首页 > 最新文献

2010 Ninth IEEE International Symposium on Network Computing and Applications最新文献

英文 中文
Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks 使用虚拟证书颁发机构的身份验证:无线传感器网络的一种新的安全范式
Edmond Holohan, M. Schukat
Wireless sensor networks (WSN) are inherently difficult to secure: Limited memory resources rule out the predistribution of keys or certificates, while manual device (and key) configuration in the field is not feasible due to the dynamic and ad-hoc nature of WSNs. All this is complicated by the fact that WSN nodes are not tamper resistant and operate over an unsecure wireless medium. Public key infrastructures (PKI) can help to address this problem by providing initial trust between network nodes. While it has been already shown, that public key encryption methods (like Elliptic Curve Cryptography - ECC) can be implemented on sensor nodes with very limited resources, a fully-fleshed PKI infrastructure that enables many different devices from potentially many different manufactures to participate in many different separate distributed networks in a secure manner has not been introduced yet. This paper presents AVCA, “Authentication using Virtual Certificate Authorities”, which is such a PKI architecture. It is based on commonly used and well established PKI concepts and designed specifically for resource constrained devices on distributed ad-hoc networks. It provides a mechanism to overcome the difficulties in securing many distributed networks with non tamper-proof devices. AVCA has many benefits including that the basis for initial trust is not stored on any of the sensor devices and that these devices do not require significant memory. The architecture itself can be quite easily integrated into existing protocol stacks including those defined by IEEE 802.15.4 [1] and ZigBee [2]. AVCA also enhances many of the original design goals of these wireless sensor network protocols such as simplicity, interoperability and scalability. The authors believe that AVCA offers a practical solution to many of the security issues that exist with sensor networks to date.
无线传感器网络(WSN)本身就难以保护:有限的内存资源排除了密钥或证书的预分发,而由于WSN的动态性和自组织性,在现场手动配置设备(和密钥)是不可实现的。由于WSN节点不能防篡改,并且在不安全的无线介质上运行,这一切都变得更加复杂。公钥基础设施(PKI)可以通过在网络节点之间提供初始信任来帮助解决这个问题。虽然已经证明,公钥加密方法(如椭圆曲线加密—ECC)可以在资源非常有限的传感器节点上实现,但尚未引入完整的PKI基础设施,该基础设施使来自潜在的许多不同制造商的许多不同设备能够以安全的方式参与许多不同的独立分布式网络。AVCA (Authentication using Virtual Certificate Authorities)是一种PKI体系结构。它基于常用和完善的PKI概念,专门为分布式ad-hoc网络上资源受限的设备设计。它提供了一种机制来克服使用非防篡改设备保护许多分布式网络的困难。AVCA有很多好处,包括初始信任的基础不存储在任何传感器设备上,这些设备不需要大量内存。该架构本身可以很容易地集成到现有的协议栈中,包括IEEE 802.15.4[1]和ZigBee[2]定义的协议栈。AVCA还增强了这些无线传感器网络协议的许多原始设计目标,如简单性、互操作性和可扩展性。作者认为,AVCA为迄今为止存在的许多传感器网络安全问题提供了一个实用的解决方案。
{"title":"Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks","authors":"Edmond Holohan, M. Schukat","doi":"10.1109/NCA.2010.19","DOIUrl":"https://doi.org/10.1109/NCA.2010.19","url":null,"abstract":"Wireless sensor networks (WSN) are inherently difficult to secure: Limited memory resources rule out the predistribution of keys or certificates, while manual device (and key) configuration in the field is not feasible due to the dynamic and ad-hoc nature of WSNs. All this is complicated by the fact that WSN nodes are not tamper resistant and operate over an unsecure wireless medium. Public key infrastructures (PKI) can help to address this problem by providing initial trust between network nodes. While it has been already shown, that public key encryption methods (like Elliptic Curve Cryptography - ECC) can be implemented on sensor nodes with very limited resources, a fully-fleshed PKI infrastructure that enables many different devices from potentially many different manufactures to participate in many different separate distributed networks in a secure manner has not been introduced yet. This paper presents AVCA, “Authentication using Virtual Certificate Authorities”, which is such a PKI architecture. It is based on commonly used and well established PKI concepts and designed specifically for resource constrained devices on distributed ad-hoc networks. It provides a mechanism to overcome the difficulties in securing many distributed networks with non tamper-proof devices. AVCA has many benefits including that the basis for initial trust is not stored on any of the sensor devices and that these devices do not require significant memory. The architecture itself can be quite easily integrated into existing protocol stacks including those defined by IEEE 802.15.4 [1] and ZigBee [2]. AVCA also enhances many of the original design goals of these wireless sensor network protocols such as simplicity, interoperability and scalability. The authors believe that AVCA offers a practical solution to many of the security issues that exist with sensor networks to date.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Understanding the Vulnerabilities of a SOA Platform - A Case Study 理解SOA平台的漏洞——一个案例研究
A. Gronosky, M. Atighetchi, P. Pal
Service-oriented architecture (SOA) is a powerful distributed computing paradigm that provides high-level abstractions for developing, deploying, and executing distributed systems while hiding many platform-level details. SOA platforms host functionality as deployed services, support decoupled interaction between service providers and service consumers, and manage low-level plumbing and dispatching among various deployed components. As with any distributed computing platform, SOA presents challenges for security and survivability beyond those that exist in more static and local platforms. As SOA platforms become popular and more widely used in a variety of distributed systems, it is important to explore their security challenges and vulnerabilities, and to understand how well those are addressed by the current security features of SOA platforms. This paper reports on a case study that evaluated the vulnerability profile of a SOA platform based on the popular open source JBoss Application Server.
面向服务的体系结构(SOA)是一种强大的分布式计算范例,它为开发、部署和执行分布式系统提供了高级抽象,同时隐藏了许多平台级细节。SOA平台将功能作为已部署的服务托管,支持服务提供者和服务使用者之间的解耦交互,并管理各种已部署组件之间的底层管道和调度。与任何分布式计算平台一样,SOA对安全性和可生存性提出了比静态和本地平台更大的挑战。随着SOA平台越来越流行,并在各种分布式系统中得到更广泛的应用,研究它们的安全挑战和漏洞,并了解SOA平台当前的安全特性如何很好地解决了这些问题,这一点非常重要。本文报告了一个案例研究,该案例研究评估了基于流行的开源JBoss Application Server的SOA平台的漏洞概况。
{"title":"Understanding the Vulnerabilities of a SOA Platform - A Case Study","authors":"A. Gronosky, M. Atighetchi, P. Pal","doi":"10.1109/NCA.2010.32","DOIUrl":"https://doi.org/10.1109/NCA.2010.32","url":null,"abstract":"Service-oriented architecture (SOA) is a powerful distributed computing paradigm that provides high-level abstractions for developing, deploying, and executing distributed systems while hiding many platform-level details. SOA platforms host functionality as deployed services, support decoupled interaction between service providers and service consumers, and manage low-level plumbing and dispatching among various deployed components. As with any distributed computing platform, SOA presents challenges for security and survivability beyond those that exist in more static and local platforms. As SOA platforms become popular and more widely used in a variety of distributed systems, it is important to explore their security challenges and vulnerabilities, and to understand how well those are addressed by the current security features of SOA platforms. This paper reports on a case study that evaluated the vulnerability profile of a SOA platform based on the popular open source JBoss Application Server.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122366422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
QoS-enabled Video Streaming in Wireless Sensor Networks 无线传感器网络中支持qos的视频流
Song Guo, T. Little
Recent advances in wireless communications technology and low-power, low-cost CMOS imaging sensors enable a new sensing modality employing ubiquitous distributed video sensing. In many video sensing applications multimedia streams are often required by the base station to provide detailed information of the target spot in the sensor field. However, limited bandwidth, unstable network environment, and data transmission interference prevent the large-scale deployment of such applications without new strategies for energy and data capacity management. In this paper we propose a dynamic path formation algorithm based on our data path throughput estimation model. Coupled with a distributed TDMA packet scheduling scheme, this path formation algorithm can establish throughput-aware video delivery path between source and destination. OPNET simulation results indicate that the throughput estimation is accurate and our proposed TDMA scheme is preferred for streaming applications. We also explore the use of distributed mobile base stations as an option to improve the egress of video data streams from the system.
无线通信技术和低功耗、低成本CMOS成像传感器的最新进展使无处不在的分布式视频传感成为一种新的传感方式。在许多视频传感应用中,基站经常需要多媒体流来提供传感器场中目标点的详细信息。然而,如果没有新的能源和数据容量管理策略,有限的带宽、不稳定的网络环境和数据传输的干扰会阻碍此类应用的大规模部署。本文提出了一种基于数据路径吞吐量估计模型的动态路径形成算法。该路径形成算法与分布式TDMA分组调度方案相结合,可以在源端和目的端之间建立具有吞吐量感知的视频传输路径。OPNET仿真结果表明,吞吐量估计是准确的,我们提出的TDMA方案是流媒体应用的首选方案。我们还探讨了使用分布式移动基站作为一种选择,以改善从系统输出的视频数据流。
{"title":"QoS-enabled Video Streaming in Wireless Sensor Networks","authors":"Song Guo, T. Little","doi":"10.1109/NCA.2010.38","DOIUrl":"https://doi.org/10.1109/NCA.2010.38","url":null,"abstract":"Recent advances in wireless communications technology and low-power, low-cost CMOS imaging sensors enable a new sensing modality employing ubiquitous distributed video sensing. In many video sensing applications multimedia streams are often required by the base station to provide detailed information of the target spot in the sensor field. However, limited bandwidth, unstable network environment, and data transmission interference prevent the large-scale deployment of such applications without new strategies for energy and data capacity management. In this paper we propose a dynamic path formation algorithm based on our data path throughput estimation model. Coupled with a distributed TDMA packet scheduling scheme, this path formation algorithm can establish throughput-aware video delivery path between source and destination. OPNET simulation results indicate that the throughput estimation is accurate and our proposed TDMA scheme is preferred for streaming applications. We also explore the use of distributed mobile base stations as an option to improve the egress of video data streams from the system.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modeling Fast Link Failure Detection for Dependable Wireless Mesh Networks 可靠无线网状网络的快速链路故障检测建模
Timo Lindhorst, G. Lukas, E. Nett
Wireless Mesh Networks (WMN) provide a flexible and inexpensive way to expand network applications to mobile entities. However, high communication reliability demands can not be met by regular WMNs due to mobility and inherent properties of wireless communication. Failing links are common events which impose a major challenge for providing a dependable communication service. By the use of suitable cross-layer models, we provide a timely detection of failed links without compromising the network stability. It is shown that the packet loss caused by a link failure can be reduced from a time-dependent value to at most four consecutive packets. For a typical control application this means an improvement by a factor of 100. In addition to an empirical evaluation we demonstrate the applicability of the mechanism by utilizing it in a real-world WMN to allow the tele-operation of a mobile robot.
无线网状网络(WMN)为将网络应用扩展到移动实体提供了一种灵活而廉价的方式。然而,由于无线通信的移动性和固有的特性,常规wmn无法满足高通信可靠性的要求。故障链接是常见的事件,它对提供可靠的通信服务构成了重大挑战。通过使用合适的跨层模型,我们可以在不影响网络稳定性的情况下及时检测故障链路。结果表明,由链路故障引起的丢包可以从一个与时间相关的值减少到最多四个连续的包。对于典型的控制应用程序,这意味着提高了100倍。除了经验评估外,我们还通过在现实世界的WMN中利用该机制来实现移动机器人的远程操作来证明该机制的适用性。
{"title":"Modeling Fast Link Failure Detection for Dependable Wireless Mesh Networks","authors":"Timo Lindhorst, G. Lukas, E. Nett","doi":"10.1109/NCA.2010.13","DOIUrl":"https://doi.org/10.1109/NCA.2010.13","url":null,"abstract":"Wireless Mesh Networks (WMN) provide a flexible and inexpensive way to expand network applications to mobile entities. However, high communication reliability demands can not be met by regular WMNs due to mobility and inherent properties of wireless communication. Failing links are common events which impose a major challenge for providing a dependable communication service. By the use of suitable cross-layer models, we provide a timely detection of failed links without compromising the network stability. It is shown that the packet loss caused by a link failure can be reduced from a time-dependent value to at most four consecutive packets. For a typical control application this means an improvement by a factor of 100. In addition to an empirical evaluation we demonstrate the applicability of the mechanism by utilizing it in a real-world WMN to allow the tele-operation of a mobile robot.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Evaluation of a Hardware-Software Codesign Technique of Network Protocol Stacks 一种网络协议栈软硬件协同设计技术的评价
Taehoon Kim, S. Tak
Many studies in SoC (System-on-Chip) areas ignore the scheduling of messages exchanged between hardware-software components as a fine level of inter-component communication granularity. Such a message scheduling scheme in hardware-software codesign of SoC systems has received comparatively less attention in the literature despite their importance as an element of a complete partitioning solution. In this paper, we attempt to resolve a message scheduling problem to meet the semantics of inter-component communications. Additionally, we evaluate the performance of hardware-software codesign for network protocol stacks.
在SoC(片上系统)领域的许多研究都忽略了硬件软件组件之间交换的消息调度作为组件间通信粒度的精细级别。这种消息调度方案在SoC系统的软硬件协同设计中受到的关注相对较少,尽管它们作为完整分区解决方案的一个元素很重要。在本文中,我们试图解决一个消息调度问题,以满足组件间通信的语义。此外,我们还评估了网络协议栈的软硬件协同设计的性能。
{"title":"Evaluation of a Hardware-Software Codesign Technique of Network Protocol Stacks","authors":"Taehoon Kim, S. Tak","doi":"10.1109/NCA.2010.49","DOIUrl":"https://doi.org/10.1109/NCA.2010.49","url":null,"abstract":"Many studies in SoC (System-on-Chip) areas ignore the scheduling of messages exchanged between hardware-software components as a fine level of inter-component communication granularity. Such a message scheduling scheme in hardware-software codesign of SoC systems has received comparatively less attention in the literature despite their importance as an element of a complete partitioning solution. In this paper, we attempt to resolve a message scheduling problem to meet the semantics of inter-component communications. Additionally, we evaluate the performance of hardware-software codesign for network protocol stacks.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132055832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level Multi-server Task Assignment with Work-Conserving Migration 多级多服务器任务分配与工作保护迁移
Malith Jayasinghe, Z. Tari, P. Zeephongsekul
Size-based task assignment policies have shown significant performance improvements over traditional task assignment policies under highly variable workload conditions. However, these policies are not suitable to assign tasks in time sharing systems. Moreover, these policies are not scalable and they also generate significant amount of wasted processing. This paper proposes a Multi-Level-Multi-Server Task Assignment Policy with Work-Conserving Migration (MLMS-WC-M) that addresses these issues. MLMS-WC-M has three important features. First, it gives preferential treatment to tasks with short processing requirements. Second, it utilises a 2-level variance reduction mechanism. Third, it supports work-conserving migration. We evaluate the performance of MLMS-WC-M against the performance of several well known task assignment policies. The proposed policy outperforms existing policies significantly under a wide range of workload conditions.
在高度可变的工作负载条件下,基于大小的任务分配策略比传统的任务分配策略表现出显著的性能改进。然而,这些策略不适合在分时系统中分配任务。此外,这些策略不可伸缩,而且还会产生大量浪费的处理。针对这些问题,本文提出了一种多级多服务器任务分配策略(MLMS-WC-M)。MLMS-WC-M有三个重要特点。第一,优先处理加工要求短的任务。其次,它采用了2级方差缩减机制。第三,支持省力移民。我们根据几个众所周知的任务分配策略的性能来评估MLMS-WC-M的性能。在各种工作负载条件下,建议的策略明显优于现有策略。
{"title":"Multi-level Multi-server Task Assignment with Work-Conserving Migration","authors":"Malith Jayasinghe, Z. Tari, P. Zeephongsekul","doi":"10.1109/NCA.2010.31","DOIUrl":"https://doi.org/10.1109/NCA.2010.31","url":null,"abstract":"Size-based task assignment policies have shown significant performance improvements over traditional task assignment policies under highly variable workload conditions. However, these policies are not suitable to assign tasks in time sharing systems. Moreover, these policies are not scalable and they also generate significant amount of wasted processing. This paper proposes a Multi-Level-Multi-Server Task Assignment Policy with Work-Conserving Migration (MLMS-WC-M) that addresses these issues. MLMS-WC-M has three important features. First, it gives preferential treatment to tasks with short processing requirements. Second, it utilises a 2-level variance reduction mechanism. Third, it supports work-conserving migration. We evaluate the performance of MLMS-WC-M against the performance of several well known task assignment policies. The proposed policy outperforms existing policies significantly under a wide range of workload conditions.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Geographic Unicast Routing Algorithm Using no Location Service 不使用位置服务的地理单播路由算法
D. Silvestre, T. Vazão
In this paper, we present a geographic routing algorithm which can adapt to different levels of mobility by changing its parameters according to the network in which it is running. Routing decisions are based on directions and geographical positions of the nodes and there is no need for an external location system. Discoveries are done using unicast messages resulting in few control messages being sent both to discover and to maintain routing information. After a series of tests, we show the algorithm low overhead, high adaptability and robustness as it only relies on the end-points (source and destination nodes) to guarantee a successful transmission.
在本文中,我们提出了一种地理路由算法,它可以根据所运行的网络改变其参数来适应不同的移动水平。路由决策基于节点的方向和地理位置,不需要外部定位系统。发现是使用单播消息完成的,因此发送很少的控制消息来发现和维护路由信息。经过一系列的测试,我们证明了算法开销低,适应性强,鲁棒性好,因为它只依赖于端点(源节点和目的节点)来保证成功传输。
{"title":"A Geographic Unicast Routing Algorithm Using no Location Service","authors":"D. Silvestre, T. Vazão","doi":"10.1109/nca.2010.52","DOIUrl":"https://doi.org/10.1109/nca.2010.52","url":null,"abstract":"In this paper, we present a geographic routing algorithm which can adapt to different levels of mobility by changing its parameters according to the network in which it is running. Routing decisions are based on directions and geographical positions of the nodes and there is no need for an external location system. Discoveries are done using unicast messages resulting in few control messages being sent both to discover and to maintain routing information. After a series of tests, we show the algorithm low overhead, high adaptability and robustness as it only relies on the end-points (source and destination nodes) to guarantee a successful transmission.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131072518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Decentralized Dynamic Sensor Activation Protocol for Chemical Sensor Networks 一种分散的化学传感器网络动态传感器激活协议
S. Karunasekera, C. Mendis, A. Skvortsov, A. Gunatilaka
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decentralized dynamic sensor activation protocol that aims to maintain a majority of sensors in the inactive (passive) state in the absence of a chemical attack, and rapidly activate the sensors when an attack is detected. This paper proposes two analytical models to study the behavior of the sensor network under the proposed protocol. Our first analytical model employs the known analogy between the information spread in a sensor network and the propagation of epidemics across a population. The second model describes the protocol by using a framework of graph theory
由于化学传感器用于传感需要消耗大量的能量,因此减少传感活动对于提高化学传感器网络的寿命至关重要。在本文中,我们考虑了一个简单的分散动态传感器激活协议,该协议旨在在没有化学攻击的情况下保持大多数传感器处于非活动(被动)状态,并在检测到攻击时快速激活传感器。本文提出了两个分析模型来研究该协议下传感器网络的行为。我们的第一个分析模型采用了已知的传感器网络中的信息传播与流行病在人群中的传播之间的类比。第二个模型使用图论框架来描述协议
{"title":"A Decentralized Dynamic Sensor Activation Protocol for Chemical Sensor Networks","authors":"S. Karunasekera, C. Mendis, A. Skvortsov, A. Gunatilaka","doi":"10.1109/NCA.2010.39","DOIUrl":"https://doi.org/10.1109/NCA.2010.39","url":null,"abstract":"Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decentralized dynamic sensor activation protocol that aims to maintain a majority of sensors in the inactive (passive) state in the absence of a chemical attack, and rapidly activate the sensors when an attack is detected. This paper proposes two analytical models to study the behavior of the sensor network under the proposed protocol. Our first analytical model employs the known analogy between the information spread in a sensor network and the propagation of epidemics across a population. The second model describes the protocol by using a framework of graph theory","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of an Extensible Network Testbed 可扩展网络试验台的设计
Charlie Wiseman, Jyoti Parwatikar, Kenneth F. Wong, J. DeHart, J. Turner
Networking testbeds have become an increasingly important part of the networking research cycle. One of the primary reasons for this is that testbeds offer researchers access to network conditions and environments which are very difficult to reproduce in a local laboratory. This work presents the design of the Open Network Laboratory (ONL) testbed. The underlying infrastructure of ONL is general enough to support resource extensibility and heterogeneity at a fundamental level. New types of resources (e.g., multicore PCs, FPGAs, network processors, etc) can be added to the testbed without modifying any testbed infrastructure software. Resource types can also be extended to support multiple distinct sets of functionality (e.g., an FPGA might act as a router, a switch, or a traffic generator). Moreover, users can dynamically add new resource extensions without any modification to the existing infrastructure.
网络测试平台已经成为网络研究周期中越来越重要的一部分。其中一个主要原因是,试验台为研究人员提供了在当地实验室很难重现的网络条件和环境。本文介绍了开放式网络实验室(ONL)试验台的设计。ONL的底层基础结构是通用的,足以在基本级别上支持资源的可扩展性和异构性。新类型的资源(例如,多核pc, fpga,网络处理器等)可以添加到测试平台,而无需修改任何测试平台基础架构软件。资源类型也可以扩展以支持多种不同的功能集(例如,FPGA可以充当路由器、交换机或流量生成器)。此外,用户可以动态地添加新的资源扩展,而无需对现有基础结构进行任何修改。
{"title":"Design of an Extensible Network Testbed","authors":"Charlie Wiseman, Jyoti Parwatikar, Kenneth F. Wong, J. DeHart, J. Turner","doi":"10.1109/NCA.2010.22","DOIUrl":"https://doi.org/10.1109/NCA.2010.22","url":null,"abstract":"Networking testbeds have become an increasingly important part of the networking research cycle. One of the primary reasons for this is that testbeds offer researchers access to network conditions and environments which are very difficult to reproduce in a local laboratory. This work presents the design of the Open Network Laboratory (ONL) testbed. The underlying infrastructure of ONL is general enough to support resource extensibility and heterogeneity at a fundamental level. New types of resources (e.g., multicore PCs, FPGAs, network processors, etc) can be added to the testbed without modifying any testbed infrastructure software. Resource types can also be extended to support multiple distinct sets of functionality (e.g., an FPGA might act as a router, a switch, or a traffic generator). Moreover, users can dynamically add new resource extensions without any modification to the existing infrastructure.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121289027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Robustness of Network Fault Diagnosis to Uncertainty in Observations 提高网络故障诊断对观测值不确定性的鲁棒性
Jesper Grønbæk, H. Schwefel, A. Ceccarelli, A. Bondavalli
Performing decentralized network fault diagnosis based on network traffic is challenging. Besides inherent stochastic behaviour of observations, measurements may be subject to errors degrading diagnosis timeliness and accuracy. In this paper we present a novel approach in which we aim to mitigate issues of measurement errors by quantifying uncertainty. The uncertainty information is applied in the diagnostic component to improve its robustness. Three diagnosis components have been proposed based on the Hidden Markov Model formalism: (H0) representing a classical approach, (H1) a static compensation of (H0) to uncertainties and (H2) dynamically adapting diagnosis to uncertainty information. From uncertainty injection scenarios of added measurement noise we demonstrate how using uncertainty information can provide a structured approach of improving diagnosis.
基于网络流量进行分散的网络故障诊断具有一定的挑战性。除了观察的固有随机行为外,测量可能会出现降低诊断及时性和准确性的错误。在本文中,我们提出了一种新的方法,我们的目标是通过量化不确定性来减轻测量误差的问题。将不确定度信息应用到诊断组件中,提高了诊断组件的鲁棒性。基于隐马尔可夫模型的形式,提出了三个诊断组件:(H0)代表经典方法,(H1)对不确定性的静态补偿,(H2)对不确定性信息的动态适应诊断。从添加测量噪声的不确定度注入场景中,我们展示了如何使用不确定度信息可以提供改进诊断的结构化方法。
{"title":"Improving Robustness of Network Fault Diagnosis to Uncertainty in Observations","authors":"Jesper Grønbæk, H. Schwefel, A. Ceccarelli, A. Bondavalli","doi":"10.1109/NCA.2010.41","DOIUrl":"https://doi.org/10.1109/NCA.2010.41","url":null,"abstract":"Performing decentralized network fault diagnosis based on network traffic is challenging. Besides inherent stochastic behaviour of observations, measurements may be subject to errors degrading diagnosis timeliness and accuracy. In this paper we present a novel approach in which we aim to mitigate issues of measurement errors by quantifying uncertainty. The uncertainty information is applied in the diagnostic component to improve its robustness. Three diagnosis components have been proposed based on the Hidden Markov Model formalism: (H0) representing a classical approach, (H1) a static compensation of (H0) to uncertainties and (H2) dynamically adapting diagnosis to uncertainty information. From uncertainty injection scenarios of added measurement noise we demonstrate how using uncertainty information can provide a structured approach of improving diagnosis.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"51 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133288534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 Ninth IEEE International Symposium on Network Computing and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1