首页 > 最新文献

2016 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Robust scheme to protect authentication code of message/image documents in cloud computing 云计算中消息/图像文档认证码保护的鲁棒方案
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440585
Z. Abduljabbar, Hai Jin, A. Yassin, Z. Hussien, M. Hussain, Salah H. Abbdal, Deqing Zou
A number of image/message document authentication and integrity schemes have been conducted to recognize any modification in the exchange of documents between two entities (sender and receiver) within a cloud environment. Existing solutions are based on combining key-based hash function with traditional factors (steganography, smart-card, timestamp). However, none of the proposed schemes appear to be sufficiently designed as a secure scheme to prevent common forms of attack such as replay, forgery, stolen verifier, brute force, and insider attacks. In this paper, we propose a scheme to ensure message/image document integrity for each user's login by providing one-time biometric message/image authentication code called MACLESS, which is a summation of combining the key-based hash function (MAC-SHA-1) of a message/image document and the one-time bio-key. Thereafter, MACLESS is hidden in a cover image based steganography anonymity. The proposed scheme has several important security attributes, such as phase key agreement, users' one-time bio-key, and one-time authentication code is valid only for one user's login session. Finally, security analysis and experimental results demonstrate and prove the invulnerability and efficiency of the proposed scheme.
已经实施了许多图像/消息文档身份验证和完整性方案,以识别云环境中两个实体(发送方和接收方)之间的文档交换中的任何修改。现有的解决方案是将基于密钥的哈希函数与传统因素(隐写、智能卡、时间戳)相结合。然而,所有提议的方案似乎都没有被充分设计成一个安全的方案,以防止常见的攻击形式,如重放、伪造、被盗验证器、暴力破解和内部攻击。在本文中,我们提出了一种方案,通过提供称为MACLESS的一次性生物识别消息/图像认证代码来确保每个用户登录的消息/图像文档的完整性,该代码是消息/图像文档的基于密钥的哈希函数(MAC-SHA-1)和一次性生物密钥的总和。此后,MACLESS被隐藏在基于隐写匿名的封面图像中。该方案具有几个重要的安全属性,如阶段密钥协议、用户一次性生物密钥和一次性认证码仅对一个用户的登录会话有效。最后,安全性分析和实验结果验证了该方案的安全性和有效性。
{"title":"Robust scheme to protect authentication code of message/image documents in cloud computing","authors":"Z. Abduljabbar, Hai Jin, A. Yassin, Z. Hussien, M. Hussain, Salah H. Abbdal, Deqing Zou","doi":"10.1109/ICCNC.2016.7440585","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440585","url":null,"abstract":"A number of image/message document authentication and integrity schemes have been conducted to recognize any modification in the exchange of documents between two entities (sender and receiver) within a cloud environment. Existing solutions are based on combining key-based hash function with traditional factors (steganography, smart-card, timestamp). However, none of the proposed schemes appear to be sufficiently designed as a secure scheme to prevent common forms of attack such as replay, forgery, stolen verifier, brute force, and insider attacks. In this paper, we propose a scheme to ensure message/image document integrity for each user's login by providing one-time biometric message/image authentication code called MACLESS, which is a summation of combining the key-based hash function (MAC-SHA-1) of a message/image document and the one-time bio-key. Thereafter, MACLESS is hidden in a cover image based steganography anonymity. The proposed scheme has several important security attributes, such as phase key agreement, users' one-time bio-key, and one-time authentication code is valid only for one user's login session. Finally, security analysis and experimental results demonstrate and prove the invulnerability and efficiency of the proposed scheme.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reducing queuing delays through VoAP 通过VoAP减少排队延迟
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440548
C. Palazzi, Armir Bujari, S. Mirri
Cloud-based entertainment is becoming a hot topic for researchers and practitioners. In this context, thin client or cloud based gaming promise to attract users with the possibility to dematerialize the console and let the user play any possible game for any platform through the Internet. Basically, the computational burden is left to the cloud while the user enjoys a fat video feed accessed through her/his thin client via the shared wireless gateway. Unfortunately, this model of interaction also raises new complex technical issues that requires specific networking solutions. In this short paper we aim at addressing the heterogeneous flow coexistence problem at the home wireless gateway. We propose a solution based on a TCP Vegas-like congestion control algorithm deployed on top of the home gateway. Our solution works out of the box with the standard protocols at server, router and client level, thereby making deployment straightforward.
基于云的娱乐正在成为研究人员和从业者的热门话题。在这种情况下,瘦客户端或基于云的游戏有望通过非物质化主机的可能性来吸引用户,让用户通过互联网在任何平台上玩任何可能的游戏。基本上,计算负担留给了云,而用户则通过共享无线网关通过他/他的瘦客户机享受访问胖视频提要。不幸的是,这种交互模型也提出了新的复杂技术问题,需要特定的网络解决方案。本文旨在解决家庭无线网关中的异构流共存问题。我们提出了一种基于部署在家庭网关之上的TCP类维加斯拥塞控制算法的解决方案。我们的解决方案使用服务器、路由器和客户端级别的标准协议开箱即用,从而使部署变得简单明了。
{"title":"Reducing queuing delays through VoAP","authors":"C. Palazzi, Armir Bujari, S. Mirri","doi":"10.1109/ICCNC.2016.7440548","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440548","url":null,"abstract":"Cloud-based entertainment is becoming a hot topic for researchers and practitioners. In this context, thin client or cloud based gaming promise to attract users with the possibility to dematerialize the console and let the user play any possible game for any platform through the Internet. Basically, the computational burden is left to the cloud while the user enjoys a fat video feed accessed through her/his thin client via the shared wireless gateway. Unfortunately, this model of interaction also raises new complex technical issues that requires specific networking solutions. In this short paper we aim at addressing the heterogeneous flow coexistence problem at the home wireless gateway. We propose a solution based on a TCP Vegas-like congestion control algorithm deployed on top of the home gateway. Our solution works out of the box with the standard protocols at server, router and client level, thereby making deployment straightforward.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130834486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal energy-efficient multichannel cognitive radio with primary energy harvesting 具有一次能量收集的最优节能多通道认知无线电
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440559
Xin Liu, Junhua Yan
We consider an energy-efficient multichannel cognitive radio (CR) where the secondary user (SU) can harvest the signal energy from the primary user (PU). The goal is to determine an optimal joint spectrum sensing and transmission power allocation that maximizes the average throughput of the multichannel SU subject to the constraints of sensing probabilities, interference power and total transmission power. The allocation scheme is formulated as a joint optimization problem, whose optimal solution is obtained through the joint optimization algorithm based on alternating direction optimization. Analytical and numerical results show that the proposed energy-efficient CR outperforms the traditional CR without energy harvesting and the transmission power of the energy-efficient CR improves both with the increasing of the spectrum sensing time and the presence probability of the PU.
我们考虑了一种节能的多通道认知无线电(CR),其中辅助用户(SU)可以从主用户(PU)那里获取信号能量。目标是确定在感知概率、干扰功率和总发射功率约束下,使多通道SU的平均吞吐量最大化的最佳联合频谱感知和发射功率分配。将分配方案制定为一个联合优化问题,通过基于交替方向优化的联合优化算法得到其最优解。分析和数值结果表明,所提节能CR优于无能量收集的传统CR,且随着频谱感知时间的增加和PU存在概率的增加,节能CR的传输功率均有所提高。
{"title":"Optimal energy-efficient multichannel cognitive radio with primary energy harvesting","authors":"Xin Liu, Junhua Yan","doi":"10.1109/ICCNC.2016.7440559","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440559","url":null,"abstract":"We consider an energy-efficient multichannel cognitive radio (CR) where the secondary user (SU) can harvest the signal energy from the primary user (PU). The goal is to determine an optimal joint spectrum sensing and transmission power allocation that maximizes the average throughput of the multichannel SU subject to the constraints of sensing probabilities, interference power and total transmission power. The allocation scheme is formulated as a joint optimization problem, whose optimal solution is obtained through the joint optimization algorithm based on alternating direction optimization. Analytical and numerical results show that the proposed energy-efficient CR outperforms the traditional CR without energy harvesting and the transmission power of the energy-efficient CR improves both with the increasing of the spectrum sensing time and the presence probability of the PU.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controller placement algorithm to alleviate burdens on communication nodes 控制器放置算法,减轻通信节点的负担
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440618
Genya Ishigaki, N. Shinomiya
This paper proposes an algorithm to determine a controller location on a given network considering burdens of all communication nodes. The burden is defined by extending stress centrality, which indicates a load of each node based on the number of edge disjoint paths. In order to analyze characteristics of the proposed placement algorithm, our simulations compare it with other placement algorithms and the theoretically optimum values in terms of node burdens, latency, survivability and path stability.
本文提出了一种考虑网络中所有通信节点负荷的控制器位置确定算法。负荷是通过扩展应力中心性来定义的,它表示基于边缘不相交路径数的每个节点的负荷。为了分析所提出的布局算法的特点,我们将其与其他布局算法进行了仿真比较,并在节点负担、延迟、生存能力和路径稳定性方面与理论最优值进行了比较。
{"title":"Controller placement algorithm to alleviate burdens on communication nodes","authors":"Genya Ishigaki, N. Shinomiya","doi":"10.1109/ICCNC.2016.7440618","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440618","url":null,"abstract":"This paper proposes an algorithm to determine a controller location on a given network considering burdens of all communication nodes. The burden is defined by extending stress centrality, which indicates a load of each node based on the number of edge disjoint paths. In order to analyze characteristics of the proposed placement algorithm, our simulations compare it with other placement algorithms and the theoretically optimum values in terms of node burdens, latency, survivability and path stability.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A dynamic forward error control scheme for video streaming over wireless networks 一种无线网络视频流的动态前向误差控制方案
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440605
E. Weyulu, G. Lusilao-Zodi
Wireless networks have dynamic transmission properties as the wireless channel conditions randomly change over time due to several environmental factors. When transmitting real-time applications such as video, the dynamic properties of wireless networks can have detrimental effects on the quality of the video delivered to a user. Many Quality of Service (QoS) guarantee techniques to improve video quality in wireless networks are available. However, these mainly focus on traffic shaping based on bandwidth requirements and prioritization and do not take into account the effects a changing wireless channel might have on the transmitted video. With an increasing amount of video applications being transmitted over wireless networks, alternative methods to provide QoS guarantees should be investigated. This research proposes an adaptive Forward Error Control (FEC) mechanism that dynamically adjusts the number of error control packets based on the traffic load in the network and the state of the wireless channel. When the wireless channel is bad, such as during a rain storm, the proposed mechanism reduces the amount of FEC packets added thereby reducing computational overhead in the network. This enables the receiver to recover the information sent by the transmitter faster with fewer errors than it otherwise would. Simulation results using video trace files show an improvement over existing solutions in terms of the number of FEC packets added while overall the user-perceived quality of the video streaming session is maintained at the same level, even when the network is experiencing a high Packet Error Rate (PER).
由于多种环境因素的影响,无线信道条件随时间随机变化,无线网络具有动态传输特性。在传输实时应用程序(如视频)时,无线网络的动态特性会对传输给用户的视频质量产生不利影响。为了提高无线网络的视频质量,有许多服务质量(QoS)保证技术。然而,这些主要关注基于带宽需求和优先级的流量塑造,而没有考虑到变化的无线信道可能对传输的视频产生的影响。随着越来越多的视频应用程序通过无线网络传输,应该研究提供QoS保证的替代方法。本研究提出了一种自适应前向错误控制(FEC)机制,该机制可以根据网络中的业务负载和无线信道的状态动态调整错误控制包的数量。当无线信道条件恶劣时,例如在暴风雨期间,所提出的机制减少了FEC数据包的添加量,从而减少了网络中的计算开销。这使得接收端能够以更快的速度恢复发送端发送的信息,并且错误比其他方式要少。使用视频跟踪文件的仿真结果显示,在添加FEC数据包的数量方面,比现有解决方案有了改进,同时用户感知的视频流会话质量总体上保持在同一水平,即使在网络经历高数据包错误率(PER)时也是如此。
{"title":"A dynamic forward error control scheme for video streaming over wireless networks","authors":"E. Weyulu, G. Lusilao-Zodi","doi":"10.1109/ICCNC.2016.7440605","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440605","url":null,"abstract":"Wireless networks have dynamic transmission properties as the wireless channel conditions randomly change over time due to several environmental factors. When transmitting real-time applications such as video, the dynamic properties of wireless networks can have detrimental effects on the quality of the video delivered to a user. Many Quality of Service (QoS) guarantee techniques to improve video quality in wireless networks are available. However, these mainly focus on traffic shaping based on bandwidth requirements and prioritization and do not take into account the effects a changing wireless channel might have on the transmitted video. With an increasing amount of video applications being transmitted over wireless networks, alternative methods to provide QoS guarantees should be investigated. This research proposes an adaptive Forward Error Control (FEC) mechanism that dynamically adjusts the number of error control packets based on the traffic load in the network and the state of the wireless channel. When the wireless channel is bad, such as during a rain storm, the proposed mechanism reduces the amount of FEC packets added thereby reducing computational overhead in the network. This enables the receiver to recover the information sent by the transmitter faster with fewer errors than it otherwise would. Simulation results using video trace files show an improvement over existing solutions in terms of the number of FEC packets added while overall the user-perceived quality of the video streaming session is maintained at the same level, even when the network is experiencing a high Packet Error Rate (PER).","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"30 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120965452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BAN-trust: An attack-resilient malicious node detection scheme for body area networks BAN-trust:一种抗攻击的体域网络恶意节点检测方案
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440651
Wenjia Li, Xianshu Zhu
Body area networks (BAN) has recently emerged as an important enabling technology to support various telehealth applications. Because of its unique application domain, it is critical to ensure the secure and reliable gathering of patient's physiological signs. However, most of the existing security solutions for BANs focus on using encryption techniques to secure the data transmission or provide authentication. On the other hand, it is well understood that BANs are also extremely vulnerable to various malicious attacks, which have not attracted abundant research attention so far. In this paper, an attack-resilient malicious node detection scheme (BAN-Trust) is proposed for wireless body area networks that is able to detect and cope with malicious attacks in BANs. The effectiveness and efficiency of the proposed BAN-Trust scheme is validated through extensive experiments.
体域网络(BAN)最近成为支持各种远程医疗应用的重要使能技术。由于其独特的应用领域,确保患者生理体征的安全可靠采集至关重要。然而,现有的ban安全解决方案大多侧重于使用加密技术来保护数据传输或提供身份验证。另一方面,众所周知,ban也极易受到各种恶意攻击,迄今为止还没有引起足够的研究关注。本文提出了一种针对无线体域网络的抗攻击恶意节点检测方案(BAN-Trust),该方案能够检测和应对ban中的恶意攻击。通过大量实验验证了所提出的BAN-Trust方案的有效性和高效性。
{"title":"BAN-trust: An attack-resilient malicious node detection scheme for body area networks","authors":"Wenjia Li, Xianshu Zhu","doi":"10.1109/ICCNC.2016.7440651","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440651","url":null,"abstract":"Body area networks (BAN) has recently emerged as an important enabling technology to support various telehealth applications. Because of its unique application domain, it is critical to ensure the secure and reliable gathering of patient's physiological signs. However, most of the existing security solutions for BANs focus on using encryption techniques to secure the data transmission or provide authentication. On the other hand, it is well understood that BANs are also extremely vulnerable to various malicious attacks, which have not attracted abundant research attention so far. In this paper, an attack-resilient malicious node detection scheme (BAN-Trust) is proposed for wireless body area networks that is able to detect and cope with malicious attacks in BANs. The effectiveness and efficiency of the proposed BAN-Trust scheme is validated through extensive experiments.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GreenTCAM: A memory- and energy-efficient TCAM-based packet classification GreenTCAM:一种基于内存和高能效tcam的数据包分类方法
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440722
Xianfeng Li, Yuanxin Lin, Wen J. Li
Ternary Content Addressable Memory (TCAM) is the de-facto standard device used for high-speed packet classification. Despite its capability for line-speed queries, it is very power hungry and area inefficient The latest TCAM devices by leading vendors come with an power saving mechanism where a subset of its TCAM blocks can be selectively activated. Recent research efforts exploit this feature to reduce power consumption with pre-classification steps. However, the state-of-the-art technique achieves power savings at the expense of poor utilization of TCAM capacity, and the potential of power reduction is not fully exploited in many cases. In this paper, we propose GreenTCAM, an optimized two-stage design for TCAM-based packet classification. Based on common characteristics of rule sets, our design is able to group rules more compactly into TCAM blocks, and activates a minimum subset of these blocks for each incoming packet. Experimental results show that our design achieves a 93.6% power reduction with a TCAM storage overhead of only 5.6% on average.
三元内容可寻址存储器(TCAM)是用于高速分组分类的事实上的标准设备。尽管它具有线速查询的能力,但它非常耗电且面积低。领先供应商的最新TCAM设备具有一种省电机制,可以选择性地激活其TCAM块的子集。最近的研究工作利用这一特性,通过预分类步骤来降低功耗。然而,最先进的技术以TCAM容量利用率低下为代价实现了节能,并且在许多情况下,功耗降低的潜力没有得到充分利用。在本文中,我们提出了一种优化的基于tcam的分组分类的两阶段设计——greencam。基于规则集的共同特征,我们的设计能够更紧凑地将规则分组到TCAM块中,并为每个传入数据包激活这些块的最小子集。实验结果表明,我们的设计实现了93.6%的功耗降低,TCAM存储开销平均仅为5.6%。
{"title":"GreenTCAM: A memory- and energy-efficient TCAM-based packet classification","authors":"Xianfeng Li, Yuanxin Lin, Wen J. Li","doi":"10.1109/ICCNC.2016.7440722","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440722","url":null,"abstract":"Ternary Content Addressable Memory (TCAM) is the de-facto standard device used for high-speed packet classification. Despite its capability for line-speed queries, it is very power hungry and area inefficient The latest TCAM devices by leading vendors come with an power saving mechanism where a subset of its TCAM blocks can be selectively activated. Recent research efforts exploit this feature to reduce power consumption with pre-classification steps. However, the state-of-the-art technique achieves power savings at the expense of poor utilization of TCAM capacity, and the potential of power reduction is not fully exploited in many cases. In this paper, we propose GreenTCAM, an optimized two-stage design for TCAM-based packet classification. Based on common characteristics of rule sets, our design is able to group rules more compactly into TCAM blocks, and activates a minimum subset of these blocks for each incoming packet. Experimental results show that our design achieves a 93.6% power reduction with a TCAM storage overhead of only 5.6% on average.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Walking with Geo-Zombie: A pervasive game to engage people in urban crowdsourcing Walking with Geo-Zombie:一款让人们参与城市众包的普及游戏
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440545
Catia Prandi, P. Salomoni, M. Roccetti, Valentina Nisi, N. Nunes
In this paper we present results gathered from field trials while using a pervasive game, called Geo-Zombie. It intermixes reality with virtual zombies, providing a game experience to be lived in the urban environment. Geo-Zombie is designed for a specific goal: engaging people in collecting geo-referenced data about urban accessibility. The game has been designed with the aim to involve a large number of players/volunteers in the activity of signaling urban barriers while walking. To get ammo to react to a zombie attack, in fact, players can sense/map (crowdsensing) urban barriers and facilities and transmit those information back to an operative center (crowdsourcing). With the aim to assess the efficacy of Geo-Zombie, we conducted real experiments contrasting three different mobile apps, specifically designed to: i) simply collect urban information without providing any gaming experience (Basic), ii) reward volunteers that participate in the crowdsourcing activity (Reward), and iii) provide fun and entertainment to players who contribute (Geo-Zombie). We here provide results along two different perspectives: a quantitative one (e.g., number of collected data and similar) and a qualitative one (i.e., the players' experience). These results confirm the feasibility and suitability of our approach and stimulate interesting discussions.
在这篇论文中,我们展示了使用一种名为Geo-Zombie的普遍游戏进行实地试验的结果。它将现实与虚拟僵尸相结合,提供了一种生活在城市环境中的游戏体验。Geo-Zombie是为一个特定的目标而设计的:吸引人们收集有关城市可达性的地理参考数据。这个游戏的设计目的是让大量的玩家/志愿者在步行时参与到城市障碍物的信号活动中。事实上,为了获得应对僵尸攻击的弹药,玩家可以感知/绘制城市障碍和设施的地图,并将这些信息传送回操作中心(众包)。为了评估Geo-Zombie的功效,我们进行了真实的实验,对比了三种不同的移动应用程序,专门设计为:i)简单地收集城市信息而不提供任何游戏体验(基本),ii)奖励参与众包活动的志愿者(奖励),以及iii)为贡献的玩家提供乐趣和娱乐(Geo-Zombie)。我们在此提供两个不同视角的结果:定量视角(如收集数据的数量等)和定性视角(如玩家体验)。这些结果证实了我们的方法的可行性和适用性,并激发了有趣的讨论。
{"title":"Walking with Geo-Zombie: A pervasive game to engage people in urban crowdsourcing","authors":"Catia Prandi, P. Salomoni, M. Roccetti, Valentina Nisi, N. Nunes","doi":"10.1109/ICCNC.2016.7440545","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440545","url":null,"abstract":"In this paper we present results gathered from field trials while using a pervasive game, called Geo-Zombie. It intermixes reality with virtual zombies, providing a game experience to be lived in the urban environment. Geo-Zombie is designed for a specific goal: engaging people in collecting geo-referenced data about urban accessibility. The game has been designed with the aim to involve a large number of players/volunteers in the activity of signaling urban barriers while walking. To get ammo to react to a zombie attack, in fact, players can sense/map (crowdsensing) urban barriers and facilities and transmit those information back to an operative center (crowdsourcing). With the aim to assess the efficacy of Geo-Zombie, we conducted real experiments contrasting three different mobile apps, specifically designed to: i) simply collect urban information without providing any gaming experience (Basic), ii) reward volunteers that participate in the crowdsourcing activity (Reward), and iii) provide fun and entertainment to players who contribute (Geo-Zombie). We here provide results along two different perspectives: a quantitative one (e.g., number of collected data and similar) and a qualitative one (i.e., the players' experience). These results confirm the feasibility and suitability of our approach and stimulate interesting discussions.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
On the feasibility of machine learning as a tool for automatic security classification: A position paper 关于机器学习作为自动安全分类工具的可行性:立场文件
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440588
A. Yazidi, H. Hammer, A. Bai, P. Engelstad
With the proliferation of threats of leakage of sensitive information such as military classified documents, information guards have recently gained increased interest. An information guard is merely a filter than controls the content of the exchanged information between two domains where one of them has a higher confidentiality level than the other one. The main role of an information guard is to block leakage of the sensitive information from the higher confidentiality domain to the lower confidentiality domain. An example of a higher confidentiality domain is a military network while a subcontractor network is an example of a lower confidentiality domain. The common practice is to use an automatic information guard based on predefined list of words that is called "dirty word list" in order to decide the security level of a document and consequently release it to the lower confidentially domain or block it. Traditional information guards are configured manually based on the notion of "Dirty Lists". The classification logic of traditional information guards uses the occurrence of words from the "Dirty Lists". In this paper, we advocate the use of machine learning as a corner stone for building advanced information guards. Machine learning can also be used as a supplement to the decision obtained based on "Dirty Lists" classification. Machine learning has hardly been analysed for this problem, and the analysis on topical classification presented here provides new knowledge and a basis for further work within this area. Ten different machine learning algorithms were applied on real life data from a military context. Presented results are promising and demonstrates that machine learning can become a useful tool to assist humans in determining the appropriate security label of an information object.
最近,随着军事机密文件等敏感信息泄露威胁的扩散,信息警卫受到了越来越多的关注。信息保护仅仅是一个过滤器,它控制两个域之间交换信息的内容,其中一个域比另一个域具有更高的机密级别。信息防护的主要作用是阻止敏感信息从高机密域向低机密域泄露。较高机密域的一个例子是军事网络,而分包商网络是较低机密域的一个例子。通常的做法是使用基于预定义的单词列表(称为“脏单词列表”)的自动信息保护来确定文档的安全级别,从而将其释放到较低的机密域或阻止它。传统的信息保护是基于“脏列表”的概念手动配置的。传统信息防护的分类逻辑是利用“脏表”中单词的出现情况。在本文中,我们提倡使用机器学习作为构建高级信息防护的基石。机器学习也可以作为基于“Dirty Lists”分类得到的决策的补充。机器学习几乎没有针对这个问题进行分析,本文对主题分类的分析为该领域的进一步工作提供了新的知识和基础。十种不同的机器学习算法应用于军事背景下的真实生活数据。所呈现的结果是有希望的,并且表明机器学习可以成为帮助人类确定信息对象的适当安全标签的有用工具。
{"title":"On the feasibility of machine learning as a tool for automatic security classification: A position paper","authors":"A. Yazidi, H. Hammer, A. Bai, P. Engelstad","doi":"10.1109/ICCNC.2016.7440588","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440588","url":null,"abstract":"With the proliferation of threats of leakage of sensitive information such as military classified documents, information guards have recently gained increased interest. An information guard is merely a filter than controls the content of the exchanged information between two domains where one of them has a higher confidentiality level than the other one. The main role of an information guard is to block leakage of the sensitive information from the higher confidentiality domain to the lower confidentiality domain. An example of a higher confidentiality domain is a military network while a subcontractor network is an example of a lower confidentiality domain. The common practice is to use an automatic information guard based on predefined list of words that is called \"dirty word list\" in order to decide the security level of a document and consequently release it to the lower confidentially domain or block it. Traditional information guards are configured manually based on the notion of \"Dirty Lists\". The classification logic of traditional information guards uses the occurrence of words from the \"Dirty Lists\". In this paper, we advocate the use of machine learning as a corner stone for building advanced information guards. Machine learning can also be used as a supplement to the decision obtained based on \"Dirty Lists\" classification. Machine learning has hardly been analysed for this problem, and the analysis on topical classification presented here provides new knowledge and a basis for further work within this area. Ten different machine learning algorithms were applied on real life data from a military context. Presented results are promising and demonstrates that machine learning can become a useful tool to assist humans in determining the appropriate security label of an information object.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123749793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the effects of battery imperfections in an energy harvesting device 能量收集装置中电池缺陷的影响
Pub Date : 2016-03-10 DOI: 10.1109/ICCNC.2016.7440720
Alessandro Biason, M. Zorzi
Energy Harvesting allows the devices in a Wireless Sensor Network to recharge their batteries through environmental energy sources. While in the literature the main focus is on devices with ideal batteries, in reality several inefficiencies have to be considered to correctly design the operating regimes of an Energy Harvesting Device (EHD). In this work we describe how the throughput optimization problem changes under real battery constraints in an EHD. In particular, we consider imperfect knowledge of the state of charge of the battery and storage inefficiencies, i.e., part of the harvested energy is wasted in the battery recharging process. We formulate the problem as a Markov Decision Process, basing our model on some realistic observations about transmission, consumption and harvesting power. We find the performance upper bound with a real battery and numerically discuss the novelty introduced by the real battery effects. We show that using the old policies obtained without considering the real battery effects is strongly suboptimal and may even result in zero throughput.
能量收集允许无线传感器网络中的设备通过环境能源为电池充电。虽然在文献中,主要关注的是具有理想电池的设备,但在现实中,为了正确设计能量收集设备(EHD)的运行机制,必须考虑几个低效率问题。在这项工作中,我们描述了在实际电池约束下EHD的吞吐量优化问题是如何变化的。特别是,我们考虑了对电池充电状态的不完全了解和存储效率低下,即部分收集的能量在电池充电过程中被浪费。基于对传输、消耗和收获功率的一些实际观察,我们将问题表述为马尔可夫决策过程。我们找到了实际电池的性能上界,并数值讨论了实际电池效应带来的新颖性。我们表明,在不考虑实际电池效应的情况下使用旧策略是非常不理想的,甚至可能导致零吞吐量。
{"title":"On the effects of battery imperfections in an energy harvesting device","authors":"Alessandro Biason, M. Zorzi","doi":"10.1109/ICCNC.2016.7440720","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440720","url":null,"abstract":"Energy Harvesting allows the devices in a Wireless Sensor Network to recharge their batteries through environmental energy sources. While in the literature the main focus is on devices with ideal batteries, in reality several inefficiencies have to be considered to correctly design the operating regimes of an Energy Harvesting Device (EHD). In this work we describe how the throughput optimization problem changes under real battery constraints in an EHD. In particular, we consider imperfect knowledge of the state of charge of the battery and storage inefficiencies, i.e., part of the harvested energy is wasted in the battery recharging process. We formulate the problem as a Markov Decision Process, basing our model on some realistic observations about transmission, consumption and harvesting power. We find the performance upper bound with a real battery and numerically discuss the novelty introduced by the real battery effects. We show that using the old policies obtained without considering the real battery effects is strongly suboptimal and may even result in zero throughput.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132394398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2016 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1