首页 > 最新文献

2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)最新文献

英文 中文
Demonstration of an LTE portable network for private and emergency use - Introducing a fully distributed LTE network architecture 用于私人和紧急用途的LTE便携式网络演示-介绍完全分布式的LTE网络架构
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994409
Gianluca Verin
Guaranteed and reliable access to mobile communications is important for consumers but it is fundamental for mission-critical business applications and in disaster recovery scenarios. During emergencies and events that gather many people in the same place, mobile networks typically become congested or even unavailable. Technologies such as WiFi, that operate on an unlicensed frequency spectrum, are affected by congestion and are susceptible to external interference that can make the technology unusable. Licensed frequencies are not subjected to interference but current solutions based on trasportable base stations (e.g. cells-on-wheels) that are dependent on backhaul connectivity cannot adequately serve the needs of mission critical communications. Mobile operator networks lack disaster recovery and congestion control mechanisms that allow the system to work even in case of a failure of key backhaul network links. Instead a private mobile network based on the latest cellular technology can deliver IP connectivity efficiently during emergencies, events and in general for mission critical communications. This demo shows how a private LTE network can offer privileged access to voice and video services for enterprise and government using standardized cellular technology.
对移动通信的保证和可靠访问对消费者来说很重要,但它是关键任务业务应用程序和灾难恢复场景的基础。在紧急情况和事件中,许多人聚集在同一个地方,移动网络通常会变得拥挤甚至不可用。WiFi等在未经许可的频谱上运行的技术,会受到拥塞的影响,而且容易受到外部干扰,从而使该技术无法使用。许可的频率不受干扰,但目前基于依赖回程连接的可移动基站(例如轮上蜂窝)的解决方案不能充分满足关键任务通信的需求。移动运营商网络缺乏灾难恢复和拥塞控制机制,即使在关键回程网络链路故障的情况下,系统也能正常工作。相反,基于最新蜂窝技术的专用移动网络可以在紧急情况、事件和关键任务通信期间有效地提供IP连接。本演示演示了专用LTE网络如何使用标准化蜂窝技术为企业和政府提供对语音和视频服务的特权访问。
{"title":"Demonstration of an LTE portable network for private and emergency use - Introducing a fully distributed LTE network architecture","authors":"Gianluca Verin","doi":"10.1109/CCNC.2014.6994409","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994409","url":null,"abstract":"Guaranteed and reliable access to mobile communications is important for consumers but it is fundamental for mission-critical business applications and in disaster recovery scenarios. During emergencies and events that gather many people in the same place, mobile networks typically become congested or even unavailable. Technologies such as WiFi, that operate on an unlicensed frequency spectrum, are affected by congestion and are susceptible to external interference that can make the technology unusable. Licensed frequencies are not subjected to interference but current solutions based on trasportable base stations (e.g. cells-on-wheels) that are dependent on backhaul connectivity cannot adequately serve the needs of mission critical communications. Mobile operator networks lack disaster recovery and congestion control mechanisms that allow the system to work even in case of a failure of key backhaul network links. Instead a private mobile network based on the latest cellular technology can deliver IP connectivity efficiently during emergencies, events and in general for mission critical communications. This demo shows how a private LTE network can offer privileged access to voice and video services for enterprise and government using standardized cellular technology.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Browser-based web content sharing system 基于浏览器的网页内容共享系统
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994390
Sanghong An, Hyeontaek Oh, Sangmin Park, Jinhong Yang, Jun Choi
Browser-based Web content sharing system is designed for users to share and distribute what they're watching Web contents to other users or system via Web browser. The demonstration will show the novel method to distribute partial Web contents on browsers to other screens in Web browsing environment, especially for e-learning situations.
基于浏览器的Web内容共享系统是为用户通过Web浏览器向其他用户或系统共享和分发他们正在观看的Web内容而设计的。演示将展示将浏览器上的部分Web内容分发到Web浏览环境中的其他屏幕的新方法,特别是用于电子学习情况。
{"title":"Browser-based web content sharing system","authors":"Sanghong An, Hyeontaek Oh, Sangmin Park, Jinhong Yang, Jun Choi","doi":"10.1109/CCNC.2014.6994390","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994390","url":null,"abstract":"Browser-based Web content sharing system is designed for users to share and distribute what they're watching Web contents to other users or system via Web browser. The demonstration will show the novel method to distribute partial Web contents on browsers to other screens in Web browsing environment, especially for e-learning situations.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anycasting in DTNs using virtual magnetic fields 利用虚磁场在ddn中任意铸造
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994396
Jose Aelio de Oliveira, L. Lima, Gil Eduardo de Andrade, G. Michelon
The typical low rate of unicast message delivery in DTNs (Delay Tolerant Networks) makes this kind of network unfit for many real-world applications. However, when it is sufficient to deliver a message to at least one node within a set of multiple potential destinations - which is called anycasting - then DTN's message delivery rate become acceptable. This paper presents an adaptation of the Virtual Magnetic Fields algorithm for routing anycast messages in DTNs. The algorithm performs routing through message attraction rather than the traditional approach of message forwarding.
容忍延迟网络中典型的低速率单播消息传递使得这种网络不适合许多实际应用。然而,当足以将消息传递到一组多个潜在目的地中的至少一个节点时(称为anycasting), DTN的消息传递率就可以接受了。本文提出了一种基于虚拟磁场算法的ddn任意播消息路由算法。该算法通过消息吸引实现路由,而不是传统的消息转发方式。
{"title":"Anycasting in DTNs using virtual magnetic fields","authors":"Jose Aelio de Oliveira, L. Lima, Gil Eduardo de Andrade, G. Michelon","doi":"10.1109/CCNC.2014.6994396","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994396","url":null,"abstract":"The typical low rate of unicast message delivery in DTNs (Delay Tolerant Networks) makes this kind of network unfit for many real-world applications. However, when it is sufficient to deliver a message to at least one node within a set of multiple potential destinations - which is called anycasting - then DTN's message delivery rate become acceptable. This paper presents an adaptation of the Virtual Magnetic Fields algorithm for routing anycast messages in DTNs. The algorithm performs routing through message attraction rather than the traditional approach of message forwarding.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cornstarch effect: intensifying flow resistance for increasing DDoS attacks in autonomous overlays 玉米淀粉效应:增强流量阻力,增加自主覆盖的DDoS攻击
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994426
Rui-ping Lua, C. H. Wah, W. Ng
Overlay networks are vital to the continued evolution of web services and content distribution. We propose a reactive mechanism to mitigate flooding attacks in overlay networks. Our approach enhances detection and filtering capability in accordance to the size of an attack. As the DDoS traffic flow increases, we intensify detection and scrubbing in a decentralized manner. Flow resistance increases to minimize penetration and attack flows from reaching their destination. We demonstrate their effectiveness in simulations.
覆盖网络对于web服务和内容分发的持续发展至关重要。我们提出了一种响应机制来减轻覆盖网络中的洪水攻击。我们的方法根据攻击的大小增强了检测和过滤能力。随着DDoS流量的增加,我们以分散的方式加强检测和清洗。流动阻力增加,以尽量减少渗透和攻击流到达目的地。我们在仿真中验证了它们的有效性。
{"title":"Cornstarch effect: intensifying flow resistance for increasing DDoS attacks in autonomous overlays","authors":"Rui-ping Lua, C. H. Wah, W. Ng","doi":"10.1109/CCNC.2014.6994426","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994426","url":null,"abstract":"Overlay networks are vital to the continued evolution of web services and content distribution. We propose a reactive mechanism to mitigate flooding attacks in overlay networks. Our approach enhances detection and filtering capability in accordance to the size of an attack. As the DDoS traffic flow increases, we intensify detection and scrubbing in a decentralized manner. Flow resistance increases to minimize penetration and attack flows from reaching their destination. We demonstrate their effectiveness in simulations.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Asymmetric secret sharing scheme suitable for cloud systems 适用于云系统的非对称秘密共享方案
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994405
Satoshi Takahashi, Hyunho Kang, Keiichi Iwamura
The asymmetric secret sharing scheme that we proposed at AINA2013 has a feature that reduces the required storage capacity of a specific server. This means that it can be used as the server not only for the entity of a cloud system but also for a device that is managed by a user, such as a smart phone. In this paper, first we propose a new method, which is an AINA method modified such that it is more suitable for application in a cloud system in which multiple users participate, and then, we propose an application to a life log, as an example of a specific application to which this method can be applied.
我们在AINA2013上提出的非对称秘密共享方案具有降低特定服务器所需存储容量的特性。这意味着它不仅可以用作云系统实体的服务器,还可以用作由用户管理的设备(例如智能手机)的服务器。在本文中,我们首先提出了一种新的方法,这是一种改进的AINA方法,使其更适合在多用户参与的云系统中应用,然后我们提出了一个应用于生活日志的应用,作为该方法可以应用的具体应用的例子。
{"title":"Asymmetric secret sharing scheme suitable for cloud systems","authors":"Satoshi Takahashi, Hyunho Kang, Keiichi Iwamura","doi":"10.1109/CCNC.2014.6994405","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994405","url":null,"abstract":"The asymmetric secret sharing scheme that we proposed at AINA2013 has a feature that reduces the required storage capacity of a specific server. This means that it can be used as the server not only for the entity of a cloud system but also for a device that is managed by a user, such as a smart phone. In this paper, first we propose a new method, which is an AINA method modified such that it is more suitable for application in a cloud system in which multiple users participate, and then, we propose an application to a life log, as an example of a specific application to which this method can be applied.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A proactive content pushing scheme for provider mobility support in information centric networks 一种用于信息中心网络中提供商移动性支持的主动内容推送方案
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994423
Haneul Ko, Younghyun Kim, Dongeun Suh, Sangheon Pack
Information-centric network (ICN) opens a new networking paradigm optimized for contents-oriented services by exploiting in-network caching and mitigating redundant transmissions. When such an ICN is deployed in mobile environments (i.e., the content provider or consumer is a mobile node), an appropriate mobility support protocol needs to be developed. Since the content consumer mobility can be tactically handled through the content consumer driven nature of ICN, the content provider mobility is investigated in this work. Specifically, we propose a proactive content pushing (PCP) scheme, in which the content provider proactively sends a set of contents that are expected to be requested in the near future to proximity ICN routers. Consequently, the PCP scheme can reduce the service disruption time owing to the content provider mobility.
信息中心网络(ICN)通过利用网络内缓存和减少冗余传输,为面向内容的服务优化了一种新的网络范式。当这样的ICN部署在移动环境中时(即,内容提供者或使用者是移动节点),需要开发适当的移动性支持协议。由于内容消费者移动性可以通过ICN的内容消费者驱动特性进行策略处理,因此本工作将研究内容提供者移动性。具体来说,我们提出了一种主动内容推送(PCP)方案,其中内容提供者主动发送一组预计在不久的将来被请求的内容到邻近的ICN路由器。因此,由于内容提供商的移动性,PCP方案可以减少业务中断时间。
{"title":"A proactive content pushing scheme for provider mobility support in information centric networks","authors":"Haneul Ko, Younghyun Kim, Dongeun Suh, Sangheon Pack","doi":"10.1109/CCNC.2014.6994423","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994423","url":null,"abstract":"Information-centric network (ICN) opens a new networking paradigm optimized for contents-oriented services by exploiting in-network caching and mitigating redundant transmissions. When such an ICN is deployed in mobile environments (i.e., the content provider or consumer is a mobile node), an appropriate mobility support protocol needs to be developed. Since the content consumer mobility can be tactically handled through the content consumer driven nature of ICN, the content provider mobility is investigated in this work. Specifically, we propose a proactive content pushing (PCP) scheme, in which the content provider proactively sends a set of contents that are expected to be requested in the near future to proximity ICN routers. Consequently, the PCP scheme can reduce the service disruption time owing to the content provider mobility.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A secure cloud of electronic keys for NFC locks securely controlled by NFC smartphones 由NFC智能手机安全控制的NFC锁电子密钥安全云
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994415
P. Urien
This demonstration shows an innovative and secure framework targeting access control in the internet of things, with NFC (Near Field Communication) enabled smartphones. NFC peer to peer communications are protected by the well known TLS protocol; services working over this stack are identified, according to NFC standards, by a name. Two use cases are presented in order to control an electronic lock. In the first one a password, is securely pushed from the mobile to the lock according to legacy NFC protocol. In the second one the key is stored in an EMV bank card plugged to a server, and is remotely checked. Parts of this framework are detailed by IETF drafts.
该演示展示了一种创新和安全的框架,针对物联网中的访问控制,支持NFC(近场通信)智能手机。NFC点对点通信由众所周知的TLS协议保护;根据NFC标准,通过名称来标识在此堆栈上工作的服务。为了控制电子锁,给出了两个用例。第一个是密码,根据传统的NFC协议从手机安全地推送到锁上。在第二种情况下,密钥存储在EMV银行卡中,并插入服务器,并进行远程检查。该框架的部分内容由IETF草案详细说明。
{"title":"A secure cloud of electronic keys for NFC locks securely controlled by NFC smartphones","authors":"P. Urien","doi":"10.1109/CCNC.2014.6994415","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994415","url":null,"abstract":"This demonstration shows an innovative and secure framework targeting access control in the internet of things, with NFC (Near Field Communication) enabled smartphones. NFC peer to peer communications are protected by the well known TLS protocol; services working over this stack are identified, according to NFC standards, by a name. Two use cases are presented in order to control an electronic lock. In the first one a password, is securely pushed from the mobile to the lock according to legacy NFC protocol. In the second one the key is stored in an EMV bank card plugged to a server, and is remotely checked. Parts of this framework are detailed by IETF drafts.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A privacy-preserving approach in content centric 以内容为中心的隐私保护方法
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994394
S. Seo, Taehong Kim, Myeon-gwuk Jang
Content Centric Network (CCN) is one of the promising architectures for the future Internet that shifts the communication paradigm from the IP-based end-to-end to the content-centric. CCN enables users to obtain contents what they want regardless of where the contents are stored, and the contents are cached into network routers for future requests. Existing privacy-preserving approaches, like Onion routing in IP network, protect the privacy of the sender and recipient of a message as well as provide protection of contents during the traversal of a network. It is natural to prevent the intermediate routers or other nodes interpreting the contents if the contents are private such as Internet banking and shopping. But if contents are public such as YouTube video and New York Times articles, Onion routing loses chance of content caching and utilization, which is one of the main advantages of CCN. In this paper, we propose a new privacy-preserving protocol in CCN, which enables Interest aggregation and content caching which are CCN's main advantages. The experimental result shows that the proposed protocol is still able to use caching effect of CCN while providing user privacy.
内容中心网络(Content Centric Network, CCN)是未来互联网最有前途的体系结构之一,它将通信范式从基于ip的端到端转变为以内容为中心。CCN允许用户获取他们想要的内容,而不管内容存储在哪里,并且内容被缓存到网络路由器中以供将来的请求。现有的隐私保护方法,如IP网络中的洋葱路由,保护消息发送方和接收方的隐私,并在网络遍历期间提供内容保护。如果是网上银行、网上购物等私人内容,自然要防止中间路由器或其他节点对内容进行解读。但如果内容是公开的,如YouTube视频和纽约时报文章,洋葱路由失去了内容缓存和利用的机会,这是CCN的主要优势之一。本文提出了一种新的CCN隐私保护协议,该协议实现了CCN的主要优点——兴趣聚合和内容缓存。实验结果表明,该协议在保证用户隐私的同时,仍然能够利用CCN的缓存效果。
{"title":"A privacy-preserving approach in content centric","authors":"S. Seo, Taehong Kim, Myeon-gwuk Jang","doi":"10.1109/CCNC.2014.6994394","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994394","url":null,"abstract":"Content Centric Network (CCN) is one of the promising architectures for the future Internet that shifts the communication paradigm from the IP-based end-to-end to the content-centric. CCN enables users to obtain contents what they want regardless of where the contents are stored, and the contents are cached into network routers for future requests. Existing privacy-preserving approaches, like Onion routing in IP network, protect the privacy of the sender and recipient of a message as well as provide protection of contents during the traversal of a network. It is natural to prevent the intermediate routers or other nodes interpreting the contents if the contents are private such as Internet banking and shopping. But if contents are public such as YouTube video and New York Times articles, Onion routing loses chance of content caching and utilization, which is one of the main advantages of CCN. In this paper, we propose a new privacy-preserving protocol in CCN, which enables Interest aggregation and content caching which are CCN's main advantages. The experimental result shows that the proposed protocol is still able to use caching effect of CCN while providing user privacy.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
COBRA: Lean intra-domain routing in NDN COBRA:精简NDN域内路由
Pub Date : 2014-12-22 DOI: 10.1109/CCNC.2014.6994403
M. Tortelli, L. Grieco, G. Boggia, Kostas Pentikousisy
Named Data Networking (NDN) is an emerging Information Centric Networking architecture based on hierarchical content names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN networking primitives and routing are based on content names and therefore efficient content discovery of permanent as well as temporarily available cached copies is a key problem to address. This paper examines current NDN approaches and proposes a fully distributed, content-driven, bloom filter-based intra-domain routing algorithm (COBRA), which outperforms previous solutions in this area. COBRA creates routes based on paths used previously for content retrieval, and maintains routing information up-to-date without the need for extensive signaling between nodes. We evaluate COBRA using simulation and compare its performance with other established routing strategies over the European research network GEANT topology as an example of a ndnSIM core network. Our results illustrate that COBRA can significantly reduce overhead with respect to flood-based routing while ensuring hit distances of the same order as when using Dijkstra's algorithm.
命名数据网络(NDN)是一种新兴的以信息为中心的网络架构,它基于分层内容名称、网络内缓存机制、接收器驱动的操作和内容级安全模式。NDN网络原语和路由基于内容名称,因此永久和临时可用的缓存副本的有效内容发现是需要解决的关键问题。本文研究了当前的NDN方法,并提出了一种完全分布式的、内容驱动的、基于bloom过滤器的域内路由算法(COBRA),该算法优于该领域以前的解决方案。COBRA基于先前用于内容检索的路径创建路由,并在不需要节点之间广泛的信令的情况下保持最新的路由信息。我们使用仿真来评估COBRA,并将其性能与欧洲研究网络GEANT拓扑上其他已建立的路由策略进行比较,作为nnsim核心网络的示例。我们的研究结果表明,COBRA可以显著降低基于洪水的路由开销,同时确保与使用Dijkstra算法时相同的命中距离。
{"title":"COBRA: Lean intra-domain routing in NDN","authors":"M. Tortelli, L. Grieco, G. Boggia, Kostas Pentikousisy","doi":"10.1109/CCNC.2014.6994403","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994403","url":null,"abstract":"Named Data Networking (NDN) is an emerging Information Centric Networking architecture based on hierarchical content names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN networking primitives and routing are based on content names and therefore efficient content discovery of permanent as well as temporarily available cached copies is a key problem to address. This paper examines current NDN approaches and proposes a fully distributed, content-driven, bloom filter-based intra-domain routing algorithm (COBRA), which outperforms previous solutions in this area. COBRA creates routes based on paths used previously for content retrieval, and maintains routing information up-to-date without the need for extensive signaling between nodes. We evaluate COBRA using simulation and compare its performance with other established routing strategies over the European research network GEANT topology as an example of a ndnSIM core network. Our results illustrate that COBRA can significantly reduce overhead with respect to flood-based routing while ensuring hit distances of the same order as when using Dijkstra's algorithm.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
iVS: An intelligent end-to-end vital sign capture platform using smartphones iVS:智能端到端生命体征采集平台
Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940522
Quang-Dung Ho, T. Le-Ngoc
This p aper presents the design and implementation of an intelligent vital sign capture platform, namely iVS, which provides end-to-end connectivity between patient monitors and Electronic Healthcare Record (EHR) by using smartphones. By replacing manual operations with automatic machine-to-machine (M2M) communications, iVS aims to enhance reliability, save time and costs for patient's monitoring routines carried out in hospitals, clinics and emergency sites. Using advanced wireless communication technologies, it also allows medical staff to access to patient health conditions and other information (e.g., medications, prescriptions, medical treatment history, etc.) from EHR from anywhere at anytime in order to have fast and efficient responses to emergency situations. Network architecture and system design of iVS are first presented. M2M communication protocols to enable inter-operable data exchange between various system entities are explained. Theoretical maximum user data throughput that can be obtained over the Bluetooth Low Energy (BLE) communication link connecting patient monitors and smartphones is also calculated. Experiments results are also presented and discussed.
本文介绍了智能生命体征捕获平台(即iVS)的设计和实现,该平台通过使用智能手机在患者监视器和电子医疗记录(EHR)之间提供端到端连接。通过用机器对机器(M2M)自动通信取代人工操作,iVS旨在提高可靠性,节省在医院、诊所和急救场所进行患者监测的时间和成本。利用先进的无线通信技术,它还允许医务人员随时随地从电子病历中获取患者的健康状况和其他信息(例如,药物、处方、医疗历史等),以便对紧急情况作出快速有效的反应。首先介绍了iVS的网络结构和系统设计。解释了M2M通信协议,以便在各种系统实体之间实现可互操作的数据交换。还计算了通过连接患者监护仪和智能手机的蓝牙低功耗(BLE)通信链路可以获得的理论最大用户数据吞吐量。给出了实验结果并进行了讨论。
{"title":"iVS: An intelligent end-to-end vital sign capture platform using smartphones","authors":"Quang-Dung Ho, T. Le-Ngoc","doi":"10.1109/CCNC.2014.6940522","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940522","url":null,"abstract":"This p aper presents the design and implementation of an intelligent vital sign capture platform, namely iVS, which provides end-to-end connectivity between patient monitors and Electronic Healthcare Record (EHR) by using smartphones. By replacing manual operations with automatic machine-to-machine (M2M) communications, iVS aims to enhance reliability, save time and costs for patient's monitoring routines carried out in hospitals, clinics and emergency sites. Using advanced wireless communication technologies, it also allows medical staff to access to patient health conditions and other information (e.g., medications, prescriptions, medical treatment history, etc.) from EHR from anywhere at anytime in order to have fast and efficient responses to emergency situations. Network architecture and system design of iVS are first presented. M2M communication protocols to enable inter-operable data exchange between various system entities are explained. Theoretical maximum user data throughput that can be obtained over the Bluetooth Low Energy (BLE) communication link connecting patient monitors and smartphones is also calculated. Experiments results are also presented and discussed.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"113 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123124052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1