首页 > 最新文献

2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)最新文献

英文 中文
The detection of physical attacks against iBeacon transmitters 检测针对iBeacon发射机的物理攻击
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590453
Chen Liu, Pengyu Zhao, Kaigui Bian, Tong Zhao, Yan Wei
iBeacon is a new technology proposed by Apple using Bluetooth Low Energy (BLE), which helps mobile devices understand their position on a micro-local scale, and facilitates the delivery of location-based content to mobile users. According to the iBeacon protocol, iBeacon transmitters only do one-way broadcast communication, and thus it is difficult to authenticate the legitimacy of the transmitters. In this paper, we focus on detecting the physical attacks against iBeacon transmitters- iBeacon transmitters can be stolen, tampered, faked and reused, which interfere with the legitimate iBeacon transmission, reduce the quality of service and ultimately degrade the user experience. We develop a detection system based on Hidden Markov Model running on the server-side to detect the misbehaving iBeacon transmitters without more energy consuming. Our system achieves 85% detection accuracy on average for all physical attack actions; meanwhile it has a 5% false alarm rate for non-attack situations in our designated trace experiments, and 100% correct binary judgements in the random-trace experiments. To the best of our knowledge, this is the first work that focuses on the iBeacon physical attack problem.
iBeacon是苹果公司提出的一项使用低功耗蓝牙(BLE)的新技术,它可以帮助移动设备在微本地规模上了解自己的位置,并方便向移动用户提供基于位置的内容。根据iBeacon协议,iBeacon发射机只进行单向广播通信,因此难以验证发射机的合法性。在本文中,我们重点检测针对iBeacon发射机的物理攻击——iBeacon发射机可以被窃取、篡改、伪造和重用,从而干扰合法的iBeacon传输,降低服务质量,最终降低用户体验。我们开发了一个基于隐马尔可夫模型的检测系统,该系统运行在服务器端,可以在不增加能耗的情况下检测iBeacon发送器的异常行为。我们的系统对所有物理攻击行为的平均检测准确率达到85%;同时,在我们指定的跟踪实验中,它对非攻击情况的虚警率为5%,在随机跟踪实验中,它对二元判断的正确率为100%。据我们所知,这是第一个关注iBeacon物理攻击问题的工作。
{"title":"The detection of physical attacks against iBeacon transmitters","authors":"Chen Liu, Pengyu Zhao, Kaigui Bian, Tong Zhao, Yan Wei","doi":"10.1109/IWQoS.2016.7590453","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590453","url":null,"abstract":"iBeacon is a new technology proposed by Apple using Bluetooth Low Energy (BLE), which helps mobile devices understand their position on a micro-local scale, and facilitates the delivery of location-based content to mobile users. According to the iBeacon protocol, iBeacon transmitters only do one-way broadcast communication, and thus it is difficult to authenticate the legitimacy of the transmitters. In this paper, we focus on detecting the physical attacks against iBeacon transmitters- iBeacon transmitters can be stolen, tampered, faked and reused, which interfere with the legitimate iBeacon transmission, reduce the quality of service and ultimately degrade the user experience. We develop a detection system based on Hidden Markov Model running on the server-side to detect the misbehaving iBeacon transmitters without more energy consuming. Our system achieves 85% detection accuracy on average for all physical attack actions; meanwhile it has a 5% false alarm rate for non-attack situations in our designated trace experiments, and 100% correct binary judgements in the random-trace experiments. To the best of our knowledge, this is the first work that focuses on the iBeacon physical attack problem.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130806705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
M3: Practical and reliable multi-layer video multicast over multi-rate Wi-Fi network M3:实用可靠的多速率Wi-Fi网络多层视频多播
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590430
Menghan Li, Dan Pei, Xiaoping Zhang, Beichuan Zhang, Zhi Wang, Hailiang Xu, Zihan Wang
IEEE 802.11-based wireless LAN, commonly referred to as Wi-Fi, has become a universal solution for the last-hop network access. In large and public assembly places, people may use their mobile devices to view the video of the same popular events via the same wireless access points (APs). However, current 802.11 APs transmit the same video stream multiple times via separate unicast sessions due to the well-known poor reliability and low data rate of the legacy Wi-Fi multicast. Besides, in traditional single-layer-coded video streams, all clients have to settle with the lowest video bitrate limited by the client with the worst channel quality. To address these problems, we propose M3, a practical and reliable multi-layer video multicast solution over multi-rate Wi-Fi networks. The aims of our system are, in the premise of no change to APs, not only to ensure that all clients can smoothly watch the video at least with the lowest quality, but also to maximize the overall video quality received by all clients. To meet these design goals, the video server selects certain clients as unicast receivers to transmit different SVC video layers, and other clients listen for the packets in the promiscuous mode. It is challenging to select specific unicast receivers and allocate different SVC layers to fully utilize the available bandwidth because of dynamic network conditions. To overcome this challenge, we use a periodical feedback mechanism to collect necessary statistics from clients, and use them to derive an optimal SVC-layer allocation strategy to maximize the video quality. We implemented a prototype in a real Wi-Fi testbed consisting of one AP and one M3 server and 8 clients. Compared with the single-layer video multicast, our M3 system can improve the total received video rate by up to 200%
基于IEEE 802.11的无线局域网,通常称为Wi-Fi,已经成为最后一跳网络接入的通用解决方案。在大型公共集会场所,人们可以使用移动设备通过相同的无线接入点观看相同的热门事件的视频。然而,由于传统Wi-Fi多播众所周知的低可靠性和低数据速率,目前的802.11 ap通过单独的单播会话多次传输相同的视频流。此外,在传统的单层编码视频流中,所有客户端都必须在信道质量最差的客户端所限制的最低视频比特率下进行结算。为了解决这些问题,我们提出了M3,一种实用且可靠的多速率Wi-Fi网络多层视频多播解决方案。我们系统的目标是在不改变ap的前提下,保证所有客户端至少能以最低的质量顺利观看视频,同时最大限度地提高所有客户端接收到的整体视频质量。为了实现这些设计目标,视频服务器选择特定的客户端作为单播接收端来传输不同的SVC视频层,其他客户端以混杂模式侦听报文。由于网络环境的动态性,选择特定的单播接收器和分配不同的SVC层以充分利用可用带宽是一项挑战。为了克服这一挑战,我们使用周期性反馈机制从客户端收集必要的统计数据,并使用它们推导出最佳的svc层分配策略,以最大限度地提高视频质量。我们在一个真实的Wi-Fi测试平台上实现了一个原型,该测试平台由一个AP和一个M3服务器以及8个客户端组成。与单层视频组播相比,我们的M3系统可以将总接收视频速率提高200%
{"title":"M3: Practical and reliable multi-layer video multicast over multi-rate Wi-Fi network","authors":"Menghan Li, Dan Pei, Xiaoping Zhang, Beichuan Zhang, Zhi Wang, Hailiang Xu, Zihan Wang","doi":"10.1109/IWQoS.2016.7590430","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590430","url":null,"abstract":"IEEE 802.11-based wireless LAN, commonly referred to as Wi-Fi, has become a universal solution for the last-hop network access. In large and public assembly places, people may use their mobile devices to view the video of the same popular events via the same wireless access points (APs). However, current 802.11 APs transmit the same video stream multiple times via separate unicast sessions due to the well-known poor reliability and low data rate of the legacy Wi-Fi multicast. Besides, in traditional single-layer-coded video streams, all clients have to settle with the lowest video bitrate limited by the client with the worst channel quality. To address these problems, we propose M3, a practical and reliable multi-layer video multicast solution over multi-rate Wi-Fi networks. The aims of our system are, in the premise of no change to APs, not only to ensure that all clients can smoothly watch the video at least with the lowest quality, but also to maximize the overall video quality received by all clients. To meet these design goals, the video server selects certain clients as unicast receivers to transmit different SVC video layers, and other clients listen for the packets in the promiscuous mode. It is challenging to select specific unicast receivers and allocate different SVC layers to fully utilize the available bandwidth because of dynamic network conditions. To overcome this challenge, we use a periodical feedback mechanism to collect necessary statistics from clients, and use them to derive an optimal SVC-layer allocation strategy to maximize the video quality. We implemented a prototype in a real Wi-Fi testbed consisting of one AP and one M3 server and 8 clients. Compared with the single-layer video multicast, our M3 system can improve the total received video rate by up to 200%","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126665282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-based techniques for QoS assessment of cloud-hosted CDN services 基于模型的云托管CDN服务QoS评估技术
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590442
K. Ravindran, K. Fayzullaev, Yassine Wardei
Given cloud-based realization of a CDN service S (i.e., Content Distribution Network), QoS auditing captures the QoS violations that arise under various resource depletion and outage scenarios faced by S. Third-party control of the underlying cloud VM and storage nodes hosting the content (i.e., proxies of content server) raises the issue of reasoning about how well the CDN internal mechanisms are engineered to offer a required level of service to the application (i.e., low latency and overhead). We employ computational models of S to determine the optimal feasible proxy placements in the CDN topology and verify how close is the actual behavior of S to this 'gold standard'. Using declarative specifications, the QoS meta-data and CDN adaptation processes of S are externalized to enable a management module H reason about QoS violations. The paper elucidates the software and system engineering issues that arise in an external evaluation of the QoS provisioning of S by H.
考虑到基于云的CDN服务S(即内容分发网络)的实现,QoS审计捕获了在各种资源耗尽和中断情况下出现的QoS违规S。第三方控制底层云VM和托管内容的存储节点(即内容服务器的代理)提出了一个问题,即CDN内部机制的设计如何为应用程序提供所需的服务级别(即,低延迟和开销)。我们使用S的计算模型来确定CDN拓扑中最优可行的代理位置,并验证S的实际行为与此“黄金标准”的接近程度。使用声明性规范,将S的QoS元数据和CDN适应过程外部化,使管理模块H能够判断QoS违规。本文阐述了H对S提供QoS的外部评估中出现的软件和系统工程问题。
{"title":"Model-based techniques for QoS assessment of cloud-hosted CDN services","authors":"K. Ravindran, K. Fayzullaev, Yassine Wardei","doi":"10.1109/IWQoS.2016.7590442","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590442","url":null,"abstract":"Given cloud-based realization of a CDN service S (i.e., Content Distribution Network), QoS auditing captures the QoS violations that arise under various resource depletion and outage scenarios faced by S. Third-party control of the underlying cloud VM and storage nodes hosting the content (i.e., proxies of content server) raises the issue of reasoning about how well the CDN internal mechanisms are engineered to offer a required level of service to the application (i.e., low latency and overhead). We employ computational models of S to determine the optimal feasible proxy placements in the CDN topology and verify how close is the actual behavior of S to this 'gold standard'. Using declarative specifications, the QoS meta-data and CDN adaptation processes of S are externalized to enable a management module H reason about QoS violations. The paper elucidates the software and system engineering issues that arise in an external evaluation of the QoS provisioning of S by H.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129191955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic TrafficAV:利用网络流量对移动恶意软件行为进行有效且可解释的检测
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590446
Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia
Android has become the most popular mobile platform due to its openness and flexibility. Meanwhile, it has also become the main target of massive mobile malware. This phenomenon drives a pressing need for malware detection. In this paper, we propose TrafficAV, which is an effective and explainable detection of mobile malware behavior using network traffic. Network traffic generated by mobile app is mirrored from the wireless access point to the server for data analysis. All data analysis and malware detection are performed on the server side, which consumes minimum resources on mobile devices without affecting the user experience. Due to the difficulty in identifying disparate malicious behaviors of malware from the network traffic, TrafficAV performs a multi-level network traffic analysis, gathering as many features of network traffic as necessary. The proposed method combines network traffic analysis with machine learning algorithm (C4.5 decision tree) that is capable of identifying Android malware with high accuracy. In an evaluation with 8,312 benign apps and 5,560 malware samples, TCP flow detection model and HTTP detection model all perform well and achieve detection rates of 98.16% and 99.65%, respectively. In addition, for the benefit of user, TrafficAV not only displays the final detection results, but also analyzes the behind-the-curtain reason of malicious results. This allows users to further investigate each feature's contribution in the final result, and to grasp the insights behind the final decision.
Android因其开放性和灵活性而成为最受欢迎的移动平台。与此同时,它也成为了大量移动恶意软件的主要目标。这种现象推动了对恶意软件检测的迫切需求。在本文中,我们提出了TrafficAV,它是一种有效且可解释的利用网络流量检测移动恶意软件行为的方法。移动应用产生的网络流量从无线接入点镜像到服务器进行数据分析。所有的数据分析和恶意软件检测都在服务器端进行,在不影响用户体验的情况下,对移动设备的资源消耗最少。由于很难从网络流量中识别出不同的恶意软件的恶意行为,TrafficAV执行多层次的网络流量分析,收集尽可能多的网络流量特征。该方法将网络流量分析与机器学习算法(C4.5决策树)相结合,能够以较高的准确率识别Android恶意软件。在对8,312个良性应用和5,560个恶意软件样本的评估中,TCP流量检测模型和HTTP检测模型均表现良好,检测率分别达到98.16%和99.65%。此外,为了用户的利益,TrafficAV不仅展示了最终的检测结果,还分析了恶意结果的幕后原因。这允许用户进一步研究每个特性在最终结果中的贡献,并掌握最终决策背后的见解。
{"title":"TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic","authors":"Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia","doi":"10.1109/IWQoS.2016.7590446","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590446","url":null,"abstract":"Android has become the most popular mobile platform due to its openness and flexibility. Meanwhile, it has also become the main target of massive mobile malware. This phenomenon drives a pressing need for malware detection. In this paper, we propose TrafficAV, which is an effective and explainable detection of mobile malware behavior using network traffic. Network traffic generated by mobile app is mirrored from the wireless access point to the server for data analysis. All data analysis and malware detection are performed on the server side, which consumes minimum resources on mobile devices without affecting the user experience. Due to the difficulty in identifying disparate malicious behaviors of malware from the network traffic, TrafficAV performs a multi-level network traffic analysis, gathering as many features of network traffic as necessary. The proposed method combines network traffic analysis with machine learning algorithm (C4.5 decision tree) that is capable of identifying Android malware with high accuracy. In an evaluation with 8,312 benign apps and 5,560 malware samples, TCP flow detection model and HTTP detection model all perform well and achieve detection rates of 98.16% and 99.65%, respectively. In addition, for the benefit of user, TrafficAV not only displays the final detection results, but also analyzes the behind-the-curtain reason of malicious results. This allows users to further investigate each feature's contribution in the final result, and to grasp the insights behind the final decision.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Lexicographical order Max-Min fair source quota allocation in mobile Delay-Tolerant Networks 移动容延迟网络中词典顺序最大最小公平源配额分配
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590424
Dongliang Xie, Xin Wang, Linhui Ma
There is a big potential to enable more efficient data dissemination in mobile Delay-Tolerant Networks (DTNs) with the concurrent use of multi-copy forwarding and social metrics. However, this also leads to the possibility of severely overloading the relay nodes with high social metrics, and consequent performance degradation. We propose a fair source quota allocation algorithm to effectively alleviate the load while ensuring their dissemination fairness, i.e, Lexicographical order Max-Min Fairness(LMMF). In this paper, A fair source quota allocation algorithm along with an implementation scheme was presented to take advantage of the features of social networks and social forwarding for higher delivery performance. Extensive simulations based on trace data demonstrate that our mechanism greatly reduces the delivery-ratio degradation caused by uneven load while ensuring fairness among the network users.
通过同时使用多副本转发和社交指标,在移动容忍延迟网络(DTNs)中实现更有效的数据传播具有很大的潜力。然而,这也可能导致具有高社交指标的中继节点严重超载,从而导致性能下降。我们提出了一种公平的源配额分配算法,在保证其传播公平性的同时有效地减轻负载,即字典顺序最大最小公平性(LMMF)。本文提出了一种公平的资源配额分配算法及其实现方案,以利用社交网络和社交转发的特点来提高分发性能。基于跟踪数据的大量模拟表明,我们的机制大大降低了由负载不均匀引起的投递率下降,同时确保了网络用户之间的公平性。
{"title":"Lexicographical order Max-Min fair source quota allocation in mobile Delay-Tolerant Networks","authors":"Dongliang Xie, Xin Wang, Linhui Ma","doi":"10.1109/IWQoS.2016.7590424","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590424","url":null,"abstract":"There is a big potential to enable more efficient data dissemination in mobile Delay-Tolerant Networks (DTNs) with the concurrent use of multi-copy forwarding and social metrics. However, this also leads to the possibility of severely overloading the relay nodes with high social metrics, and consequent performance degradation. We propose a fair source quota allocation algorithm to effectively alleviate the load while ensuring their dissemination fairness, i.e, Lexicographical order Max-Min Fairness(LMMF). In this paper, A fair source quota allocation algorithm along with an implementation scheme was presented to take advantage of the features of social networks and social forwarding for higher delivery performance. Extensive simulations based on trace data demonstrate that our mechanism greatly reduces the delivery-ratio degradation caused by uneven load while ensuring fairness among the network users.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Rate Guarantee for Coflow scheduling in network function virtualization 网络功能虚拟化中Coflow调度的数据速率保证
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590440
Jianhui Zhang, Keqiu Li, Deke Guo, Heng Qi, Xiaoyi Tao, Yingwei Jin
In data centers, a lot of cluster computing applications follow a coflow pattern. On the other hand, network function virtualization (NFV) sufficiently improves the performance of the data center network. However, coflows encounter extremely different processing delays under diverse network functions. Traditional coflow scheduling schemes become insufficient in this situation. Based on the observation that the benefit of coflows is closely related to the data rates of flows, we propose DRGC (Data Rate Guarantee for Coflow) to guarantee the data rate requirements of coflows in the NFV environment. We prioritize the scheduling sequence of coflows, precisely allocate data rates for individual flows, and design an efficient scheduling algorithm. DRGC maintains the desired data rates of coflows with higher priorities at middleboxes and leaves more scheduling opportunities to the ones with lower priorities. In the large-scale trace-driven experiment, DRGC efficiently guarantees the data rate requirements of coflows and supports more 15% workload, compared with other scheduling schemes.
在数据中心中,许多集群计算应用程序遵循coflow模式。另一方面,网络功能虚拟化(network function virtualization, NFV)充分提高了数据中心网络的性能。然而,在不同的网络功能下,共流的处理延迟差异很大。在这种情况下,传统的协同流调度方案显得有些不足。基于Coflow的效益与流的数据速率密切相关的观察,我们提出了DRGC (data Rate Guarantee for Coflow)来保证NFV环境下Coflow的数据速率要求。我们对协同流的调度顺序进行了优先级排序,精确地分配了各个流的数据速率,并设计了一种高效的调度算法。DRGC在中间盒中维护具有较高优先级的协同流所需的数据速率,并将更多的调度机会留给具有较低优先级的协同流。在大规模跟踪驱动实验中,与其他调度方案相比,DRGC有效地保证了协同流的数据速率要求,并支持15%以上的工作量。
{"title":"Data Rate Guarantee for Coflow scheduling in network function virtualization","authors":"Jianhui Zhang, Keqiu Li, Deke Guo, Heng Qi, Xiaoyi Tao, Yingwei Jin","doi":"10.1109/IWQoS.2016.7590440","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590440","url":null,"abstract":"In data centers, a lot of cluster computing applications follow a coflow pattern. On the other hand, network function virtualization (NFV) sufficiently improves the performance of the data center network. However, coflows encounter extremely different processing delays under diverse network functions. Traditional coflow scheduling schemes become insufficient in this situation. Based on the observation that the benefit of coflows is closely related to the data rates of flows, we propose DRGC (Data Rate Guarantee for Coflow) to guarantee the data rate requirements of coflows in the NFV environment. We prioritize the scheduling sequence of coflows, precisely allocate data rates for individual flows, and design an efficient scheduling algorithm. DRGC maintains the desired data rates of coflows with higher priorities at middleboxes and leaves more scheduling opportunities to the ones with lower priorities. In the large-scale trace-driven experiment, DRGC efficiently guarantees the data rate requirements of coflows and supports more 15% workload, compared with other scheduling schemes.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic resource scheduling in cloud radio access network with mobile cloud computing 基于移动云计算的云无线接入网动态资源调度
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590428
Xinhou Wang, Kezhi Wang, Song Wu, S. Di, Kun Yang, Hai Jin
Nowadays, by integrating the cloud radio access network (C-RAN) with the mobile cloud computing (MCC) technology, mobile service provider (MSP) can efficiently handle the increasing mobile traffic and enhance the capabilities of mobile users' devices to provide better quality of service (QoS). But the power consumption has become skyrocketing for MSP as it gravely affects the profit of MSP. Previous work often studied the power consumption in C-RAN and MCC separately while less work had considered the integration of C-RAN with MCC. In this paper, we present a unifying framework for optimizing the power-performance tradeoff of MSP by jointly scheduling network resources in C-RAN and computation resources in MCC to minimize the power consumption of MSP while still guaranteeing the QoS for mobile users. Our objective is to maximize the profit of MSP. To achieve this objective, we first formulate the resource scheduling issue as a stochastic problem and then propose a Resource onlIne sCHeduling (RICH) algorithm using Lyapunov optimization technique to approach a time average profit that is close to the optimum with a diminishing gap (1/V) for MSP while still maintaining strong system stability and low congestion to guarantee the QoS for mobile users. With extensive simulations, we demonstrate that the profit of RICH algorithm is 3.3× (18.4×) higher than that of active (random) algorithm.
目前,移动服务提供商(MSP)通过将云无线接入网(C-RAN)与移动云计算(MCC)技术相结合,可以有效地处理不断增长的移动流量,增强移动用户设备的能力,从而提供更好的服务质量(QoS)。但是MSP的耗电量却呈直线上升趋势,严重影响了MSP的利润。以往的工作多是分别研究C-RAN和MCC的功耗,很少考虑C-RAN与MCC的集成。本文提出了一种统一的框架,通过联合调度C-RAN中的网络资源和MCC中的计算资源来优化MSP的功率性能权衡,从而在保证移动用户QoS的同时最小化MSP的功耗。我们的目标是使MSP的利润最大化。为了实现这一目标,我们首先将资源调度问题描述为一个随机问题,然后利用Lyapunov优化技术提出了一种资源在线调度(RICH)算法,该算法在保持较强的系统稳定性和低拥塞的同时,逼近MSP的时间平均利润接近最优且差距(1/V)减小,以保证移动用户的QoS。通过大量的仿真,我们证明RICH算法的利润比主动(随机)算法高3.3倍(18.4倍)。
{"title":"Dynamic resource scheduling in cloud radio access network with mobile cloud computing","authors":"Xinhou Wang, Kezhi Wang, Song Wu, S. Di, Kun Yang, Hai Jin","doi":"10.1109/IWQoS.2016.7590428","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590428","url":null,"abstract":"Nowadays, by integrating the cloud radio access network (C-RAN) with the mobile cloud computing (MCC) technology, mobile service provider (MSP) can efficiently handle the increasing mobile traffic and enhance the capabilities of mobile users' devices to provide better quality of service (QoS). But the power consumption has become skyrocketing for MSP as it gravely affects the profit of MSP. Previous work often studied the power consumption in C-RAN and MCC separately while less work had considered the integration of C-RAN with MCC. In this paper, we present a unifying framework for optimizing the power-performance tradeoff of MSP by jointly scheduling network resources in C-RAN and computation resources in MCC to minimize the power consumption of MSP while still guaranteeing the QoS for mobile users. Our objective is to maximize the profit of MSP. To achieve this objective, we first formulate the resource scheduling issue as a stochastic problem and then propose a Resource onlIne sCHeduling (RICH) algorithm using Lyapunov optimization technique to approach a time average profit that is close to the optimum with a diminishing gap (1/V) for MSP while still maintaining strong system stability and low congestion to guarantee the QoS for mobile users. With extensive simulations, we demonstrate that the profit of RICH algorithm is 3.3× (18.4×) higher than that of active (random) algorithm.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Your trajectory privacy can be breached even if you walk in groups 即使你结伴行走,你的轨迹隐私也可能被侵犯
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590444
Kaixin Sui, Youjian Zhao, Dapeng Liu, Minghua Ma, Lei Xu, Zimu Li, Dan Pei
The enterprise Wi-Fi networks enable the collection of large-scale users' mobility information at an indoor level. The collected trajectory data is very valuable for both research and commercial purposes, but the use of the trajectory data also raises serious privacy concerns. A large body of work tries to achieve k-anonymity (hiding each user in an anonymity set no smaller than k) as the first step to solve the privacy problem. Yet it has been qualitatively recognized that k-anonymity is still risky when the diversity of the sensitive information in the k-anonymity set is low. There, however, still lacks a study that provides a quantitative understanding of that risk in the trajectory dataset. In this work, we present a large-scale measurement based analysis of the low-diversity risk over four weeks of trajectory data collected from Tsinghua, a campus that covers an area of 4 km2, on which 2,670 access points are deployed in 111 buildings. Using this dataset, we highlight the high risk of the low diversity. For example, we find that even when 5-anonymity is satisfied, the sensitive attributes of 25% of individuals can be easily guessed. We also find that although a larger k increases the size of anonymity sets, the corresponding improvement on the diversity of anonymity sets is very limited (decayed exponentially). These results suggest that diversity-oriented solutions are necessary.
企业Wi-Fi网络可以在室内收集大规模用户的移动信息。收集的轨迹数据对于研究和商业目的都非常有价值,但轨迹数据的使用也引起了严重的隐私问题。大量的工作试图实现k-匿名(将每个用户隐藏在不小于k的匿名集中)作为解决隐私问题的第一步。然而,定性地认识到,当k-匿名集中敏感信息的多样性较低时,k-匿名仍然是有风险的。然而,目前仍缺乏对轨迹数据集中这种风险进行定量理解的研究。在这项工作中,我们对从清华大学收集的4周轨迹数据进行了大规模测量,分析了低多样性风险。清华大学占地4平方公里,在111栋建筑中部署了2670个接入点。利用该数据集,我们突出了低多样性的高风险。例如,我们发现,即使满足5匿名性,25%的个体的敏感属性也可以很容易地猜出来。我们还发现,虽然较大的k增加了匿名集的大小,但对匿名集多样性的相应改善非常有限(呈指数衰减)。这些结果表明,以多样性为导向的解决方案是必要的。
{"title":"Your trajectory privacy can be breached even if you walk in groups","authors":"Kaixin Sui, Youjian Zhao, Dapeng Liu, Minghua Ma, Lei Xu, Zimu Li, Dan Pei","doi":"10.1109/IWQoS.2016.7590444","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590444","url":null,"abstract":"The enterprise Wi-Fi networks enable the collection of large-scale users' mobility information at an indoor level. The collected trajectory data is very valuable for both research and commercial purposes, but the use of the trajectory data also raises serious privacy concerns. A large body of work tries to achieve k-anonymity (hiding each user in an anonymity set no smaller than k) as the first step to solve the privacy problem. Yet it has been qualitatively recognized that k-anonymity is still risky when the diversity of the sensitive information in the k-anonymity set is low. There, however, still lacks a study that provides a quantitative understanding of that risk in the trajectory dataset. In this work, we present a large-scale measurement based analysis of the low-diversity risk over four weeks of trajectory data collected from Tsinghua, a campus that covers an area of 4 km2, on which 2,670 access points are deployed in 111 buildings. Using this dataset, we highlight the high risk of the low diversity. For example, we find that even when 5-anonymity is satisfied, the sensitive attributes of 25% of individuals can be easily guessed. We also find that although a larger k increases the size of anonymity sets, the corresponding improvement on the diversity of anonymity sets is very limited (decayed exponentially). These results suggest that diversity-oriented solutions are necessary.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Coverage and distinguishability requirements for Traffic Flow Monitoring Systems 交通流量监测系统的覆盖范围和可识别性要求
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590432
Huanyang Zheng, Wei Chang, Jie Wu
Traffic flow monitoring systems aim to measure and monitor vehicle trajectories in smart cities. Their critical applications include vehicle theft prevention, vehicle localization, and traffic congestion solution. This paper studies an RoadSide Unit (RSU) placement problem in traffic flow monitoring systems. Given some traffic flows on streets, the objective is to place a minimum number of RSUs to cover and distinguish all traffic flows. A traffic flow is covered and distinguishable, if the set of its passing RSUs is non-empty and unique among all traffic flows. The RSU placement problem is NP-hard, monotonic, and non-submodular. It is a non-trivial extension of the traditional set cover problem that is submodular. We show that, to cover and distinguish an arbitrary pair of traffic flows (f and f'), two RSUs should be placed on streets from two different subsets of ff', f'f, and f ∩ f'. Three bounded RSU placement algorithms are proposed. Their approximation ratios are n ln n(n-1)/2 , n+1/2 ln 3n(n-1)/2, and ln n(n+1)/2, respectively. Here, ri is the number of given traffic flows. Extensive real data-driven experiments demonstrate the efficiency and effectiveness of the proposed algorithms.
交通流量监控系统旨在测量和监控智能城市中的车辆轨迹。它们的关键应用包括车辆防盗、车辆定位和交通拥堵解决方案。本文研究了交通流监控系统中路边单元(RSU)的配置问题。给定街道上的一些交通流量,目标是放置最小数量的rsu来覆盖和区分所有交通流量。如果一个交通流通过的rsu集合非空且在所有交通流中唯一,则该交通流被覆盖且可区分。RSU放置问题是np困难的、单调的、非子模的。它是传统集覆盖问题的非平凡推广,具有子模性。我们证明,为了覆盖和区分任意一对交通流(f和f'),应该在来自ff'、f'f和f∩f'的两个不同子集的街道上放置两个rsu。提出了三种有界RSU放置算法。它们的近似比分别是n ln n(n-1)/2, n+1/2 ln 3n(n-1)/2,和ln n(n+1)/2。这里,ri是给定交通流的数量。大量的真实数据驱动实验证明了所提出算法的效率和有效性。
{"title":"Coverage and distinguishability requirements for Traffic Flow Monitoring Systems","authors":"Huanyang Zheng, Wei Chang, Jie Wu","doi":"10.1109/IWQoS.2016.7590432","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590432","url":null,"abstract":"Traffic flow monitoring systems aim to measure and monitor vehicle trajectories in smart cities. Their critical applications include vehicle theft prevention, vehicle localization, and traffic congestion solution. This paper studies an RoadSide Unit (RSU) placement problem in traffic flow monitoring systems. Given some traffic flows on streets, the objective is to place a minimum number of RSUs to cover and distinguish all traffic flows. A traffic flow is covered and distinguishable, if the set of its passing RSUs is non-empty and unique among all traffic flows. The RSU placement problem is NP-hard, monotonic, and non-submodular. It is a non-trivial extension of the traditional set cover problem that is submodular. We show that, to cover and distinguish an arbitrary pair of traffic flows (f and f'), two RSUs should be placed on streets from two different subsets of ff', f'f, and f ∩ f'. Three bounded RSU placement algorithms are proposed. Their approximation ratios are n ln n(n-1)/2 , n+1/2 ln 3n(n-1)/2, and ln n(n+1)/2, respectively. Here, ri is the number of given traffic flows. Extensive real data-driven experiments demonstrate the efficiency and effectiveness of the proposed algorithms.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124281947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
FDRC - Flow duration time based rate control in data center networks 数据中心网络中基于流量持续时间的速率控制
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590392
Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang, Yingya Guo
Data Center is now becoming an important facility for many applications (e.g, web search and retail). As TCP can't meet applications' demands for latency and throughput, many tcp-based protocols (e.g, DCTCP, D2TCP, L2DCT) have been proposed. Among them, protocols such as D2TCP incorporate explicit deadline into congestion window adjustment procedure to guarantee flows' latency and protocols such as L2DCT consider flow size when computing congestion window adjustment factor to guarantee the throughput of short flows. These two methods work well at some scenery but they have some deficiencies on two aspects. Firstly, we find that they can only reduce the percentage of flows missing deadline or reduce flow completion time, but can not meet both the goals simultaneously. Secondly, most of these methods need the user to know flow information (e.g, deadline, flow size), which may be hard to know exact value beforehand. In this paper, we advocate to use flow duration time into congestion window adjustment procedure. Based on this, we propose FDRC-Flow Duration Time based Rate Control algorithm. We find that without knowing flow information beforehand, FDRC can achieve the goal of reducing the percentage of flows missing deadline and cutting average flow completion time simultaneously. We theoretically analyze FDRC's behavior and implement FDRC into ns-2 as well as linux kernel. Our experiments show that FDRC performs better than D2TCP and L2DCT at nearly all the scenarios. On average, it performs 30% better than the state-of-art deadline-aware congestion control protocol D2TCP and 10% better than the state-of-art flowsize-aware protocol L2DCT.
数据中心现在正在成为许多应用程序(例如,网络搜索和零售)的重要设施。由于TCP不能满足应用程序对延迟和吞吐量的要求,因此提出了许多基于TCP的协议(如DCTCP、D2TCP、L2DCT)。其中,D2TCP等协议在拥塞窗口调整过程中加入了明确的截止时间,保证了流的时延;L2DCT等协议在计算拥塞窗口调整因子时考虑了流的大小,保证了短流的吞吐量。这两种方法在某些场景上效果良好,但在两个方面存在不足。首先,我们发现它们只能降低流错过截止日期的百分比或减少流完成时间,而不能同时满足这两个目标。其次,这些方法大多需要用户知道流量信息(如截止日期,流量大小),这可能很难事先知道确切的值。在本文中,我们提倡将流量持续时间引入到拥塞窗口的调整过程中。在此基础上,提出了基于FDRC-Flow Duration Time的速率控制算法。我们发现,在不事先知道流量信息的情况下,FDRC可以同时达到减少流量错过截止日期百分比和减少平均流量完成时间的目标。从理论上分析了FDRC的行为,并在ns-2和linux内核中实现了FDRC。我们的实验表明,在几乎所有场景下,FDRC的性能都优于D2TCP和L2DCT。平均而言,它的性能比最先进的截止日期感知拥塞控制协议D2TCP好30%,比最先进的流量感知协议L2DCT好10%。
{"title":"FDRC - Flow duration time based rate control in data center networks","authors":"Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang, Yingya Guo","doi":"10.1109/IWQoS.2016.7590392","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590392","url":null,"abstract":"Data Center is now becoming an important facility for many applications (e.g, web search and retail). As TCP can't meet applications' demands for latency and throughput, many tcp-based protocols (e.g, DCTCP, D2TCP, L2DCT) have been proposed. Among them, protocols such as D2TCP incorporate explicit deadline into congestion window adjustment procedure to guarantee flows' latency and protocols such as L2DCT consider flow size when computing congestion window adjustment factor to guarantee the throughput of short flows. These two methods work well at some scenery but they have some deficiencies on two aspects. Firstly, we find that they can only reduce the percentage of flows missing deadline or reduce flow completion time, but can not meet both the goals simultaneously. Secondly, most of these methods need the user to know flow information (e.g, deadline, flow size), which may be hard to know exact value beforehand. In this paper, we advocate to use flow duration time into congestion window adjustment procedure. Based on this, we propose FDRC-Flow Duration Time based Rate Control algorithm. We find that without knowing flow information beforehand, FDRC can achieve the goal of reducing the percentage of flows missing deadline and cutting average flow completion time simultaneously. We theoretically analyze FDRC's behavior and implement FDRC into ns-2 as well as linux kernel. Our experiments show that FDRC performs better than D2TCP and L2DCT at nearly all the scenarios. On average, it performs 30% better than the state-of-art deadline-aware congestion control protocol D2TCP and 10% better than the state-of-art flowsize-aware protocol L2DCT.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1