的错误配置,并根据观察到的流经租户虚拟机的流量提供改进安全组配置的建议。将苏格拉底应用于托管在IaaS云上的所有租户,我们分析了云安全组的常见用法(“好”和“坏”实践),并报告了在我们的研究中吸取的关键经验教训。据我们所知,我们的工作是第一个基于真实数据集分析云安全组使用情况的工作,并开发一个系统来帮助云租户理解、诊断和更好地优化其安全组配置。
{"title":"Understanding security group usage in a public IaaS cloud","authors":"Cheng Jin, Abhinav Srivastava, Zhi-Li Zhang","doi":"10.1109/INFOCOM.2016.7524508","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524508","url":null,"abstract":"To ensure security, cloud service providers employ security groups as a key tool for cloud tenants to protect their virtual machines (VMs) from attacks. However, security groups can be complex and often hard to configure, which may result in security vulnerabilities that impact the entire cloud platform. The goal of this paper is to investigate and understand how cloud tenants configure security groups and to assist them in designing better security groups. We first conduct a measurement-based analysis of security group configuration and usage by tenants in an IaaS cloud. We then propose and develop a tool called Socrates, which enables tenants to visualize and hence understand the static and dynamic access relations among VMs. Socrates also helps diagnose potential misconfigurations and provides suggestions to refine security group configurations based on observed traffic traversing tenants' VMs. Applying Socrates to all tenants hosted on the IaaS cloud, we analyze the common usage (“good” as well as “bad” practices) of cloud security groups and report the key lessons learned in our study. To the best of our knowledge, our work is the first to analyze cloud security group usage based on real-world datasets, and to develop a system to help cloud tenants understand, diagnose and better refine their security group configurations.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On demand elastic capacity planning for service auto-scaling 按需弹性容量规划,实现业务自动扩展
P. Chuprikov, S. Nikolenko, Kirill Kogan
Cloud computing allows on demand elastic service scaling. The capability of a service to predict resource requirements for the next operational period defines how well it will exploit the elasticity of cloud computing in order to reduce operational costs. In this work, we consider a capacity planning process for service scale-out as an online pricing model. In particular, we study the impact of buffering service requests on revenues in various settings with allocation and maintenance costs. In addition, we analyze the incurred latency implied by buffering service requests. We believe that our insights will allow to significantly simplify predictions and mitigate the unknowns of future demands on resources.
云计算允许按需弹性服务扩展。服务预测下一个运营周期的资源需求的能力决定了它将在多大程度上利用云计算的弹性来降低运营成本。在这项工作中,我们将服务扩展的容量规划过程视为在线定价模型。特别地,我们研究了在分配和维护成本不同的情况下,缓冲服务请求对收入的影响。此外,我们还分析了缓冲服务请求所隐含的延迟。我们相信,我们的见解将大大简化预测,减轻未来资源需求的未知因素。
{"title":"On demand elastic capacity planning for service auto-scaling","authors":"P. Chuprikov, S. Nikolenko, Kirill Kogan","doi":"10.1109/INFOCOM.2016.7524616","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524616","url":null,"abstract":"Cloud computing allows on demand elastic service scaling. The capability of a service to predict resource requirements for the next operational period defines how well it will exploit the elasticity of cloud computing in order to reduce operational costs. In this work, we consider a capacity planning process for service scale-out as an online pricing model. In particular, we study the impact of buffering service requests on revenues in various settings with allocation and maintenance costs. In addition, we analyze the incurred latency implied by buffering service requests. We believe that our insights will allow to significantly simplify predictions and mitigate the unknowns of future demands on resources.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1