首页 > 最新文献

2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)最新文献

英文 中文
On efficiently harnessing cloud to securely solve linear regression and other matrix operations 有效地利用云来安全地求解线性回归和其他矩阵运算
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590402
Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang
In this paper, we propose a new efficient solution for securely outsourcing linear regression to a public cloud with robust answer verification. Additionally, we show our construction can be utilized to efficiently and securely outsource other large-scale matrix operations, such as determinant computation.
在本文中,我们提出了一种新的高效解决方案,用于将线性回归安全外包到具有鲁棒答案验证的公共云。此外,我们展示了我们的构造可以用于有效和安全地外包其他大规模矩阵操作,如行列式计算。
{"title":"On efficiently harnessing cloud to securely solve linear regression and other matrix operations","authors":"Youwen Zhu, Zhikuan Wang, Cheng Qian, Jian Wang","doi":"10.1109/IWQoS.2016.7590402","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590402","url":null,"abstract":"In this paper, we propose a new efficient solution for securely outsourcing linear regression to a public cloud with robust answer verification. Additionally, we show our construction can be utilized to efficiently and securely outsource other large-scale matrix operations, such as determinant computation.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Certificate-aware encrypted traffic classification using Second-Order Markov Chain 基于二阶马尔可夫链的证书感知加密流量分类
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590451
Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang, Fuliang Li
With the prosperity of network applications, traffic classification serves as a crucial role in network management and malicious attack detection. The widely used encryption transmission protocols, such as the Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols, leads to the failure of traditional payload-based classification methods. Existing methods for encrypted traffic classification suffer from low accuracy. In this paper, we propose a certificate-aware encrypted traffic classification method based on the Second-Order Markov Chain. We start by exploring reasons why existing methods not perform well, and make a novel observation that certificate packet length in SSL/TLS sessions contributes to application discrimination. To increase the diversity of application fingerprints, we develop a new model by incorporating the certificate packet length clustering into the Second-Order homogeneous Markov chains. Extensive evaluation results show that the proposed method lead to a 30% improvement on average compared with the state-of-the-art method, in terms of classification accuracy.
随着网络应用的蓬勃发展,流量分类在网络管理和恶意攻击检测中发挥着至关重要的作用。SSL/TLS (Secure Socket Layer/Transport Layer Security)等广泛使用的加密传输协议导致传统的基于有效载荷的分类方法失效。现有的加密流分类方法存在准确率低的问题。本文提出了一种基于二阶马尔可夫链的证书感知加密流量分类方法。我们首先探索现有方法性能不佳的原因,并提出一个新颖的观察,即SSL/TLS会话中的证书数据包长度有助于应用程序区分。为了增加应用指纹的多样性,我们将证书包长度聚类引入到二阶齐次马尔可夫链中,建立了一个新的模型。广泛的评估结果表明,在分类精度方面,与最先进的方法相比,所提出的方法平均提高了30%。
{"title":"Certificate-aware encrypted traffic classification using Second-Order Markov Chain","authors":"Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang, Fuliang Li","doi":"10.1109/IWQoS.2016.7590451","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590451","url":null,"abstract":"With the prosperity of network applications, traffic classification serves as a crucial role in network management and malicious attack detection. The widely used encryption transmission protocols, such as the Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols, leads to the failure of traditional payload-based classification methods. Existing methods for encrypted traffic classification suffer from low accuracy. In this paper, we propose a certificate-aware encrypted traffic classification method based on the Second-Order Markov Chain. We start by exploring reasons why existing methods not perform well, and make a novel observation that certificate packet length in SSL/TLS sessions contributes to application discrimination. To increase the diversity of application fingerprints, we develop a new model by incorporating the certificate packet length clustering into the Second-Order homogeneous Markov chains. Extensive evaluation results show that the proposed method lead to a 30% improvement on average compared with the state-of-the-art method, in terms of classification accuracy.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Multi-channel mode for emergency system in urban connected vehicles 城市网联车辆应急系统的多通道模式
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590415
S. Khan, M. Fränzle
Traffic safety applications exploit vehicle-to-vehicle communication is an emerging and promising area within the intelligent transportation system (ITS) environment. This objective would be achieved essentially by the employ of efficient safety applications which should be able to wirelessly broadcast warning messages between neighboring vehicles in order to inform drivers about a dangerous situation; such as accidents in a timely manner. To ensure their efficiency, safety applications require reliable periodic data dissemination with low latency. IEEE 1609.4 defines a MAC layer implementation for multichannel operations in a vehicular ad hoc network (VANET). In this light we proposes a novel multi channel mode protocol for emergency systems to improve the channel utilization of the control channel (CCH) and uniformly distribute the channel load on service channels (SCHs). In the proposed protocol, network change their modes from general to emergency mode to increase the probability for a message to arrive in time. The scheme reduces the rate of transmission collisions which create latency and improves the reliability of message delivery in time. Furthermore, extensive analysis and simulations are presented.
交通安全应用利用车对车通信是智能交通系统(ITS)环境下一个新兴且有前途的领域。这一目标将主要通过采用有效的安全应用程序来实现,这些应用程序应该能够在相邻车辆之间无线广播警告信息,以便告知驾驶员危险情况;如遇事故及时处理。为了保证其效率,安全应用需要可靠的、低延迟的周期性数据分发。IEEE 1609.4定义了在车载自组织网络(VANET)中多通道操作的MAC层实现。在此基础上,提出了一种新的应急系统多信道协议,以提高控制信道(CCH)的信道利用率,并将信道负荷均匀地分配到业务信道(SCHs)上。在该协议中,网络将其模式由普通模式改为应急模式,以提高消息及时到达的概率。该方案降低了产生延迟的传输冲突率,提高了消息及时传递的可靠性。此外,还进行了广泛的分析和仿真。
{"title":"Multi-channel mode for emergency system in urban connected vehicles","authors":"S. Khan, M. Fränzle","doi":"10.1109/IWQoS.2016.7590415","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590415","url":null,"abstract":"Traffic safety applications exploit vehicle-to-vehicle communication is an emerging and promising area within the intelligent transportation system (ITS) environment. This objective would be achieved essentially by the employ of efficient safety applications which should be able to wirelessly broadcast warning messages between neighboring vehicles in order to inform drivers about a dangerous situation; such as accidents in a timely manner. To ensure their efficiency, safety applications require reliable periodic data dissemination with low latency. IEEE 1609.4 defines a MAC layer implementation for multichannel operations in a vehicular ad hoc network (VANET). In this light we proposes a novel multi channel mode protocol for emergency systems to improve the channel utilization of the control channel (CCH) and uniformly distribute the channel load on service channels (SCHs). In the proposed protocol, network change their modes from general to emergency mode to increase the probability for a message to arrive in time. The scheme reduces the rate of transmission collisions which create latency and improves the reliability of message delivery in time. Furthermore, extensive analysis and simulations are presented.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient routing for cooperative data regeneration in heterogeneous storage networks 异构存储网络中协同数据再生的有效路由
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590387
Zhirong Shen, P. Lee, J. Shu
Large-scale storage systems often face node failures that lead to data loss. Cooperative regeneration has been extensively studied to minimize the repair traffic of simultaneously reconstructing the lost data of multiple failed nodes. However, existing cooperative regeneration schemes assume that nodes are homogeneous. They do not consider how to minimize the general regenerating cost when taking into account node heterogeneity. This paper presents the first systematic study on enhancing conventional cooperation regeneration (CCR) schemes in a heterogeneous environment. We formulate cooperative regeneration as a cost-based routing optimization model, and propose a new cost-based heterogeneity-aware cooperative regeneration (HCR) framework. The main novelty of HCR is to decompose CCR schemes into two stages (i.e., expansion and aggregation) that can be opportunistically carried out by different nodes depending on their costs. To efficiently select the nodes for expansion execution without exhaustive enumeration, we design two greedy algorithms based on the hill-climbing technique. We also formulate the routing problem in the aggregation stage as a Steiner Tree Problem. Finally, we conduct extensive trace-driven simulations and show that HCR can reduce up to 75.4% transmission time of CCR. Also, we demonstrate that HCR remains robust even when the heterogeneity information is not accurately measured.
大规模存储系统经常面临节点故障导致数据丢失的问题。为了最大限度地减少多个故障节点同时重建丢失数据的修复工作量,协同再生已经得到了广泛的研究。然而,现有的协作再生方案假设节点是同构的。在考虑节点异构性的情况下,它们没有考虑如何使总再生成本最小化。本文首次系统地研究了在异质环境下如何提高传统的合作再生(CCR)机制。将协同再生构建为基于成本的路由优化模型,提出了一种基于成本的异构感知协同再生框架。HCR的主要新颖之处在于将CCR方案分解为两个阶段(即扩展和聚合),这两个阶段可以由不同的节点根据其成本机会地执行。为了在不进行穷举枚举的情况下有效地选择扩展执行的节点,我们设计了两种基于爬坡技术的贪婪算法。我们还将聚合阶段的路由问题表述为一个斯坦纳树问题。最后,我们进行了广泛的跟踪驱动仿真,结果表明HCR可以将CCR的传输时间减少75.4%。此外,我们证明即使异质性信息没有准确测量,HCR仍然是稳健的。
{"title":"Efficient routing for cooperative data regeneration in heterogeneous storage networks","authors":"Zhirong Shen, P. Lee, J. Shu","doi":"10.1109/IWQoS.2016.7590387","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590387","url":null,"abstract":"Large-scale storage systems often face node failures that lead to data loss. Cooperative regeneration has been extensively studied to minimize the repair traffic of simultaneously reconstructing the lost data of multiple failed nodes. However, existing cooperative regeneration schemes assume that nodes are homogeneous. They do not consider how to minimize the general regenerating cost when taking into account node heterogeneity. This paper presents the first systematic study on enhancing conventional cooperation regeneration (CCR) schemes in a heterogeneous environment. We formulate cooperative regeneration as a cost-based routing optimization model, and propose a new cost-based heterogeneity-aware cooperative regeneration (HCR) framework. The main novelty of HCR is to decompose CCR schemes into two stages (i.e., expansion and aggregation) that can be opportunistically carried out by different nodes depending on their costs. To efficiently select the nodes for expansion execution without exhaustive enumeration, we design two greedy algorithms based on the hill-climbing technique. We also formulate the routing problem in the aggregation stage as a Steiner Tree Problem. Finally, we conduct extensive trace-driven simulations and show that HCR can reduce up to 75.4% transmission time of CCR. Also, we demonstrate that HCR remains robust even when the heterogeneity information is not accurately measured.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127195854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical fast scheduling and routing over slotted CSMA for wireless mesh networks 实用的快速调度和路由在开槽CSMA无线网状网络
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590389
Takuya Yoshihiro, Taiki Nishimae
Although Wireless Mesh Networks (WMNs) over CSMA and TDMA MAC have been extensively studied, CSMA still suffers from heavy interference due to hidden terminals, while TDMA has a practical difficulty in accurate time synchronization. Slotted CSMA, in which we assume that CSMA runs within relatively large time-divided slots, could be one of the solutions since it works on loosely synchronized time slots and simultaneously avoids major collision under a properly designed feasible schedule. However, if we apply a schedule generally used in TDMA, there are several inconveniences: First, we need heavy overhead of centralized computation or negotiation among nodes in distributed scheduling. Second, end-to-end packet delivery delay grows large since TDMA requires a large number of slots to achieve collision-free scheduling. In this paper, we propose a new scheduling algorithm for slotted CSMA called CATBS (CSMA-Aware Time-Boundable Scheduling) that requires a smaller number of slots for feasible scheduling, and runs within a bounded time. Incorporating the scheduling, we design a routing protocol that enables flexible paths recomputation with small communication overhead. We consequently achieve a new fully distributed and robust network architecture of WMNs that provides practically high throughput and low delivery delay, which can be implemented on the off-the-shelf IEEE802.11 interfaces.
尽管基于CSMA和TDMA MAC的无线网状网络(WMNs)已经得到了广泛的研究,但CSMA由于隐藏终端而受到严重干扰,而TDMA在精确时间同步方面存在实际困难。槽式CSMA可以作为一种解决方案,因为它可以在松散同步的时隙上工作,同时在合理设计的可行调度下避免重大碰撞。槽式CSMA假设CSMA运行在相对较大的时隙内。然而,如果我们采用TDMA中常用的调度,会有以下几个不便之处:首先,在分布式调度中,我们需要大量的集中计算或节点之间的协商开销。其次,由于TDMA需要大量的插槽来实现无冲突调度,端到端分组传输延迟变大。本文提出了一种新的有槽CSMA调度算法CATBS (CSMA- aware time - boundable scheduling),该算法需要较少的槽数进行可行的调度,并在有限的时间内运行。结合调度,我们设计了一种路由协议,可以在较小的通信开销下实现灵活的路径重计算。因此,我们实现了一种新的完全分布式和健壮的wmn网络架构,它提供了实际的高吞吐量和低传输延迟,可以在现成的IEEE802.11接口上实现。
{"title":"Practical fast scheduling and routing over slotted CSMA for wireless mesh networks","authors":"Takuya Yoshihiro, Taiki Nishimae","doi":"10.1109/IWQoS.2016.7590389","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590389","url":null,"abstract":"Although Wireless Mesh Networks (WMNs) over CSMA and TDMA MAC have been extensively studied, CSMA still suffers from heavy interference due to hidden terminals, while TDMA has a practical difficulty in accurate time synchronization. Slotted CSMA, in which we assume that CSMA runs within relatively large time-divided slots, could be one of the solutions since it works on loosely synchronized time slots and simultaneously avoids major collision under a properly designed feasible schedule. However, if we apply a schedule generally used in TDMA, there are several inconveniences: First, we need heavy overhead of centralized computation or negotiation among nodes in distributed scheduling. Second, end-to-end packet delivery delay grows large since TDMA requires a large number of slots to achieve collision-free scheduling. In this paper, we propose a new scheduling algorithm for slotted CSMA called CATBS (CSMA-Aware Time-Boundable Scheduling) that requires a smaller number of slots for feasible scheduling, and runs within a bounded time. Incorporating the scheduling, we design a routing protocol that enables flexible paths recomputation with small communication overhead. We consequently achieve a new fully distributed and robust network architecture of WMNs that provides practically high throughput and low delivery delay, which can be implemented on the off-the-shelf IEEE802.11 interfaces.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploiting time-varying graphs for data forwarding in mobile social Delay-Tolerant Networks 利用时变图实现移动社交容延迟网络中的数据转发
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590436
Dongliang Xie, Xin Wang, Lanchao Liu, Linhui Ma
With the rapid shift from end-to-end communications to content-based data sharing, there are increasing interests in exploiting mobile social Delay-Tolerant Networks (social DTNs) to deliver data, where the forwarding decision is usually made by comparing the social metrics of encountered nodes. Existing studies mostly derive long-term statistical social metrics without considering the temporal impact from node mobility. We exploit the time-varying contact graphs to analyze the dynamics of social DTNs based on two groups of datasets. Based on the analysis, we derive the time-varying characteristics of node contacts, durative and periodicity, and apply them to more accurately predict the corresponding time-varying social metrics (TSMs). We further propose a two-stage opportunistic forwarding strategy to select relays based on TSMs. Our simulation results verify the importance of the two properties we observe and the effectiveness of our algorithm in tracking time-varying social metrics. We also show the potential of our algorithm in finding general time varying metrics to improve the data dissemination performance of other opportunistic forwarding schemes.
随着从端到端通信到基于内容的数据共享的快速转变,人们对利用移动社交容忍延迟网络(social dtn)来传递数据越来越感兴趣,其中转发决策通常是通过比较遇到的节点的社交指标来做出的。现有的研究大多得出长期的统计社会指标,而没有考虑节点迁移的时间影响。我们利用时变接触图来分析基于两组数据集的社交dtn的动态。在此基础上,推导出节点接触的时变特征、持续性特征和周期性特征,并应用它们更准确地预测相应的时变社会指标(TSMs)。我们进一步提出了一种基于tsm的两阶段机会转发策略来选择中继。我们的模拟结果验证了我们观察到的两个属性的重要性,以及我们的算法在跟踪时变社交指标方面的有效性。我们还展示了我们的算法在寻找一般时变指标方面的潜力,以改善其他机会转发方案的数据传播性能。
{"title":"Exploiting time-varying graphs for data forwarding in mobile social Delay-Tolerant Networks","authors":"Dongliang Xie, Xin Wang, Lanchao Liu, Linhui Ma","doi":"10.1109/IWQoS.2016.7590436","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590436","url":null,"abstract":"With the rapid shift from end-to-end communications to content-based data sharing, there are increasing interests in exploiting mobile social Delay-Tolerant Networks (social DTNs) to deliver data, where the forwarding decision is usually made by comparing the social metrics of encountered nodes. Existing studies mostly derive long-term statistical social metrics without considering the temporal impact from node mobility. We exploit the time-varying contact graphs to analyze the dynamics of social DTNs based on two groups of datasets. Based on the analysis, we derive the time-varying characteristics of node contacts, durative and periodicity, and apply them to more accurately predict the corresponding time-varying social metrics (TSMs). We further propose a two-stage opportunistic forwarding strategy to select relays based on TSMs. Our simulation results verify the importance of the two properties we observe and the effectiveness of our algorithm in tracking time-varying social metrics. We also show the potential of our algorithm in finding general time varying metrics to improve the data dissemination performance of other opportunistic forwarding schemes.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An experimental investigation of hyperbolic routing with a smart forwarding plane in NDN NDN中智能转发平面双曲路由的实验研究
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590394
Vince Lehman, Ashlesh Gawande, Beichuan Zhang, Lixia Zhang, R. Aldecoa, D. Krioukov, Lan Wang
Routing in NDN networks must scale in terms of forwarding table size and routing protocol overhead. Hyperbolic routing (HR) presents a potential solution to address the routing scalability problem, because it does not use traditional forwarding tables or exchange routing updates upon changes in network topologies. Although HR has the drawbacks of producing sub-optimal routes or local minima for some destinations, these issues can be mitigated by NDN's intelligent data forwarding plane. However, HR's viability still depends on both the quality of the routes HR provides and the overhead incurred at the forwarding plane due to HR's sub-optimal behavior. We designed a new forwarding strategy called Adaptive Smoothed RTT-based Forwarding (ASF) to mitigate HR's sub-optimal path selection. This paper describes our experimental investigation into the packet delivery delay and overhead under HR as compared with Named-Data Link State Routing (NLSR), which calculates shortest paths. We run emulation experiments using various topologies with different failure scenarios, probing intervals, and maximum number of next hops for a name prefix. Our results show that HR's delay stretch has a median close to 1 and a 95th-percentile around or below 2, which does not grow with the network size. HR's message overhead in dynamic topologies is nearly independent of the network size, while NLSR's overhead grows polynomially at least. These results suggest that HR offers a more scalable routing solution with little impact on the optimality of routing paths.
NDN网络中的路由必须根据转发表大小和路由协议开销进行扩展。双曲路由(HR)提供了解决路由可伸缩性问题的潜在解决方案,因为它不使用传统的转发表或在网络拓扑变化时交换路由更新。尽管对于某些目的地,HR存在产生次优路由或局部最小值的缺点,但这些问题可以通过NDN的智能数据转发平面来缓解。然而,HR的生存能力仍然取决于HR提供的路由质量和由于HR的次优行为而在转发平面上产生的开销。我们设计了一种新的转发策略,称为自适应平滑基于rtt的转发(ASF),以减轻HR的次优路径选择。本文描述了我们对HR下的数据包传递延迟和开销的实验研究,并与计算最短路径的命名数据链路状态路由(NLSR)进行了比较。我们使用具有不同故障场景、探测间隔和名称前缀的最大下一跳数的各种拓扑运行仿真实验。我们的结果表明,HR的延迟拉伸的中位数接近1,第95百分位在2左右或以下,它不随网络规模的增长而增长。动态拓扑中HR的消息开销几乎与网络大小无关,而NLSR的消息开销至少呈多项式增长。这些结果表明,HR提供了一个更具可扩展性的路由解决方案,对路由路径的最优性影响很小。
{"title":"An experimental investigation of hyperbolic routing with a smart forwarding plane in NDN","authors":"Vince Lehman, Ashlesh Gawande, Beichuan Zhang, Lixia Zhang, R. Aldecoa, D. Krioukov, Lan Wang","doi":"10.1109/IWQoS.2016.7590394","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590394","url":null,"abstract":"Routing in NDN networks must scale in terms of forwarding table size and routing protocol overhead. Hyperbolic routing (HR) presents a potential solution to address the routing scalability problem, because it does not use traditional forwarding tables or exchange routing updates upon changes in network topologies. Although HR has the drawbacks of producing sub-optimal routes or local minima for some destinations, these issues can be mitigated by NDN's intelligent data forwarding plane. However, HR's viability still depends on both the quality of the routes HR provides and the overhead incurred at the forwarding plane due to HR's sub-optimal behavior. We designed a new forwarding strategy called Adaptive Smoothed RTT-based Forwarding (ASF) to mitigate HR's sub-optimal path selection. This paper describes our experimental investigation into the packet delivery delay and overhead under HR as compared with Named-Data Link State Routing (NLSR), which calculates shortest paths. We run emulation experiments using various topologies with different failure scenarios, probing intervals, and maximum number of next hops for a name prefix. Our results show that HR's delay stretch has a median close to 1 and a 95th-percentile around or below 2, which does not grow with the network size. HR's message overhead in dynamic topologies is nearly independent of the network size, while NLSR's overhead grows polynomially at least. These results suggest that HR offers a more scalable routing solution with little impact on the optimality of routing paths.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
sdnMAC: A software defined networking based MAC protocol in VANETs sdnMAC: VANETs中基于软件定义网络的MAC协议
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590403
Guiyang Luo, Shucong Jia, Zishan Liu, Konglin Zhu, Lin Zhang
In this paper, we propose a hierarchical architecture based on software defined networking (SDN) to manage the physical resources in vehicular ad-hoc networks (VANETs), namely sdnMAC. First of all, a novel roadside unit (denoted by ROFS) is designed, which is an OpenFlow switch equipped with a wireless interface. Then, a hierarchical architecture is proposed for sdnMAC, consisting of two tiers, one is the management of the ROFSs by the Controller, the other is management of vehicles by ROFSs. Due to the cooperative share of slots information, sdnMAC can provide pre-warning of collisions and agility to topology change and varying densities of vehicles.
在本文中,我们提出了一种基于软件定义网络(SDN)的分层架构来管理车载自组织网络(vanet)中的物理资源,即sdnMAC。首先,设计了一种新型的路边单元(用ROFS表示),它是一个带有无线接口的OpenFlow交换机。在此基础上,提出了sdnMAC的层次化体系结构,包括两层,一层是控制器对rofs的管理,另一层是rofs对车辆的管理。由于槽位信息的协同共享,snmac可以提供碰撞预警和对拓扑变化和车辆密度变化的灵活性。
{"title":"sdnMAC: A software defined networking based MAC protocol in VANETs","authors":"Guiyang Luo, Shucong Jia, Zishan Liu, Konglin Zhu, Lin Zhang","doi":"10.1109/IWQoS.2016.7590403","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590403","url":null,"abstract":"In this paper, we propose a hierarchical architecture based on software defined networking (SDN) to manage the physical resources in vehicular ad-hoc networks (VANETs), namely sdnMAC. First of all, a novel roadside unit (denoted by ROFS) is designed, which is an OpenFlow switch equipped with a wireless interface. Then, a hierarchical architecture is proposed for sdnMAC, consisting of two tiers, one is the management of the ROFSs by the Controller, the other is management of vehicles by ROFSs. Due to the cooperative share of slots information, sdnMAC can provide pre-warning of collisions and agility to topology change and varying densities of vehicles.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129939869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited 对云中加密数据的抗合谋安全最近邻查询,重新访问
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590443
Youwen Zhu, Zhikuan Wang, Jian Wang
It is a challenging problem to securely resist the collusion of cloud server and query users while implementing nearest neighbor query over encrypted data in cloud. Recently, CloudBI-II is put forward to support nearest neighbor query on encrypted cloud data, and declared to be secure while cloud server colludes with some untrusted query users. In this paper, we propose an efficient attack method which indicates CloudBI-II will reveal the difference vectors under the collusion attack. Further, we show that the difference vector disclosure will result in serious privacy breach, and thus attain an efficient attack method to break CloudBI-II. Namely, CloudBI-II cannot achieve their declared security. Through theoretical analysis and experiment evaluation, we confirm our proposed attack approach can fast recover the original data from the encrypted data set in CloudBI-II. Finally, we provide an enhanced scheme which can efficiently resist the collusion attack.
在对云中的加密数据实现最近邻查询时,如何安全地抵御云服务器和查询用户的合谋是一个具有挑战性的问题。最近提出的CloudBI-II支持对加密的云数据进行最近邻查询,并在云服务器与一些不可信的查询用户串通时声明是安全的。在本文中,我们提出了一种有效的攻击方法,表明CloudBI-II在合谋攻击下可以揭示差异向量。进一步,我们证明了差异向量披露会导致严重的隐私泄露,从而获得了一种有效的攻击方法来破坏CloudBI-II。也就是说,CloudBI-II无法实现其声明的安全性。通过理论分析和实验评估,我们证实了所提出的攻击方法可以从CloudBI-II中加密的数据集中快速恢复原始数据。最后,我们提出了一种增强方案,可以有效地抵抗合谋攻击。
{"title":"Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited","authors":"Youwen Zhu, Zhikuan Wang, Jian Wang","doi":"10.1109/IWQoS.2016.7590443","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590443","url":null,"abstract":"It is a challenging problem to securely resist the collusion of cloud server and query users while implementing nearest neighbor query over encrypted data in cloud. Recently, CloudBI-II is put forward to support nearest neighbor query on encrypted cloud data, and declared to be secure while cloud server colludes with some untrusted query users. In this paper, we propose an efficient attack method which indicates CloudBI-II will reveal the difference vectors under the collusion attack. Further, we show that the difference vector disclosure will result in serious privacy breach, and thus attain an efficient attack method to break CloudBI-II. Namely, CloudBI-II cannot achieve their declared security. Through theoretical analysis and experiment evaluation, we confirm our proposed attack approach can fast recover the original data from the encrypted data set in CloudBI-II. Finally, we provide an enhanced scheme which can efficiently resist the collusion attack.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A secure hierarchical deduplication system in cloud storage 云存储中安全的分级重复数据删除系统
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590397
Xin Yao, Yaping Lin, Qin Liu, Yanchao Zhang
Data deduplication is commonly adopted in cloud storage services to improve storage utilization and reduce transmission bandwidth. It, however, conflicts with the requirement for data confidentiality offered by data encryption. Hierarchical authorized deduplication alleviates the tension between data deduplication and confidentiality and allows a cloud user to perform privilege-based duplicate checks before uploading the data. Existing hierarchical authorized deduplication systems permit the cloud server to profile cloud users according to their privileges. In this paper, we propose a secure hierarchical deduplication system to support privilege-based duplicate checks and also prevent privilege-based user profiling by the cloud server. Our system also supports dynamic privilege changes. Detailed theoretical analysis and experimental studies confirm the security and high efficiency of our system.
为了提高存储利用率和降低传输带宽,云存储业务通常采用重复数据删除技术。然而,它与数据加密对数据保密性的要求相冲突。分级授权重复数据删除缓解了重复数据删除与保密性之间的紧张关系,允许云用户在上传数据之前进行基于权限的重复检查。现有的分级授权重复数据删除系统允许云服务器根据云用户的权限对其进行配置。在本文中,我们提出了一个安全的分层重复数据删除系统,以支持基于特权的重复检查,并防止云服务器基于特权的用户分析。我们的系统还支持动态权限更改。详细的理论分析和实验研究证实了系统的安全性和高效性。
{"title":"A secure hierarchical deduplication system in cloud storage","authors":"Xin Yao, Yaping Lin, Qin Liu, Yanchao Zhang","doi":"10.1109/IWQoS.2016.7590397","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590397","url":null,"abstract":"Data deduplication is commonly adopted in cloud storage services to improve storage utilization and reduce transmission bandwidth. It, however, conflicts with the requirement for data confidentiality offered by data encryption. Hierarchical authorized deduplication alleviates the tension between data deduplication and confidentiality and allows a cloud user to perform privilege-based duplicate checks before uploading the data. Existing hierarchical authorized deduplication systems permit the cloud server to profile cloud users according to their privileges. In this paper, we propose a secure hierarchical deduplication system to support privilege-based duplicate checks and also prevent privilege-based user profiling by the cloud server. Our system also supports dynamic privilege changes. Detailed theoretical analysis and experimental studies confirm the security and high efficiency of our system.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1