首页 > 最新文献

2010 IEEE Fifth International Conference on Networking, Architecture, and Storage最新文献

英文 中文
An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks 时延容忍网络的节能n-流行病路由协议
Xiaofeng Lu, P. Hui
In Delay Tolerant Networks (DTN), as disconnections between nodes are frequent, establishing routing path from the source node to the destination node may not be possible. However, if a node transmits packets to all its encounters, its batteries will be used up quickly. Many researches have been done on routing and forwarding algorithms in DTN, but few of them have explicitly address the energy issue. In this paper, we propose n-epidemic routing protocol, an energy-efficient routing protocol for DTN. The n-epidemic routing protocol is based on the reasoning that in order to reach a large audiences with low number of transmissions, it is better to transmit only when the number of neighbors reaching a certain threshold. We compare the delivery performance of n-epidemic routing protocol with basic epidemic routing protocol using both analytical approach and empirical approach with real experimental dataset. The experiment shows that n-epidemic routing protocol can increase the delivery performance of basic epidemic-routing by 434% averagely.
在容忍延迟网络(DTN)中,由于节点之间的断开频繁,建立从源节点到目的节点的路由路径可能是不可能的。然而,如果一个节点向所有的节点发送数据包,它的电池将很快耗尽。对于DTN中的路由和转发算法已经做了很多研究,但很少有研究明确地解决能量问题。本文提出了一种高效节能的DTN路由协议——n-流行病路由协议。n流行病路由协议基于这样的推理:为了以低传输次数到达大量受众,最好只在邻居数量达到一定阈值时才发送。利用实际实验数据集,采用分析方法和经验方法对n流行病路由协议与基本流行病路由协议的传输性能进行了比较。实验表明,n流行病路由协议可使基本流行病路由的投递性能平均提高434%。
{"title":"An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks","authors":"Xiaofeng Lu, P. Hui","doi":"10.1109/NAS.2010.46","DOIUrl":"https://doi.org/10.1109/NAS.2010.46","url":null,"abstract":"In Delay Tolerant Networks (DTN), as disconnections between nodes are frequent, establishing routing path from the source node to the destination node may not be possible. However, if a node transmits packets to all its encounters, its batteries will be used up quickly. Many researches have been done on routing and forwarding algorithms in DTN, but few of them have explicitly address the energy issue. In this paper, we propose n-epidemic routing protocol, an energy-efficient routing protocol for DTN. The n-epidemic routing protocol is based on the reasoning that in order to reach a large audiences with low number of transmissions, it is better to transmit only when the number of neighbors reaching a certain threshold. We compare the delivery performance of n-epidemic routing protocol with basic epidemic routing protocol using both analytical approach and empirical approach with real experimental dataset. The experiment shows that n-epidemic routing protocol can increase the delivery performance of basic epidemic-routing by 434% averagely.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
High Performance Flow Feature Extraction with Multi-core Processors 高性能流特征提取与多核处理器
Sanping Li, Yan Luo
Next generation networks anticipate an increasing amount of network traffic from a wide range of emerging network applications. The features of packet flows (such as the minimal packet inter-arrival time and the number of packets with non-zero options in TCP headers) are used frequently in determining the traffic type and applying security policies. However, the extraction of flow features is difficult due to the increasing line rates, a broad range of network protocols, and a variety of complex flow features. In this paper, we leverage the multi-core processors to speed up the feature extraction process. We design an open source parallel software tool, aiming for processing network packet flows in real-time. We implement the software in four different designs including serial, parallel, pipelined and hybrid architectures. We evaluate the performance of the parallel software tool through measurement experiments. Our experimental results show that each method increases the packet processing throughput by 5-7% in comparison with the previous method. And finally the implementation based on the hybrid architecture improves the packet processing performance by 19.3% than the implementation based on the serial architecture.
下一代网络预计来自广泛的新兴网络应用的网络流量将不断增加。在确定流量类型和应用安全策略时,经常使用包流的特性(如最小包间到达时间和TCP头中带有非零选项的包的数量)。然而,由于线率的增加、网络协议的广泛以及各种复杂的流特征,流特征的提取是困难的。在本文中,我们利用多核处理器来加快特征提取过程。我们设计了一个开源的并行软件工具,旨在实时处理网络数据包流。我们实现了四种不同的软件设计,包括串行,并行,流水线和混合架构。我们通过测量实验来评估并行软件工具的性能。实验结果表明,与前一种方法相比,每种方法的数据包处理吞吐量都提高了5-7%。最后,基于混合体系结构的实现比基于串行体系结构的实现提高了19.3%的数据包处理性能。
{"title":"High Performance Flow Feature Extraction with Multi-core Processors","authors":"Sanping Li, Yan Luo","doi":"10.1109/NAS.2010.36","DOIUrl":"https://doi.org/10.1109/NAS.2010.36","url":null,"abstract":"Next generation networks anticipate an increasing amount of network traffic from a wide range of emerging network applications. The features of packet flows (such as the minimal packet inter-arrival time and the number of packets with non-zero options in TCP headers) are used frequently in determining the traffic type and applying security policies. However, the extraction of flow features is difficult due to the increasing line rates, a broad range of network protocols, and a variety of complex flow features. In this paper, we leverage the multi-core processors to speed up the feature extraction process. We design an open source parallel software tool, aiming for processing network packet flows in real-time. We implement the software in four different designs including serial, parallel, pipelined and hybrid architectures. We evaluate the performance of the parallel software tool through measurement experiments. Our experimental results show that each method increases the packet processing throughput by 5-7% in comparison with the previous method. And finally the implementation based on the hybrid architecture improves the packet processing performance by 19.3% than the implementation based on the serial architecture.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment CR:真实环境中无线自组织网络路由的能力信息
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is different every time when the relative location of relay node to the destination changes. The configuration in the entire network when all the succeeding paths from a relay node are blocked by local minima is irregular and its concern region cannot be determined unless the routing actually initiates. In this paper, we introduce a new information model to determine the pattern of SCS under the impact of local minima by sacrificing little routing flexibility. As a result, each 1-hop advance can avoid those unsafe situations in order to stay along a non-detour path. In our model, each node prepares the information in a proactive model, but can use it for all different paths passing through, saving the cost and delay in the reactive model. We focus on an ``everyone" model, in which each node will apply the same generic process in a fully distributed manner, in order to achieve a reliable solution in real applications where the communication link is constituted irregularly and its quality changes dynamically. In details, we discuss how in a sample realistic environment the pattern of SCS can be interpreted in a single safety descriptor in [0,1] at each node. It indicates the maximum probability of a successful non-detour path from this node to the edge of networks. The larger value the more likely the non-detour routing will be successful and the more reliable the path will be. We illustrate the effectiveness of this indirect reference information in the corresponding routing, in terms of the cost of information construction and update propagation, and the success of non-detour path constitution, compared with the best results known to date.
在贪婪路由中,每个中继节点将消息转发给离目的地更近的邻居(也称为后继节点)。但是,每次中继节点与目的地的相对位置发生变化时,后继候选集(SCS)都是不同的。当从一个中继节点开始的所有后续路径都被局部最小值阻塞时,整个网络的配置是不规则的,除非路由实际发起,否则无法确定其关注区域。本文在不牺牲路由灵活性的前提下,引入了一种新的信息模型来确定局部最小值影响下的路由模式。因此,每前进1跳就可以避免这些不安全的情况,从而保持在不绕路的路径上。在我们的模型中,每个节点在主动模型中准备信息,但可以将其用于经过的所有不同路径,从而节省了响应模型中的成本和延迟。为了在通信链路构成不规则、质量动态变化的实际应用中实现可靠的解决方案,我们重点研究了“每个人”模型,每个节点将以完全分布式的方式应用相同的通用流程。详细地,我们讨论了如何在一个示例现实环境中,在每个节点的[0,1]中的单个安全描述符中解释SCS模式。它表示从该节点到网络边缘成功的非绕路路径的最大概率。该值越大,说明不绕路路由成功的可能性越大,路径的可靠性越高。与迄今为止已知的最佳结果相比,我们从信息构建和更新传播的成本以及非绕行路径构建的成功度方面说明了该间接参考信息在相应路由中的有效性。
{"title":"CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment","authors":"Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu","doi":"10.1109/NAS.2010.31","DOIUrl":"https://doi.org/10.1109/NAS.2010.31","url":null,"abstract":"In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is different every time when the relative location of relay node to the destination changes. The configuration in the entire network when all the succeeding paths from a relay node are blocked by local minima is irregular and its concern region cannot be determined unless the routing actually initiates. In this paper, we introduce a new information model to determine the pattern of SCS under the impact of local minima by sacrificing little routing flexibility. As a result, each 1-hop advance can avoid those unsafe situations in order to stay along a non-detour path. In our model, each node prepares the information in a proactive model, but can use it for all different paths passing through, saving the cost and delay in the reactive model. We focus on an ``everyone\" model, in which each node will apply the same generic process in a fully distributed manner, in order to achieve a reliable solution in real applications where the communication link is constituted irregularly and its quality changes dynamically. In details, we discuss how in a sample realistic environment the pattern of SCS can be interpreted in a single safety descriptor in [0,1] at each node. It indicates the maximum probability of a successful non-detour path from this node to the edge of networks. The larger value the more likely the non-detour routing will be successful and the more reliable the path will be. We illustrate the effectiveness of this indirect reference information in the corresponding routing, in terms of the cost of information construction and update propagation, and the success of non-detour path constitution, compared with the best results known to date.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fine-Grained Data Reconstruction Algorithm for Solid-State Disks 一种面向固态硬盘的细粒度数据重构算法
Peng Wang, D. Hu, C. Xie, Jianzong Wang, X. Qin
Solid-state disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strategies certainly inevitably degrade write performance. In addition to low write performance, wear-leveling strategies make one block unwritable when one bit of this block is invalid. Although data reconstruction techniques have been widely employed in disk arrays, the reconstruction techniques has not been studied in the context of solid-state disks. In this paper, we present a new fine-grained data-reconstruction algorithm for solid-state disks. The algorithm aims to provide a simple yet efficient wear-leveling strategy that improves both I/O performance and reliability of solid-state disks. Simulation experiments show that all data blocks have very similar in terms of erasure times. The number of extra erasures incurred by our algorithm is very marginal.
具有高I/O性能的固态硬盘(ssd)越来越受欢迎。为了延长闪存的使用寿命,可以采用损耗均衡策略来管理数据块。然而,损耗均衡策略不可避免地会降低写性能。除了低写性能外,当一个块的一个比特无效时,损耗均衡策略会使该块不可写。虽然数据重构技术已广泛应用于磁盘阵列,但在固态磁盘环境下的数据重构技术尚未得到研究。本文提出了一种新的固态磁盘的细粒度数据重构算法。该算法旨在提供一种简单而高效的损耗均衡策略,以提高固态硬盘的I/O性能和可靠性。仿真实验表明,所有数据块的擦除时间非常相似。我们的算法产生的额外擦除次数非常少。
{"title":"A Fine-Grained Data Reconstruction Algorithm for Solid-State Disks","authors":"Peng Wang, D. Hu, C. Xie, Jianzong Wang, X. Qin","doi":"10.1109/NAS.2010.62","DOIUrl":"https://doi.org/10.1109/NAS.2010.62","url":null,"abstract":"Solid-state disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strategies certainly inevitably degrade write performance. In addition to low write performance, wear-leveling strategies make one block unwritable when one bit of this block is invalid. Although data reconstruction techniques have been widely employed in disk arrays, the reconstruction techniques has not been studied in the context of solid-state disks. In this paper, we present a new fine-grained data-reconstruction algorithm for solid-state disks. The algorithm aims to provide a simple yet efficient wear-leveling strategy that improves both I/O performance and reliability of solid-state disks. Simulation experiments show that all data blocks have very similar in terms of erasure times. The number of extra erasures incurred by our algorithm is very marginal.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Replication Management for Object-Based Storage System 对象存储系统动态复制管理
Q. Wei, B. Veeravalli, Zhixiang Li
Data replication has been widely used as a mean of increasing the data availability of large-scale storage systems where failures are normal. Aiming to provide cost-effective availability, and improve performance and load-balancing of large-scale storage cluster, this paper presents a dynamic replication management scheme referred to as DRM. A model is developed to express availability as function of replica number. Based on this model, minimal replica number to satisfy availability requirement can be determined. DRM further places these replicas among Object-Based Storage Devices (OSD) in a balance way, taking into account different capacity and blocking probability of each OSD in heterogeneous environment. Proposed DRM can dynamically redistribute workloads among OSD cluster by adjusting replica number and location according to workload changing and OSD capacity. Our experiment results conclusively demonstrate that DRM is reliable and can achieve a significant average response time, and load balancing for large-scale OSD cluster.
数据复制已被广泛用于提高大型存储系统的数据可用性,在这些系统中故障是很常见的。为了提供高性价比的可用性,提高大规模存储集群的性能和负载均衡,本文提出了一种动态复制管理方案(DRM)。建立了可用性作为副本数函数的模型。基于该模型,可以确定满足可用性要求的最小副本数。DRM进一步考虑到异构环境中每个OSD的容量和阻塞概率的不同,以均衡的方式将这些副本放置在各个OSD之间。DRM可以根据工作负载的变化和OSD的容量调整副本的数量和位置,在OSD集群之间动态地重新分配工作负载。实验结果表明,对于大规模OSD集群,DRM是可靠的,可以实现显著的平均响应时间和负载均衡。
{"title":"Dynamic Replication Management for Object-Based Storage System","authors":"Q. Wei, B. Veeravalli, Zhixiang Li","doi":"10.1109/NAS.2010.24","DOIUrl":"https://doi.org/10.1109/NAS.2010.24","url":null,"abstract":"Data replication has been widely used as a mean of increasing the data availability of large-scale storage systems where failures are normal. Aiming to provide cost-effective availability, and improve performance and load-balancing of large-scale storage cluster, this paper presents a dynamic replication management scheme referred to as DRM. A model is developed to express availability as function of replica number. Based on this model, minimal replica number to satisfy availability requirement can be determined. DRM further places these replicas among Object-Based Storage Devices (OSD) in a balance way, taking into account different capacity and blocking probability of each OSD in heterogeneous environment. Proposed DRM can dynamically redistribute workloads among OSD cluster by adjusting replica number and location according to workload changing and OSD capacity. Our experiment results conclusively demonstrate that DRM is reliable and can achieve a significant average response time, and load balancing for large-scale OSD cluster.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliability Analysis of Declustered-Parity RAID 6 with Disk Scrubbing and Considering Irrecoverable Read Errors 考虑不可恢复读错误和磁盘刷洗的非聚类奇偶校验RAID 6可靠性分析
Yan Gao, Dirk Meister, A. Brinkmann
We investigate the impact of Irrecoverable Read Errors (IREs) on Mean Time To Data Loss (MTTDL) of declustered-parity RAID 6 systems. By extending the analytic model to study the reliability of RAID 5 systems from Wu et. al. we obtain the MTTDL which mainly takes into account two types of data loss: data loss caused by three independent disk failures, and data loss due to a detected IRE during the rebuild after two disks failed. Furthermore we improve the analysis by also considering disk scrubbing to reduce the probability of IREs via periodically reading the data stored on a disk. The results of our numerical analysis show that IREs have a large effect on the MTTDL. The countermeasure is to increase the disk scrubbing rate. As an example, the MTTDL of a system where each disk is scrubbed everyday increases by a factor of at least 27 compared to that of a system with a scrubbing rate of once a year. In addition, declustered-parity RAID 6 system improves the reliability of standard non-declustered RAID 6 systems. For example, a declustered-parity RAID 6 system without disk scrubbing improves the MTTDLs by a factor at least 150 compared to that of a standard system where each disk is scrubbed everyday.
我们研究了不可恢复的读取错误(IREs)对非集群奇偶校验RAID 6系统的平均数据丢失时间(MTTDL)的影响。通过扩展Wu等人的分析模型来研究RAID 5系统的可靠性,我们得到了MTTDL,它主要考虑了两种类型的数据丢失:一种是由于三个独立的磁盘故障导致的数据丢失,另一种是由于两个磁盘故障后重建过程中检测到IRE导致的数据丢失。此外,我们还考虑通过定期读取存储在磁盘上的数据来降低IREs概率,从而改进了分析。数值分析结果表明,IREs对MTTDL有很大的影响。对策是提高磁盘擦洗率。例如,与每年清洗一次磁盘的系统相比,每天清洗每个磁盘的系统的MTTDL至少增加了27倍。此外,非集群奇偶校验RAID 6系统提高了标准非集群RAID 6系统的可靠性。例如,与每天清洗每个磁盘的标准系统相比,没有磁盘清洗的非集群奇偶校验RAID 6系统将mttdl提高了至少150倍。
{"title":"Reliability Analysis of Declustered-Parity RAID 6 with Disk Scrubbing and Considering Irrecoverable Read Errors","authors":"Yan Gao, Dirk Meister, A. Brinkmann","doi":"10.1109/NAS.2010.11","DOIUrl":"https://doi.org/10.1109/NAS.2010.11","url":null,"abstract":"We investigate the impact of Irrecoverable Read Errors (IREs) on Mean Time To Data Loss (MTTDL) of declustered-parity RAID 6 systems. By extending the analytic model to study the reliability of RAID 5 systems from Wu et. al. we obtain the MTTDL which mainly takes into account two types of data loss: data loss caused by three independent disk failures, and data loss due to a detected IRE during the rebuild after two disks failed. Furthermore we improve the analysis by also considering disk scrubbing to reduce the probability of IREs via periodically reading the data stored on a disk. The results of our numerical analysis show that IREs have a large effect on the MTTDL. The countermeasure is to increase the disk scrubbing rate. As an example, the MTTDL of a system where each disk is scrubbed everyday increases by a factor of at least 27 compared to that of a system with a scrubbing rate of once a year. In addition, declustered-parity RAID 6 system improves the reliability of standard non-declustered RAID 6 systems. For example, a declustered-parity RAID 6 system without disk scrubbing improves the MTTDLs by a factor at least 150 compared to that of a standard system where each disk is scrubbed everyday.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks 无线传感器网络中针对虫洞攻击的基于标签的DV-Hop定位
Junfeng Wu, Honglong Chen, W. Lou, Zhibo Wang, Zhi Wang
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization mechanism can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel the packets via the wormhole link to cause severe impacts on the DV-Hop localization process. The distance-vector propagation phase during the DV-Hop localization even aggravates the positioning result, compared to the localization schemes without wormhole attacks. In this paper, we analyze the impacts of wormhole attack on DV-Hop localization scheme. Based on the basic DV-Hop localization process, we propose a label-based secure localization scheme to defend against the wormhole attack. Simulation results demonstrate that our proposed secure localization scheme is capable of detecting the wormhole attack and resisting its adverse impacts with a high probability.
随着无线传感器网络在环境监测、应急救援和战场监视等领域的广泛应用,节点定位成为无线传感器网络中的一个重要问题。基本上,在具有自定位能力的信标节点的帮助下,DV-Hop定位机制可以很好地工作。但是,当网络遭到虫洞攻击时,攻击者可以通过虫洞链路对报文进行隧道化,对DV-Hop的定位过程造成严重影响。与不受虫洞攻击的定位方案相比,DV-Hop定位过程中的距离矢量传播阶段甚至加重了定位结果。本文分析了虫洞攻击对DV-Hop定位方案的影响。基于基本的DV-Hop定位过程,提出了一种基于标签的安全定位方案来防御虫洞攻击。仿真结果表明,我们提出的安全定位方案能够很好地检测到虫洞攻击并抵御其不利影响。
{"title":"Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks","authors":"Junfeng Wu, Honglong Chen, W. Lou, Zhibo Wang, Zhi Wang","doi":"10.1109/NAS.2010.41","DOIUrl":"https://doi.org/10.1109/NAS.2010.41","url":null,"abstract":"Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization mechanism can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel the packets via the wormhole link to cause severe impacts on the DV-Hop localization process. The distance-vector propagation phase during the DV-Hop localization even aggravates the positioning result, compared to the localization schemes without wormhole attacks. In this paper, we analyze the impacts of wormhole attack on DV-Hop localization scheme. Based on the basic DV-Hop localization process, we propose a label-based secure localization scheme to defend against the wormhole attack. Simulation results demonstrate that our proposed secure localization scheme is capable of detecting the wormhole attack and resisting its adverse impacts with a high probability.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Fast and Memory-Efficient Traffic Classification with Deep Packet Inspection in CMP Architecture 基于CMP结构深度包检测的快速高效流分类
Tingwen Liu, Yong Sun, Li Guo
Traffic classification is important to many network applications, such as network monitoring. The classic way to identify flows, e.g., examining the port numbers in the packet headers, becomes ineffective. In this context, deep packet inspection technology, which does not only inspect the packet headers but also the packet payloads, plays a more important role in traffic classification. Meanwhile regular expressions are replacing strings to represent patterns because of their expressive power, simplicity and flexibility. However, regular expressions mathcing technique causes a high memory usage and processing cost, which result in low throughout. In this paper, we analyze the application-level protocol distribution of network traffic and conclude its characteristic. Furthermore, we design a fast and memory-efficient system of a two-layer architecture for traffic classification with the help of regular expressions in multi-core architecture, which is different from previous one-layer architecture. In order to reduce the memory usage of DFA, we use a compression algorithm called CSCA to perform regular expressions matching, which can reduce 95% memory usage of DFA. We also introduce some optimizations to accelerate the matching speed. We use real-world traffic and all L7-filter protocol patterns to make our experiments, and the results show that the system achieves at Gbps level throughout in 4-cores Servers.
流分类对于网络监控等许多网络应用非常重要。识别流的经典方法,例如,检查包头中的端口号,变得无效。在这种背景下,深度报文检测技术在流量分类中发挥了更重要的作用,该技术不仅可以检测报文的报头,还可以检测报文的负载。同时,正则表达式由于其强大的表达能力、简单性和灵活性正在取代字符串来表示模式。但是,正则表达式计算技术会导致较高的内存使用和处理成本,从而导致低吞吐量。本文分析了网络流量的应用层协议分布,总结了其特点。在此基础上,我们设计了一种不同于以往的单层流分类系统,利用多核体系结构中的正则表达式设计了一种快速、高效的双层流分类系统。为了减少DFA的内存使用,我们使用了一种称为CSCA的压缩算法来执行正则表达式匹配,该算法可以减少95%的DFA内存使用。我们还引入了一些优化来加快匹配速度。我们使用真实流量和所有l7过滤器协议模式进行实验,结果表明系统在整个4核服务器中达到了Gbps级别。
{"title":"Fast and Memory-Efficient Traffic Classification with Deep Packet Inspection in CMP Architecture","authors":"Tingwen Liu, Yong Sun, Li Guo","doi":"10.1109/NAS.2010.43","DOIUrl":"https://doi.org/10.1109/NAS.2010.43","url":null,"abstract":"Traffic classification is important to many network applications, such as network monitoring. The classic way to identify flows, e.g., examining the port numbers in the packet headers, becomes ineffective. In this context, deep packet inspection technology, which does not only inspect the packet headers but also the packet payloads, plays a more important role in traffic classification. Meanwhile regular expressions are replacing strings to represent patterns because of their expressive power, simplicity and flexibility. However, regular expressions mathcing technique causes a high memory usage and processing cost, which result in low throughout. In this paper, we analyze the application-level protocol distribution of network traffic and conclude its characteristic. Furthermore, we design a fast and memory-efficient system of a two-layer architecture for traffic classification with the help of regular expressions in multi-core architecture, which is different from previous one-layer architecture. In order to reduce the memory usage of DFA, we use a compression algorithm called CSCA to perform regular expressions matching, which can reduce 95% memory usage of DFA. We also introduce some optimizations to accelerate the matching speed. We use real-world traffic and all L7-filter protocol patterns to make our experiments, and the results show that the system achieves at Gbps level throughout in 4-cores Servers.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115000520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Spatial-Temporal Access Control for E-health Services 电子医疗服务的时空访问控制
Apaporn Boonyarattaphan, Yan Bai, S. Chung, R. Poovendran
The transformation of healthcare from human-based to online services can expose e-health to the security threats as other online applications. The identities of legitimate e-health users need to be verified cautiously before the access privileges are granted. Since each treatment service of a patient occurs within a time interval and specific location, we propose to make use of time as well as the location as additional parameters in verifying that legitimate users are involved in services. In particular, we develop and implement a prototype of the Spatial-Temporal Access Control to authenticate and authorize users of e-health services, termed STAC-eHS. STAC-eHS is beneficial for e-health services since it allows system users to define the spatial and/or temporal constraints for e-health authentication and authorization decisions, thus, improving e-health system security and protection of patient’s privacy. We also perform experiments to evaluate STAC-eHS. The results show that STAC-eHS increases the accuracy of the detection of illegitimate users in an e-health system by about 3-12%, as compared to traditional RBAC, with a small delay of less than two seconds.
医疗保健从以人为基础的服务向在线服务的转变可能使电子医疗与其他在线应用程序一样面临安全威胁。在授予访问权限之前,需要谨慎地验证合法电子医疗用户的身份。由于患者的每一次治疗服务都是在一定的时间间隔和特定的地点进行的,我们建议使用时间和地点作为验证合法用户参与服务的附加参数。特别是,我们开发并实现了一个时空访问控制的原型,用于对电子医疗服务的用户进行身份验证和授权,称为STAC-eHS。STAC-eHS有利于电子卫生服务,因为它允许系统用户定义电子卫生认证和授权决策的空间和/或时间约束,从而提高电子卫生系统的安全性并保护患者隐私。我们还进行了实验来评价STAC-eHS。结果表明,与传统的RBAC相比,STAC-eHS在电子医疗系统中检测非法用户的准确性提高了约3-12%,延迟不到2秒。
{"title":"Spatial-Temporal Access Control for E-health Services","authors":"Apaporn Boonyarattaphan, Yan Bai, S. Chung, R. Poovendran","doi":"10.1109/NAS.2010.38","DOIUrl":"https://doi.org/10.1109/NAS.2010.38","url":null,"abstract":"The transformation of healthcare from human-based to online services can expose e-health to the security threats as other online applications. The identities of legitimate e-health users need to be verified cautiously before the access privileges are granted. Since each treatment service of a patient occurs within a time interval and specific location, we propose to make use of time as well as the location as additional parameters in verifying that legitimate users are involved in services. In particular, we develop and implement a prototype of the Spatial-Temporal Access Control to authenticate and authorize users of e-health services, termed STAC-eHS. STAC-eHS is beneficial for e-health services since it allows system users to define the spatial and/or temporal constraints for e-health authentication and authorization decisions, thus, improving e-health system security and protection of patient’s privacy. We also perform experiments to evaluate STAC-eHS. The results show that STAC-eHS increases the accuracy of the detection of illegitimate users in an e-health system by about 3-12%, as compared to traditional RBAC, with a small delay of less than two seconds.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127195942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Node-Disjoint Multipath Routing with Group Mobility in MANETs manet中具有组移动性的节点不相交多路径路由
Yun Ge, Guojun Wang, Jie Wu
Group mobility is quite usual in many realistic mobile and wireless environments, but it is rarely adopted in multipath routing. We propose a Group mobility-based Multipath Routing protocol (GMR) for large and dense mobile ad-hoc networks (MANETs). The GMR protocol adapts intra-group routing and inter-group routing to handle group mobility. The routing table maintained by a group leader is used to discover routes in intra-group routing, while the reactive routing, with the zoning method, is used to discover multiple node-disjoint paths in inter-group routing. The purpose of the zoning method is to ensure that a path is mapped to a separate zone, so that nodes are disjointed in multiple paths. Performance analysis and simulation results show that the proposed protocol provides satisfactory routing performance in large and dense networks with group mobility patterns.
在许多现实的移动和无线环境中,群移动是非常常见的,但在多径路由中却很少被采用。我们提出了一种基于组移动性的多路径路由协议(GMR),用于大型和密集的移动自组织网络(manet)。GMR协议采用组内路由和组间路由来处理组的移动性。在组内路由中,使用组长维护的路由表发现路由;在组间路由中,使用响应路由,采用分区的方式发现多条节点不相交的路径。分区方法的目的是确保将路径映射到单独的区域,从而使节点在多条路径中脱节。性能分析和仿真结果表明,该协议在具有组移动模式的大型密集网络中具有令人满意的路由性能。
{"title":"Node-Disjoint Multipath Routing with Group Mobility in MANETs","authors":"Yun Ge, Guojun Wang, Jie Wu","doi":"10.1109/NAS.2010.26","DOIUrl":"https://doi.org/10.1109/NAS.2010.26","url":null,"abstract":"Group mobility is quite usual in many realistic mobile and wireless environments, but it is rarely adopted in multipath routing. We propose a Group mobility-based Multipath Routing protocol (GMR) for large and dense mobile ad-hoc networks (MANETs). The GMR protocol adapts intra-group routing and inter-group routing to handle group mobility. The routing table maintained by a group leader is used to discover routes in intra-group routing, while the reactive routing, with the zoning method, is used to discover multiple node-disjoint paths in inter-group routing. The purpose of the zoning method is to ensure that a path is mapped to a separate zone, so that nodes are disjointed in multiple paths. Performance analysis and simulation results show that the proposed protocol provides satisfactory routing performance in large and dense networks with group mobility patterns.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2010 IEEE Fifth International Conference on Networking, Architecture, and Storage
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1