首页 > 最新文献

2015 7th International Conference on Communication Systems and Networks (COMSNETS)最新文献

英文 中文
M4M: A model for enabling social network based sharing in the Internet of Things M4M:在物联网中实现基于社交网络的共享的模型
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098685
P. Deshpande, Palanivel A. Kodeswaran, N. Banerjee, A. A. Nanavati, Deepika Chhabra, Shalini Kapoor
The true potential of the Internet of Things (IoT) will be realized only when devices are able to harness the collective capabilities of a wide range of peer-devices. In this paper, we propose a novel model where friends in a social network can share device capabilities with their peers in an access controlled manner. We develop a theoretical model of such a peer-to-peer network in which devices can search for remote capabilities, and elaborate on the trade-offs of different algorithms in terms of capability searching and execution. We study various types of social network models to understand the degree of sharing in such networks. Our results show that Barabási-Albert graphs that approximate most real world social networks have a high degree of sharing, validating the utility of our social network based model. We also propose an algorithm that takes any given network and augments it to increase the level of sharing by intelligently suggesting friendship recommendations among vertices. Finally, we describe the prototype implementation of an android mobile application that uses facebook APIs to allow smartphones share GPS and camera capabilities with other devices owned by friends.
只有当设备能够利用各种对等设备的集体能力时,物联网(IoT)的真正潜力才会实现。在本文中,我们提出了一种新的模型,其中社交网络中的朋友可以以访问控制的方式与同伴共享设备功能。我们开发了这样一个点对点网络的理论模型,其中设备可以搜索远程功能,并详细说明了不同算法在功能搜索和执行方面的权衡。我们研究了各种类型的社会网络模型,以了解这些网络中的共享程度。我们的结果表明,Barabási-Albert图近似于大多数现实世界的社交网络,具有高度的共享,验证了我们基于社交网络的模型的实用性。我们还提出了一种算法,该算法采用任意给定的网络,并通过在顶点之间智能地建议友谊推荐来增强其共享水平。最后,我们描述了android移动应用程序的原型实现,该应用程序使用facebook api允许智能手机与朋友拥有的其他设备共享GPS和相机功能。
{"title":"M4M: A model for enabling social network based sharing in the Internet of Things","authors":"P. Deshpande, Palanivel A. Kodeswaran, N. Banerjee, A. A. Nanavati, Deepika Chhabra, Shalini Kapoor","doi":"10.1109/COMSNETS.2015.7098685","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098685","url":null,"abstract":"The true potential of the Internet of Things (IoT) will be realized only when devices are able to harness the collective capabilities of a wide range of peer-devices. In this paper, we propose a novel model where friends in a social network can share device capabilities with their peers in an access controlled manner. We develop a theoretical model of such a peer-to-peer network in which devices can search for remote capabilities, and elaborate on the trade-offs of different algorithms in terms of capability searching and execution. We study various types of social network models to understand the degree of sharing in such networks. Our results show that Barabási-Albert graphs that approximate most real world social networks have a high degree of sharing, validating the utility of our social network based model. We also propose an algorithm that takes any given network and augments it to increase the level of sharing by intelligently suggesting friendship recommendations among vertices. Finally, we describe the prototype implementation of an android mobile application that uses facebook APIs to allow smartphones share GPS and camera capabilities with other devices owned by friends.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Integrating advanced mobility services into the future Internet Architecture 将先进的移动服务融入未来的互联网架构
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098683
Shreyasee Mukherjee, A. Baid, D. Raychaudhuri
This paper discusses the design challenges associated with supporting advanced mobility services in the future Internet. The recent transition of the Internet from the fixed host-server model to one in which mobile platforms are the norm motivates a next-generation protocol architecture which provides integrated and efficient support for advanced mobility services. Key wireless access and mobility usage scenarios are identified including host mobility, multihoming, vehicular access and context addressability, and key protocol support requirements are identified in each case. The MobilityFirst (MF) architecture being developed under the National Science Foundation's future Internet Architecture (FIA) program is proposed as a possible realization that meets the identified requirements. MF protocol specifics are given for each wireless/mobile use case, along with sample evaluation results demonstrating achievable performance benefits.
本文讨论了在未来互联网中支持高级移动服务所面临的设计挑战。最近互联网从固定主机-服务器模式向以移动平台为规范的模式转变,促使下一代协议架构为高级移动服务提供集成和有效的支持。确定了关键的无线接入和移动性使用场景,包括主机移动性、多宿主、车辆接入和上下文可寻址性,并确定了每种情况下的关键协议支持需求。MobilityFirst (MF)架构是在美国国家科学基金会的未来互联网架构(FIA)计划下开发的,被认为是满足已确定需求的可能实现。给出了每个无线/移动用例的MF协议细节,以及演示可实现的性能优势的示例评估结果。
{"title":"Integrating advanced mobility services into the future Internet Architecture","authors":"Shreyasee Mukherjee, A. Baid, D. Raychaudhuri","doi":"10.1109/COMSNETS.2015.7098683","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098683","url":null,"abstract":"This paper discusses the design challenges associated with supporting advanced mobility services in the future Internet. The recent transition of the Internet from the fixed host-server model to one in which mobile platforms are the norm motivates a next-generation protocol architecture which provides integrated and efficient support for advanced mobility services. Key wireless access and mobility usage scenarios are identified including host mobility, multihoming, vehicular access and context addressability, and key protocol support requirements are identified in each case. The MobilityFirst (MF) architecture being developed under the National Science Foundation's future Internet Architecture (FIA) program is proposed as a possible realization that meets the identified requirements. MF protocol specifics are given for each wireless/mobile use case, along with sample evaluation results demonstrating achievable performance benefits.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An EMR-enabled medical sensor data collection framework 支持电子病历的医疗传感器数据收集框架
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098703
Rakshit Wadhwa, Pushpendra Singh, Meenu Singh, Saurabh Kumar
Availability of healthcare data allows governments to analyze effectiveness of their policies, monitor spread of a disease, etc. Data collection for public healthcare is still a big challenge, especially in developing countries where most of the data collection is still done on paper. Therefore, recently many tools, e.g. ODK, Commcare, have become available that allow data collection on mobile devices. Similarly, during data collection, use of health sensors to measure some of the health parameters, e.g. ECG, Oxygen Saturation, is increasing, but then the data measured by sensors is often entered manually to the mobile device. Finally, the data collected on a mobile device is then entered into a database (either an EMR or a general database) manually, which is time consuming and introduces error due to manual input. While partial solutions that enable connectivity of sensors to mobile device or mobile device to a specific EMR are available, there is a lack of a comprehensive end-to-end solution. In this paper, we present our framework which works on mobile devices to allow collection of sensor data at one end and stores data into an EMR on the other end, thus provides a comprehensive solution for data collection. The requirements of the framework were derived after interviewing healthcare workers who conduct regular field studies. We have tested our framework with a publicly available standard health sensor and OpenMRS.
医疗保健数据的可用性使政府能够分析其政策的有效性,监测疾病的传播等。公共卫生保健的数据收集仍然是一个巨大的挑战,特别是在大多数数据收集仍然是在纸上完成的发展中国家。因此,最近有许多工具,例如ODK、Commcare,可以在移动设备上收集数据。同样,在数据收集过程中,越来越多地使用健康传感器来测量一些健康参数,例如心电图、血氧饱和度,但传感器测量的数据通常是手动输入到移动设备中。最后,在移动设备上收集的数据然后手动输入数据库(EMR或通用数据库),这是耗时的,并且由于手动输入而引入错误。虽然有部分解决方案可以将传感器连接到移动设备或移动设备连接到特定的EMR,但缺乏全面的端到端解决方案。在本文中,我们提出了我们的框架,它可以在移动设备上工作,允许一端收集传感器数据,并将数据存储到另一端的EMR中,从而为数据收集提供了一个全面的解决方案。该框架的要求是在采访了进行定期实地研究的医护人员后得出的。我们已经用一个公开可用的标准健康传感器和OpenMRS测试了我们的框架。
{"title":"An EMR-enabled medical sensor data collection framework","authors":"Rakshit Wadhwa, Pushpendra Singh, Meenu Singh, Saurabh Kumar","doi":"10.1109/COMSNETS.2015.7098703","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098703","url":null,"abstract":"Availability of healthcare data allows governments to analyze effectiveness of their policies, monitor spread of a disease, etc. Data collection for public healthcare is still a big challenge, especially in developing countries where most of the data collection is still done on paper. Therefore, recently many tools, e.g. ODK, Commcare, have become available that allow data collection on mobile devices. Similarly, during data collection, use of health sensors to measure some of the health parameters, e.g. ECG, Oxygen Saturation, is increasing, but then the data measured by sensors is often entered manually to the mobile device. Finally, the data collected on a mobile device is then entered into a database (either an EMR or a general database) manually, which is time consuming and introduces error due to manual input. While partial solutions that enable connectivity of sensors to mobile device or mobile device to a specific EMR are available, there is a lack of a comprehensive end-to-end solution. In this paper, we present our framework which works on mobile devices to allow collection of sensor data at one end and stores data into an EMR on the other end, thus provides a comprehensive solution for data collection. The requirements of the framework were derived after interviewing healthcare workers who conduct regular field studies. We have tested our framework with a publicly available standard health sensor and OpenMRS.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127024383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GSM-based positioning for public transportation commuters 基于gsm的公共交通通勤者定位
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098722
Ravi Bhandari, Megha Chaudhary, A. Bansal, B. Raman, N. Aggarwal, D. Bansal, K. Ramakrishnan
Crowd-sourcing of information about various aspects of a road is an important mechanism in Intelligent Transportation Systems (ITS). In this work, we consider crowd-sourcing from public transportation commuters, information about the road, traffic, and the specific public transportation unit. Any crowd-sourced information has to be tagged with the information provider's location. Since GPS-based location determination is energy-expensive, we focus on GSM signal based location determination. A specific dimension we explore, not considered in prior work, is the use of GSM signal information from multiple commuters' phones. This consideration is triggered by the observation that a large set of commuters have (almost) the same physical location for large durations of time: when they share the same bus. We present an analysis of data collected from two different Indian cities: Mumbai and Chandigarh. We find that such combination of information can lower the median location error by a factor of 2-10.
道路各方面信息的众包是智能交通系统(ITS)的重要机制。在这项工作中,我们考虑了来自公共交通通勤者的众包,关于道路、交通和特定公共交通单位的信息。任何众包信息都必须标记为信息提供者的位置。由于基于gps的定位耗能大,我们主要研究基于GSM信号的定位。我们探索的一个特定维度,在之前的工作中没有考虑到,是使用来自多个通勤者的手机的GSM信号信息。这种考虑是由于观察到大量的通勤者在很长一段时间内(几乎)处于相同的物理位置:当他们共用同一辆公共汽车时。我们分析了从两个不同的印度城市:孟买和昌迪加尔收集的数据。我们发现这样的信息组合可以将中位数定位误差降低2-10倍。
{"title":"GSM-based positioning for public transportation commuters","authors":"Ravi Bhandari, Megha Chaudhary, A. Bansal, B. Raman, N. Aggarwal, D. Bansal, K. Ramakrishnan","doi":"10.1109/COMSNETS.2015.7098722","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098722","url":null,"abstract":"Crowd-sourcing of information about various aspects of a road is an important mechanism in Intelligent Transportation Systems (ITS). In this work, we consider crowd-sourcing from public transportation commuters, information about the road, traffic, and the specific public transportation unit. Any crowd-sourced information has to be tagged with the information provider's location. Since GPS-based location determination is energy-expensive, we focus on GSM signal based location determination. A specific dimension we explore, not considered in prior work, is the use of GSM signal information from multiple commuters' phones. This consideration is triggered by the observation that a large set of commuters have (almost) the same physical location for large durations of time: when they share the same bus. We present an analysis of data collected from two different Indian cities: Mumbai and Chandigarh. We find that such combination of information can lower the median location error by a factor of 2-10.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"85 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust mutual authentication scheme for data security in cloud architecture 一种用于云架构下数据安全的鲁棒互认证方案
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098707
M. Sarvabhatla, C. Vorugunti
Emerging markets looks cloud computing as a facilitator to lower their investments related to ICT. Unlimited throughput, on demand and elastic nature of cloud attracted the medium and large scale organizations to adopt it and move their critical data, software resources to cloud. Outsourcing of critical data to third party results in lots of security issues like user authentication, integrity of data etc. and need to be addressed very effectively. In 2011, Hao et al of SUNY, have proposed a time-bound ticket-based mutual authentication scheme and claimed that their scheme is secure. In 2013, Jaidhar et al claimed that Hao et al scheme is vulnerable to DoS attack and proposed an improved scheme. In this paper, we will show that Jaidhar et al scheme is still vulnerable to all major cryptographic attacks like offline password guessing attack, user impersonation attack, server masquerade attack etc. As a part of our contribution, we propose an improved mutual authentication scheme, which is secure and resistant to all major cryptographic attacks.
新兴市场将云计算视为降低ICT相关投资的推动者。云的无限吞吐量、随需应变和弹性吸引了大中型组织采用它,并将其关键数据、软件资源转移到云上。将关键数据外包给第三方会导致许多安全问题,如用户身份验证、数据完整性等,需要非常有效地解决。2011年,SUNY的Hao等人提出了一种有时限的基于票据的相互认证方案,并声称他们的方案是安全的。2013年,Jaidhar等人声称Hao等人的方案容易受到DoS攻击,并提出了改进方案。在本文中,我们将证明Jaidhar等人方案仍然容易受到所有主要的加密攻击,如离线密码猜测攻击,用户冒充攻击,服务器伪装攻击等。作为我们贡献的一部分,我们提出了一种改进的相互认证方案,该方案既安全又能抵抗所有主要的加密攻击。
{"title":"A robust mutual authentication scheme for data security in cloud architecture","authors":"M. Sarvabhatla, C. Vorugunti","doi":"10.1109/COMSNETS.2015.7098707","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098707","url":null,"abstract":"Emerging markets looks cloud computing as a facilitator to lower their investments related to ICT. Unlimited throughput, on demand and elastic nature of cloud attracted the medium and large scale organizations to adopt it and move their critical data, software resources to cloud. Outsourcing of critical data to third party results in lots of security issues like user authentication, integrity of data etc. and need to be addressed very effectively. In 2011, Hao et al of SUNY, have proposed a time-bound ticket-based mutual authentication scheme and claimed that their scheme is secure. In 2013, Jaidhar et al claimed that Hao et al scheme is vulnerable to DoS attack and proposed an improved scheme. In this paper, we will show that Jaidhar et al scheme is still vulnerable to all major cryptographic attacks like offline password guessing attack, user impersonation attack, server masquerade attack etc. As a part of our contribution, we propose an improved mutual authentication scheme, which is secure and resistant to all major cryptographic attacks.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Systematic information flow control in mHealth systems 移动医疗系统中的系统化信息流控制
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098736
Chandrika Bhardwaj
This paper argues that the security and integrity requirements of mHealth systems are best addressed by end-to-end information flow control (IFC). The paper extends proposals of decentralized IFC to a distributed smartphone-based mHealth system, identifying the basic threat model and the necessary trusted computing base. We show how the framework proposed can be integrated into an existing communication stack between a phalanx of sensors and an Android smartphone. The central idea of the framework involves systematically and automatically labelling data and metadata collected during medical encounters with security and integrity tags. These mechanisms provided can then be used for enforcing a wide variety of complex information flow control policies in diverse applications. The chief novelty over existing DIFC approaches is that users are relieved of having to create tags for each class of data and metadata that is collected in the system, thus making it user-friendly and scalable.
本文认为移动医疗系统的安全性和完整性要求最好通过端到端信息流控制(IFC)来解决。本文将分散式IFC的建议扩展到基于智能手机的分布式移动医疗系统,确定了基本的威胁模型和必要的可信计算基础。我们展示了如何将提出的框架集成到传感器方阵和Android智能手机之间的现有通信堆栈中。该框架的中心思想涉及系统地、自动地用安全和完整性标签标记医疗接触期间收集的数据和元数据。所提供的这些机制可用于在不同的应用程序中执行各种复杂的信息流控制策略。与现有DIFC方法相比,主要的新颖之处在于,用户不必为系统中收集的每一类数据和元数据创建标记,从而使其用户友好且可扩展。
{"title":"Systematic information flow control in mHealth systems","authors":"Chandrika Bhardwaj","doi":"10.1109/COMSNETS.2015.7098736","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098736","url":null,"abstract":"This paper argues that the security and integrity requirements of mHealth systems are best addressed by end-to-end information flow control (IFC). The paper extends proposals of decentralized IFC to a distributed smartphone-based mHealth system, identifying the basic threat model and the necessary trusted computing base. We show how the framework proposed can be integrated into an existing communication stack between a phalanx of sensors and an Android smartphone. The central idea of the framework involves systematically and automatically labelling data and metadata collected during medical encounters with security and integrity tags. These mechanisms provided can then be used for enforcing a wide variety of complex information flow control policies in diverse applications. The chief novelty over existing DIFC approaches is that users are relieved of having to create tags for each class of data and metadata that is collected in the system, thus making it user-friendly and scalable.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122030905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A study of broadcasting over structured overlay 结构化覆盖广播的研究
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098667
Saiful Khan, A. Gani, S. Raviraja, Shashikantha
An efficient and scalable broadcast are two essential features of structured overlay networks which used in large scale distributed computing systems and in peer-to-peer networks. The existing broadcast based algorithms over the structured overlays experience certain issues due to a decentralised nature of such networks in which nodes join and leave the network dynamically. This causes poor routing efficiency and high maintenance bandwidth overhead. In this paper, we study routing efficiency and maintenance bandwidth overhead while broadcasting messages over the structured overlay networks in dynamic environment. We also propose an improved message broadcasting algorithm over the structured overlay networks. The simulation results show that although there is a trade off between routing efficiency and maintenance bandwidth, with optimisation we can improve one without severely effecting the other parameter.
高效和可扩展的广播是用于大规模分布式计算系统和点对点网络的结构化覆盖网络的两个基本特征。现有的基于广播的算法在结构化覆盖上遇到了某些问题,这是由于这种网络的分散性,其中节点动态加入和离开网络。这会导致路由效率低,维护带宽开销高。本文研究了动态环境下结构化覆盖网络广播时的路由效率和维护带宽开销。我们还提出了一种改进的结构化覆盖网络的消息广播算法。仿真结果表明,虽然路由效率和维护带宽之间存在权衡,但通过优化,我们可以在不严重影响其他参数的情况下提高其中一个参数。
{"title":"A study of broadcasting over structured overlay","authors":"Saiful Khan, A. Gani, S. Raviraja, Shashikantha","doi":"10.1109/COMSNETS.2015.7098667","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098667","url":null,"abstract":"An efficient and scalable broadcast are two essential features of structured overlay networks which used in large scale distributed computing systems and in peer-to-peer networks. The existing broadcast based algorithms over the structured overlays experience certain issues due to a decentralised nature of such networks in which nodes join and leave the network dynamically. This causes poor routing efficiency and high maintenance bandwidth overhead. In this paper, we study routing efficiency and maintenance bandwidth overhead while broadcasting messages over the structured overlay networks in dynamic environment. We also propose an improved message broadcasting algorithm over the structured overlay networks. The simulation results show that although there is a trade off between routing efficiency and maintenance bandwidth, with optimisation we can improve one without severely effecting the other parameter.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistics of stop-and-go traffic: Emergent properties of congestion behavior arising from collective vehicular dynamics in an urban environment 走走停停的交通统计:城市环境中由集体车辆动力学引起的拥堵行为的紧急特性
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098733
N. AbdulMajith, S. Sinha
The movement of large numbers of vehicles along the complex network of roads in a city result in interactions between them that become stronger as the traffic density increases. The non-trivial behavior arising from the collective dynamics of vehicles include the occurrence of persistent congestion at different points of the transport network that typically reduce the efficiency of overall traffic flow. In order to understand the mechanisms responsible for the characteristic spatio-temporal patterns of urban traffic, we first need to identify statistically robust features from empirical observations, which one can then try to recreate in computational models of traffic dynamics. In this article, we have analyzed the GPS traces collected round the clock for more than a hundred taxis operating in a major Indian city over a period of 1 month. The available information allows us to precisely measure the periods during which the vehicle is static and when it is moving. We focus on the intermittent patterns of rest and motion that a car exhibits during its passage through city traffic, which provides a window into key aspects of collective dynamics resulting from congestion. We show that the distribution of waiting time, i.e., the period during which a car is static between two successive epochs of movement, has a highly skewed nature. The bulk of the probability distribution appears to follow power-law scaling with exponent value of 1.78. As city traffic has very different densities during peak hours and off-peak hours, we have also investigated this distribution at different times of the day. While the power-law scaling is found to be robust, the exact value of the exponent does change slightly.We have also considered the active time distribution, i.e., the period of movement between two epochs when the car is static, which does not exhibit a power-law signature but rather resembles a inverse Gaussian or a log-logistic distribution. We also look at the recurrence relation between the durations of successive waiting times, as well as, that between active time duration and the duration of the preceding waiting time. Our results can be used to help understand how the statistical properties of large-scale traffic movement over complex road networks which characterize cities deviate from that of other types of collective dynamics, e.g., the diffusion of random walkers.
在城市中,大量车辆沿着复杂的道路网络移动,导致它们之间的相互作用随着交通密度的增加而变得更强。由车辆的集体动力学引起的非平凡行为包括在交通网络的不同点持续拥堵的发生,这通常会降低整体交通流的效率。为了理解造成城市交通时空格局特征的机制,我们首先需要从经验观察中确定统计上的稳健特征,然后可以尝试在交通动力学的计算模型中重建这些特征。在这篇文章中,我们分析了在一个月的时间里,在印度一个主要城市里,100多辆出租车昼夜不停地收集的GPS轨迹。可利用的信息使我们能够精确地测量车辆静止和移动的时间。我们专注于汽车在城市交通中表现出的间歇休息和运动模式,这为我们提供了一个窗口,让我们了解由拥堵引起的集体动态的关键方面。我们证明了等待时间的分布,即汽车在两个连续运动时期之间静止的时间,具有高度倾斜的性质。大部分概率分布似乎遵循指数值为1.78的幂律缩放。由于城市交通在高峰时间和非高峰时间的密度差异很大,我们也调查了一天中不同时间的分布情况。虽然幂律缩放被认为是稳健的,但指数的确切值确实略有变化。我们还考虑了活动时间分布,即汽车静止时两个时代之间的运动周期,它不表现出幂律特征,而是类似于逆高斯分布或对数逻辑分布。我们还研究了连续等待时间持续时间之间的递归关系,以及活动时间持续时间与前一个等待时间持续时间之间的递归关系。我们的研究结果可以用来帮助理解城市复杂道路网络上大规模交通运动的统计特性是如何偏离其他类型的集体动态的,例如随机步行者的扩散。
{"title":"Statistics of stop-and-go traffic: Emergent properties of congestion behavior arising from collective vehicular dynamics in an urban environment","authors":"N. AbdulMajith, S. Sinha","doi":"10.1109/COMSNETS.2015.7098733","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098733","url":null,"abstract":"The movement of large numbers of vehicles along the complex network of roads in a city result in interactions between them that become stronger as the traffic density increases. The non-trivial behavior arising from the collective dynamics of vehicles include the occurrence of persistent congestion at different points of the transport network that typically reduce the efficiency of overall traffic flow. In order to understand the mechanisms responsible for the characteristic spatio-temporal patterns of urban traffic, we first need to identify statistically robust features from empirical observations, which one can then try to recreate in computational models of traffic dynamics. In this article, we have analyzed the GPS traces collected round the clock for more than a hundred taxis operating in a major Indian city over a period of 1 month. The available information allows us to precisely measure the periods during which the vehicle is static and when it is moving. We focus on the intermittent patterns of rest and motion that a car exhibits during its passage through city traffic, which provides a window into key aspects of collective dynamics resulting from congestion. We show that the distribution of waiting time, i.e., the period during which a car is static between two successive epochs of movement, has a highly skewed nature. The bulk of the probability distribution appears to follow power-law scaling with exponent value of 1.78. As city traffic has very different densities during peak hours and off-peak hours, we have also investigated this distribution at different times of the day. While the power-law scaling is found to be robust, the exact value of the exponent does change slightly.We have also considered the active time distribution, i.e., the period of movement between two epochs when the car is static, which does not exhibit a power-law signature but rather resembles a inverse Gaussian or a log-logistic distribution. We also look at the recurrence relation between the durations of successive waiting times, as well as, that between active time duration and the duration of the preceding waiting time. Our results can be used to help understand how the statistical properties of large-scale traffic movement over complex road networks which characterize cities deviate from that of other types of collective dynamics, e.g., the diffusion of random walkers.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy-efficient privacy homomorphic encryption scheme for multi-sensor data in WSNs 无线传感器网络中多传感器数据的节能隐私同态加密方案
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098719
Suraj Verma, P. Pillai, Yim-Fun Hu
The recent advancements in wireless sensor hardware ensures sensing multiple sensor data such as temperature, pressure, humidity, etc. using a single hardware unit, thus defining it as multi-sensor data communication in wireless sensor networks (WSNs). The in-processing technique of data aggregation is crucial in energy-efficient WSNs; however, with the requirement of end-to-end data confidentiality it may prove to be a challenge. End-to-end data confidentiality along with data aggregation is possible with the implementation of a special type of encryption scheme called privacy homomorphic (PH) encryption schemes. This paper proposes an optimized PH encryption scheme for WSN integrated networks handling multi-sensor data. The proposed scheme ensures light-weight payloads, significant energy and bandwidth consumption along with lower latencies. The performance analysis of the proposed scheme is presented in this paper with respect to the existing scheme. The working principle of the multi-sensor data framework is also presented in this paper along with the appropriate packet structures and process. It can be concluded that the scheme proves to decrease the payload size by 56.86% and spend an average energy of 8-18 mJ at the aggregator node for sensor nodes varying from 10-50 thereby ensuring scalability of the WSN unlike the existing scheme.
无线传感器硬件的最新进展确保使用单个硬件单元感知多个传感器数据,如温度,压力,湿度等,从而将其定义为无线传感器网络(wsn)中的多传感器数据通信。数据聚合处理技术是节能无线传感器网络的关键技术;然而,由于需要端到端的数据机密性,这可能是一个挑战。通过实现一种称为隐私同态(PH)加密方案的特殊类型的加密方案,可以实现端到端的数据机密性以及数据聚合。针对处理多传感器数据的WSN集成网络,提出了一种优化的PH加密方案。所提出的方案确保轻量级有效负载,显著的能量和带宽消耗以及较低的延迟。本文针对现有方案进行了性能分析。本文还介绍了多传感器数据框架的工作原理,以及相应的数据包结构和处理方法。结果表明,对于10 ~ 50个传感器节点,该方案减少了56.86%的有效载荷大小,在汇聚器节点上平均消耗8 ~ 18 mJ的能量,从而保证了WSN与现有方案不同的可扩展性。
{"title":"Energy-efficient privacy homomorphic encryption scheme for multi-sensor data in WSNs","authors":"Suraj Verma, P. Pillai, Yim-Fun Hu","doi":"10.1109/COMSNETS.2015.7098719","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098719","url":null,"abstract":"The recent advancements in wireless sensor hardware ensures sensing multiple sensor data such as temperature, pressure, humidity, etc. using a single hardware unit, thus defining it as multi-sensor data communication in wireless sensor networks (WSNs). The in-processing technique of data aggregation is crucial in energy-efficient WSNs; however, with the requirement of end-to-end data confidentiality it may prove to be a challenge. End-to-end data confidentiality along with data aggregation is possible with the implementation of a special type of encryption scheme called privacy homomorphic (PH) encryption schemes. This paper proposes an optimized PH encryption scheme for WSN integrated networks handling multi-sensor data. The proposed scheme ensures light-weight payloads, significant energy and bandwidth consumption along with lower latencies. The performance analysis of the proposed scheme is presented in this paper with respect to the existing scheme. The working principle of the multi-sensor data framework is also presented in this paper along with the appropriate packet structures and process. It can be concluded that the scheme proves to decrease the payload size by 56.86% and spend an average energy of 8-18 mJ at the aggregator node for sensor nodes varying from 10-50 thereby ensuring scalability of the WSN unlike the existing scheme.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring diversity of network models using distorted information diffusion process 利用扭曲信息扩散过程测量网络模型的多样性
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098729
P. Pandey, Bibhas Adhikari, Ruchir Gupta
In this paper, we propose a distorted information diffusion protocol to detect diversity of different network models. The protocol is inspired by the fact that, in real social networks, the information diffusion get influenced by the property of nodes and conduct of the links. Thus, information get deformed/distorted during diffusion process and true amount of information from a spreader never reach to all the nodes in the network. We consider a single spreader which has maximum degree in the network. We divide the entire network in to different layers where the nodes in a layer are defined by the nodes having a fixed distance from the spreader. We observe that the amount of information available at every node in a layer after the diffusion process reaches to saturation, is not equal. Thus, we define density of information profile of a layer that measures the density of information available in a layer. Finally, we define a vector, which we call information diversity vector whose components are density of information of the layers. The dimension of the diversity vector is the number of layers in the entire network. We implement the protocol in standard network models which include Albert-Barabasi preferential attachment Model (ABM), Hierarchical network generation Model (HM), and Watts-Strogatz Model (WSM). We also simulate the protocol in real world networks which include ego-Facebook Network, Collaboration network of ArXiv General Relativity, and Collaboration network of ArXiv High Energy Physics Theory. The simulated results show that the information diversity vectors of ABM and HM is far from reflecting the same in real world networks. However, diversity vector of WSM is similar to that of real world networks which we consider in this paper.
在本文中,我们提出了一种扭曲信息扩散协议来检测不同网络模型的多样性。该协议的灵感来自于在真实的社交网络中,信息的扩散受到节点属性和链路行为的影响。这样,信息在传播过程中就会发生变形/扭曲,一个传播者的真实信息量不可能到达网络中的所有节点。我们考虑在网络中具有最大度的单个传播者。我们将整个网络划分为不同的层,其中一层中的节点由与散布器有固定距离的节点定义。我们观察到,扩散过程达到饱和后,层中每个节点的可用信息量是不相等的。因此,我们定义了层的信息密度剖面,该剖面测量了层中可用信息的密度。最后,我们定义了一个向量,我们称之为信息多样性向量,它的组成部分是各层信息的密度。多样性向量的维数是整个网络的层数。我们在标准网络模型中实现了该协议,包括Albert-Barabasi优先依恋模型(ABM)、分层网络生成模型(HM)和Watts-Strogatz模型(WSM)。我们还在现实网络中模拟了该协议,包括ego-Facebook网络、ArXiv广义相对论协作网络和ArXiv高能物理理论协作网络。仿真结果表明,ABM和HM的信息分集向量在实际网络中反映的情况相差甚远。然而,WSM的多样性向量与本文所考虑的现实世界网络的多样性向量相似。
{"title":"Measuring diversity of network models using distorted information diffusion process","authors":"P. Pandey, Bibhas Adhikari, Ruchir Gupta","doi":"10.1109/COMSNETS.2015.7098729","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098729","url":null,"abstract":"In this paper, we propose a distorted information diffusion protocol to detect diversity of different network models. The protocol is inspired by the fact that, in real social networks, the information diffusion get influenced by the property of nodes and conduct of the links. Thus, information get deformed/distorted during diffusion process and true amount of information from a spreader never reach to all the nodes in the network. We consider a single spreader which has maximum degree in the network. We divide the entire network in to different layers where the nodes in a layer are defined by the nodes having a fixed distance from the spreader. We observe that the amount of information available at every node in a layer after the diffusion process reaches to saturation, is not equal. Thus, we define density of information profile of a layer that measures the density of information available in a layer. Finally, we define a vector, which we call information diversity vector whose components are density of information of the layers. The dimension of the diversity vector is the number of layers in the entire network. We implement the protocol in standard network models which include Albert-Barabasi preferential attachment Model (ABM), Hierarchical network generation Model (HM), and Watts-Strogatz Model (WSM). We also simulate the protocol in real world networks which include ego-Facebook Network, Collaboration network of ArXiv General Relativity, and Collaboration network of ArXiv High Energy Physics Theory. The simulated results show that the information diversity vectors of ABM and HM is far from reflecting the same in real world networks. However, diversity vector of WSM is similar to that of real world networks which we consider in this paper.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 7th International Conference on Communication Systems and Networks (COMSNETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1