首页 > 最新文献

2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things 基于深度强化学习的物联网环境感知无线移动充电方案
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912767
Michaël Mahamat, Ghada Jaber, A. Bouabdallah
The Internet of Things (IoT) has gained in popularity over the years and is used in numerous applications. IoT networks employ many constrained devices, thus, finding energy is mandatory to maximize device and network lifetime. In this paper, we investigate a scheme based on wireless Mobile Chargers (MCs) to maximize device lifetime. Instead of transmitting energy to devices to only charge them back, we design a charging scheme considering the near future needs of the devices. We provide our ongoing research on a context-aware wireless energy transfer scheme to charge the devices according to the current and probable upcoming events. Our scheme is based on two modules: a context reasoning module predicting the possible future events in the IoT network and an intelligent Wireless Mobile Charger using Deep Reinforcement Learning (DRL). Our solution aims to establish a preventive charging scheme, considering the energy status and probable future events.
多年来,物联网(IoT)越来越受欢迎,并在许多应用中得到了应用。物联网网络采用许多受限设备,因此,寻找能量是必须的,以最大限度地提高设备和网络的使用寿命。本文研究了一种基于无线移动充电器(MCs)的设备寿命最大化方案。我们设计了一种考虑到设备近期需求的充电方案,而不是将能量传输给设备然后只给它们充电。我们正在研究一种情境感知无线能量传输方案,根据当前和可能即将发生的事件为设备充电。我们的方案基于两个模块:预测物联网网络中可能的未来事件的上下文推理模块和使用深度强化学习(DRL)的智能无线移动充电器。我们的解决方案旨在建立一个预防性收费方案,考虑能源状况和未来可能发生的事件。
{"title":"A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things","authors":"Michaël Mahamat, Ghada Jaber, A. Bouabdallah","doi":"10.1109/ISCC55528.2022.9912767","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912767","url":null,"abstract":"The Internet of Things (IoT) has gained in popularity over the years and is used in numerous applications. IoT networks employ many constrained devices, thus, finding energy is mandatory to maximize device and network lifetime. In this paper, we investigate a scheme based on wireless Mobile Chargers (MCs) to maximize device lifetime. Instead of transmitting energy to devices to only charge them back, we design a charging scheme considering the near future needs of the devices. We provide our ongoing research on a context-aware wireless energy transfer scheme to charge the devices according to the current and probable upcoming events. Our scheme is based on two modules: a context reasoning module predicting the possible future events in the IoT network and an intelligent Wireless Mobile Charger using Deep Reinforcement Learning (DRL). Our solution aims to establish a preventive charging scheme, considering the energy status and probable future events.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fighting Against Piracy:An Approach to Detect Pirated Video Websites Enhanced by Third-party Services 打击盗版:第三方服务增强的盗版视频网站检测方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912777
Zhao Li, Shijun Zhang, Jiang Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu
Along with the development of video streaming, the increasing number of pirated video websites has caused unprecedented damage to copyright holders and potential security risks to their users. Though many efforts have been made to take down pirated video websites, they are still emerging by utilizing evading approaches like Fast-Flux domains and Cybercrime-as-a-Service(CaaS) tools. In this paper, to detect pirated video websites, we propose a Third-party Enhanced Pirated Video Website Classification Network (TEP-Net), which integrates both semantic features and relationship information between websites and their third-party services. More specifically, we apply CNN-BiLSTM-Attention to explore both character-level and domain-level textual embedding and utilize relationship information by constructing statistical features in classification. The experiment shows that TEP-Net achieves a significant performance compared with existing methods. Furthermore, we perform an in-depth analysis of the CaaS behind pirated video websites. Our research can help the security community fight against video piracy more precisely and effectively.
随着视频流媒体的发展,盗版视频网站的不断增多给版权方带来了前所未有的损失,也给用户带来了潜在的安全隐患。尽管人们已经采取了很多措施来打击盗版视频网站,但它们仍在利用Fast-Flux域名和网络犯罪即服务(CaaS)工具等规避手段出现。为了检测盗版视频网站,本文提出了一种第三方增强盗版视频网站分类网络(TEP-Net),该网络集成了网站及其第三方服务之间的语义特征和关系信息。更具体地说,我们使用CNN-BiLSTM-Attention来探索字符级和领域级文本嵌入,并通过在分类中构造统计特征来利用关系信息。实验表明,与现有方法相比,TEP-Net取得了显著的性能。此外,我们对盗版视频网站背后的CaaS进行了深入分析。我们的研究可以帮助安全社区更准确、更有效地打击视频盗版。
{"title":"Fighting Against Piracy:An Approach to Detect Pirated Video Websites Enhanced by Third-party Services","authors":"Zhao Li, Shijun Zhang, Jiang Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu","doi":"10.1109/ISCC55528.2022.9912777","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912777","url":null,"abstract":"Along with the development of video streaming, the increasing number of pirated video websites has caused unprecedented damage to copyright holders and potential security risks to their users. Though many efforts have been made to take down pirated video websites, they are still emerging by utilizing evading approaches like Fast-Flux domains and Cybercrime-as-a-Service(CaaS) tools. In this paper, to detect pirated video websites, we propose a Third-party Enhanced Pirated Video Website Classification Network (TEP-Net), which integrates both semantic features and relationship information between websites and their third-party services. More specifically, we apply CNN-BiLSTM-Attention to explore both character-level and domain-level textual embedding and utilize relationship information by constructing statistical features in classification. The experiment shows that TEP-Net achieves a significant performance compared with existing methods. Furthermore, we perform an in-depth analysis of the CaaS behind pirated video websites. Our research can help the security community fight against video piracy more precisely and effectively.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Q-leaming-supported Resource Allocation Model in Vehicular Fogs 基于自适应q学习的车辆雾资源分配模型
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912963
Md Tahmid Hossain, R. E. Grande
Vehicular Cloud Computing (VCC) exhibits many drawbacks with the demands of vehicular applications and intermittent network conditions. Vehicular Fog computing is a novel method for supporting and promoting the effective sharing of services and resources in urban areas. Diverse works on vehicular resource management have sought to handle the very dynamic vehicular environment using various methods, such as policy-based greedy and stochastic techniques. Nevertheless, high vehicular mobility poses many issues that compromise service consistency, efficiency, and quality. Adaptive vehicular Fogs incorporating Reinforcement Learning can deal with mobility and correctly distribute services and resources across all Fogs. Thus, we introduce an adaptive resource management model using cloudlet dwell time for resource estimation, mathematical formula for Fog selection, and reinforcement learning for iterative review and feedback mechanism for generating optimal resource allocation policy.
车载云计算(VCC)在车载应用需求和间歇性网络条件下显示出许多缺点。车载雾计算是一种支持和促进城市服务和资源有效共享的新方法。关于车辆资源管理的各种工作都试图使用各种方法来处理非常动态的车辆环境,例如基于策略的贪婪和随机技术。然而,车辆的高机动性带来了许多问题,影响了服务的一致性、效率和质量。结合强化学习的自适应车辆雾可以处理机动性,并在所有雾中正确分配服务和资源。因此,我们引入了一种自适应资源管理模型,使用cloudlet驻留时间进行资源估计,使用数学公式进行Fog选择,使用强化学习进行迭代审查和反馈机制生成最佳资源分配策略。
{"title":"Adaptive Q-leaming-supported Resource Allocation Model in Vehicular Fogs","authors":"Md Tahmid Hossain, R. E. Grande","doi":"10.1109/ISCC55528.2022.9912963","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912963","url":null,"abstract":"Vehicular Cloud Computing (VCC) exhibits many drawbacks with the demands of vehicular applications and intermittent network conditions. Vehicular Fog computing is a novel method for supporting and promoting the effective sharing of services and resources in urban areas. Diverse works on vehicular resource management have sought to handle the very dynamic vehicular environment using various methods, such as policy-based greedy and stochastic techniques. Nevertheless, high vehicular mobility poses many issues that compromise service consistency, efficiency, and quality. Adaptive vehicular Fogs incorporating Reinforcement Learning can deal with mobility and correctly distribute services and resources across all Fogs. Thus, we introduce an adaptive resource management model using cloudlet dwell time for resource estimation, mathematical formula for Fog selection, and reinforcement learning for iterative review and feedback mechanism for generating optimal resource allocation policy.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Anchor Point Selection in Software Defined Distributed Mobility Management 软件定义分布式移动管理中的动态锚点选择
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912766
Esmaeil Amiri, Ning Wang, S. Vural, R. Tafazolli
Distributed mobility management (DMM) solution is proposed to address the downsides of centralized mobility management protocols. The standard DMM is proposed for flat architectures and always selects the anchor point from access layer. Numerical analysis is used in this paper to show that dynamic anchor point selection can improve the performance of standard DMM in terms of packet signalling and delivery cost. In next step, an SDN-based DMM solution that we refer to as SD-DMM is presented to provide dynamic anchor point selection for hierarchical mobile network architecture. In SD-DMM, the anchor point is dynamically selected for each mobile node by a virtual function implemented as an application on top of the SDN controller which has a global view of the network. The main advantages of SD-DMM is to decrease packet delivery cost.
针对集中式移动管理协议的不足,提出了分布式移动管理方案。标准DMM是针对扁平结构提出的,它总是从接入层中选择锚点。数值分析表明,动态锚点选择可以提高标准DMM的分组信令性能和传输成本。下一步,提出了一种基于sdn的DMM解决方案,我们称之为SD-DMM,为分层移动网络架构提供动态锚点选择。在SD-DMM中,锚点是由一个虚拟功能动态地为每个移动节点选择的,该虚拟功能作为一个应用程序实现在具有网络全局视图的SDN控制器之上。SD-DMM的主要优点是降低了数据包的传输成本。
{"title":"Dynamic Anchor Point Selection in Software Defined Distributed Mobility Management","authors":"Esmaeil Amiri, Ning Wang, S. Vural, R. Tafazolli","doi":"10.1109/ISCC55528.2022.9912766","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912766","url":null,"abstract":"Distributed mobility management (DMM) solution is proposed to address the downsides of centralized mobility management protocols. The standard DMM is proposed for flat architectures and always selects the anchor point from access layer. Numerical analysis is used in this paper to show that dynamic anchor point selection can improve the performance of standard DMM in terms of packet signalling and delivery cost. In next step, an SDN-based DMM solution that we refer to as SD-DMM is presented to provide dynamic anchor point selection for hierarchical mobile network architecture. In SD-DMM, the anchor point is dynamically selected for each mobile node by a virtual function implemented as an application on top of the SDN controller which has a global view of the network. The main advantages of SD-DMM is to decrease packet delivery cost.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair Connectivity-Oriented Allocation for Combined Resources in VCC Networks 面向连通性的VCC网络组合资源公平分配
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912984
Binal Tejani, R. E. Grande
The allocation and management of vehicular resources are essential in enabling services in Vehicular Cloud networks. Combined Resource Units (CRUs) allow for relaxed resource management by utilizing vehicular resources clustered in virtualized units and easing the fulfillment of service requests. Previous works have used mobility-based models such as SMDP and MDP for resource allocation. However, these models have presented significant system overhead, which has impacted the network's performance. Therefore, this work proposes a game theory model for assigning CRUs to satisfy service requests. The utility function of CRUs is maximized by playing a non-cooperative game between service requests. Two different game models are implemented based on exhaustive search and pruning methods. These models use distinct utility functions, which differ in terms of distance and signal strength of the CRUs. Comparing the performance of the two models, the pruning model offers a 90% success rate towards satisfying service requests.
车辆资源的分配和管理对于实现车辆云网络中的服务至关重要。组合资源单元(cru)通过利用集群在虚拟化单元中的车辆资源,简化服务请求的实现,从而简化了资源管理。以前的工作使用基于移动性的模型,如SMDP和MDP进行资源分配。然而,这些模型带来了巨大的系统开销,从而影响了网络的性能。因此,本工作提出了一个分配cru以满足服务请求的博弈论模型。通过在服务请求之间进行非合作博弈,使cru的效用函数最大化。基于穷举搜索和剪枝方法实现了两种不同的博弈模型。这些模型使用不同的效用函数,它们在cru的距离和信号强度方面有所不同。比较两种模型的性能,修剪模型对满足服务请求的成功率为90%。
{"title":"Fair Connectivity-Oriented Allocation for Combined Resources in VCC Networks","authors":"Binal Tejani, R. E. Grande","doi":"10.1109/ISCC55528.2022.9912984","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912984","url":null,"abstract":"The allocation and management of vehicular resources are essential in enabling services in Vehicular Cloud networks. Combined Resource Units (CRUs) allow for relaxed resource management by utilizing vehicular resources clustered in virtualized units and easing the fulfillment of service requests. Previous works have used mobility-based models such as SMDP and MDP for resource allocation. However, these models have presented significant system overhead, which has impacted the network's performance. Therefore, this work proposes a game theory model for assigning CRUs to satisfy service requests. The utility function of CRUs is maximized by playing a non-cooperative game between service requests. Two different game models are implemented based on exhaustive search and pruning methods. These models use distinct utility functions, which differ in terms of distance and signal strength of the CRUs. Comparing the performance of the two models, the pruning model offers a 90% success rate towards satisfying service requests.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Cryptanalysis of K-Cipher K-Cipher的差分密码分析
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912926
M. Mahzoun, L. Kraleva, R. Posteuca, T. Ashur
K-Cipher is an ultra low latency block cipher with variable-length parameters designed by Intel Labs. In this work, we analyze the security of K-Cipher and propose a differential cryptanalysis attack with the complexity of $2^{29.7}$ for a variant of K-Cipher with state size $n=24$ bits state and block size $m=8$ bits. Our attack recovers the secret key and secret randomizer values with a total length of 240 bits in $sim 30$ minutes on a standard desktop machine. We show that it is possible to extend the same attack for an arbitrary set of parameters.
K-Cipher是由英特尔实验室设计的具有可变长度参数的超低延迟分组密码。本文分析了K-Cipher的安全性,提出了一种复杂度为$2^{29.7}$的K-Cipher变体的差分密码分析攻击,其状态大小为$n=24$ bits,块大小为$m=8$ bits。我们的攻击在标准台式计算机上30分钟内恢复了总长度为240位的密钥和秘密随机器值。我们证明了对任意一组参数扩展相同的攻击是可能的。
{"title":"Differential Cryptanalysis of K-Cipher","authors":"M. Mahzoun, L. Kraleva, R. Posteuca, T. Ashur","doi":"10.1109/ISCC55528.2022.9912926","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912926","url":null,"abstract":"K-Cipher is an ultra low latency block cipher with variable-length parameters designed by Intel Labs. In this work, we analyze the security of K-Cipher and propose a differential cryptanalysis attack with the complexity of $2^{29.7}$ for a variant of K-Cipher with state size $n=24$ bits state and block size $m=8$ bits. Our attack recovers the secret key and secret randomizer values with a total length of 240 bits in $sim 30$ minutes on a standard desktop machine. We show that it is possible to extend the same attack for an arbitrary set of parameters.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127265329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Emergency Response System to Support Early Stage Dementia Patients 支持早期痴呆患者的紧急响应系统
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912916
Md. Akbar Hossain, S. Ray, Geri Harris, Shakil Ahmed
Dementia patients living alone in the communities without much support from near and dear ones find it chal-lenging to receive instant help when needed including during emergencies. This work focuses on designing an end - to-end response system primarily to support early-stage Alzheimer's dementia (AD) patients living alone in their homes, in case of emergencies, including medical emergencies. The system aided with pervasive technologies can integrate AD patients, informal caregivers, and formal caregivers to support AD patients in need. Informal caregivers act as first responders to attend to patients and selecting appropriate informal caregivers based on certain predefined parameters is an important component of this system. This work has used single and ensemble Machine Learning (ML) algorithms for binary (to check if informal caregiver is available) and multiclass (to select the most suitable informal caregiver) classification.
独居社区的痴呆症患者没有亲朋好友的支持,在需要的时候,包括紧急情况下,很难获得即时帮助。这项工作的重点是设计一个端到端响应系统,主要用于在紧急情况下,包括医疗紧急情况下,支持独居的早期阿尔茨海默氏痴呆症(AD)患者。在普及技术的帮助下,该系统可以整合阿尔茨海默病患者、非正式护理人员和正式护理人员,以支持有需要的阿尔茨海默病患者。非正式护理人员作为第一响应者来照顾患者,根据某些预定义参数选择合适的非正式护理人员是该系统的重要组成部分。这项工作使用了单一和集成机器学习(ML)算法进行二进制(检查是否有非正式护理人员)和多类(选择最合适的非正式护理人员)分类。
{"title":"An Emergency Response System to Support Early Stage Dementia Patients","authors":"Md. Akbar Hossain, S. Ray, Geri Harris, Shakil Ahmed","doi":"10.1109/ISCC55528.2022.9912916","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912916","url":null,"abstract":"Dementia patients living alone in the communities without much support from near and dear ones find it chal-lenging to receive instant help when needed including during emergencies. This work focuses on designing an end - to-end response system primarily to support early-stage Alzheimer's dementia (AD) patients living alone in their homes, in case of emergencies, including medical emergencies. The system aided with pervasive technologies can integrate AD patients, informal caregivers, and formal caregivers to support AD patients in need. Informal caregivers act as first responders to attend to patients and selecting appropriate informal caregivers based on certain predefined parameters is an important component of this system. This work has used single and ensemble Machine Learning (ML) algorithms for binary (to check if informal caregiver is available) and multiclass (to select the most suitable informal caregiver) classification.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128840683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Fluid Model for Mobile Ad hoc Distributed Systems 移动自组织分布式系统的轻量级流体模型
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912980
Bruno Chianca Ferreira, G. Dufour, Guthemberg Silvestre
Emerging edge applications introduced new computing time-variant topologies with mobile nodes connected via ad hoc networks. Such topologies are fundamentally different from cloud infrastructures due to the lack of hierarchy and clear network function separation. Sometimes, nodes that are sources are also destinations and routers, hence, creating dynamic flow patterns traversing the network. The latter, thus, can change the average performance of a distributed system, such as throughput and latency. This work introduces an analytical model based on fluid quantities to study data flows of distributed systems in mobile ad hoc networks. Using an approach based on a network of queues with evenly distributed bandwidth over concurrent flows, this lightweight model enables fast, coarse-grained analysis of different distributed systems configurations. They enable the analysis of different topologies, mobility and data flow models with a small footprint. The model was implemented, validated and evaluated with stress workloads to confirm its accuracy.
新兴的边缘应用引入了新的计算时变拓扑,移动节点通过自组织网络连接。由于缺乏层次结构和明确的网络功能分离,这种拓扑结构与云基础设施有着根本的不同。有时,作为源的节点同时也是目的地和路由器,从而创建遍历网络的动态流模式。因此,后者可以改变分布式系统的平均性能,例如吞吐量和延迟。本文引入了一种基于流体量的分析模型来研究移动自组织网络中分布式系统的数据流。使用基于队列网络的方法,在并发流上均匀分布带宽,这个轻量级模型支持对不同的分布式系统配置进行快速、粗粒度的分析。它们能够以较小的占用空间分析不同的拓扑、移动性和数据流模型。利用压力负载对模型进行了实施、验证和评估,以验证模型的准确性。
{"title":"A Lightweight Fluid Model for Mobile Ad hoc Distributed Systems","authors":"Bruno Chianca Ferreira, G. Dufour, Guthemberg Silvestre","doi":"10.1109/ISCC55528.2022.9912980","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912980","url":null,"abstract":"Emerging edge applications introduced new computing time-variant topologies with mobile nodes connected via ad hoc networks. Such topologies are fundamentally different from cloud infrastructures due to the lack of hierarchy and clear network function separation. Sometimes, nodes that are sources are also destinations and routers, hence, creating dynamic flow patterns traversing the network. The latter, thus, can change the average performance of a distributed system, such as throughput and latency. This work introduces an analytical model based on fluid quantities to study data flows of distributed systems in mobile ad hoc networks. Using an approach based on a network of queues with evenly distributed bandwidth over concurrent flows, this lightweight model enables fast, coarse-grained analysis of different distributed systems configurations. They enable the analysis of different topologies, mobility and data flow models with a small footprint. The model was implemented, validated and evaluated with stress workloads to confirm its accuracy.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121026182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: Automated Multi-Site E2E Orchestration of Hybrid Network Services Mixing PNF, VNF and CNFs 演示:PNF、VNF和CNFs混合网络服务的自动化多站点端到端编排
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912971
J. Baranda, L. Vettori, J. Mangues‐Bafalluy, R. Martínez, E. Zeydan
Heterogeneity is one relevant characteristic of next generation mobile networks. This term embraces not only different kind of infrastructure resources or transmission technologies (e.g., networking vs computing, wireless vs optical), but it also applies to different ways of implementing the network functions (NFs) composing the network services (NSs). This allows the definition of hybrid NSs combining different kind of components, such as physical, virtual, and cloud-native NFs. This demonstration shows the enhancements introduced in the 5Growth platform to manage physical NFs, hence increasing the capabilities of this platform to cope with more heterogeneous hybrid NSs in multi-site scenarios. In particular, we show the deployment of an NS constituted by physical, virtual, and cloud-native NFs implementing an end-to-end service covering access, mobile core and application functionalities.
异构性是下一代移动网络的一个相关特征。这个术语不仅包含不同类型的基础设施资源或传输技术(例如,网络vs计算,无线vs光),而且还适用于实现组成网络服务(NSs)的网络功能(NFs)的不同方式。这允许定义结合不同类型组件(如物理、虚拟和云原生NFs)的混合NFs。此演示展示了5Growth平台中为管理物理NFs而引入的增强功能,从而提高了该平台在多站点场景中处理更多异构混合NFs的能力。特别地,我们展示了由物理、虚拟和云原生NFs组成的NS的部署,实现了覆盖访问、移动核心和应用程序功能的端到端服务。
{"title":"Demo: Automated Multi-Site E2E Orchestration of Hybrid Network Services Mixing PNF, VNF and CNFs","authors":"J. Baranda, L. Vettori, J. Mangues‐Bafalluy, R. Martínez, E. Zeydan","doi":"10.1109/ISCC55528.2022.9912971","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912971","url":null,"abstract":"Heterogeneity is one relevant characteristic of next generation mobile networks. This term embraces not only different kind of infrastructure resources or transmission technologies (e.g., networking vs computing, wireless vs optical), but it also applies to different ways of implementing the network functions (NFs) composing the network services (NSs). This allows the definition of hybrid NSs combining different kind of components, such as physical, virtual, and cloud-native NFs. This demonstration shows the enhancements introduced in the 5Growth platform to manage physical NFs, hence increasing the capabilities of this platform to cope with more heterogeneous hybrid NSs in multi-site scenarios. In particular, we show the deployment of an NS constituted by physical, virtual, and cloud-native NFs implementing an end-to-end service covering access, mobile core and application functionalities.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121158503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lilac: Parallelizing Atomic Cross-Chain Swaps 丁香:并行化原子交叉链交换
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912942
Donghui Ding, Bo Long, Feng Zhuo, Zhongcheng Li, Hanwen Zhang, Chen Tian, Yi Sun
Hashed Timelock Contract (HTLC) is a widely-used protocol for cross-chain asset swaps. However, it relies on serial asset-locking to guarantee atomicity, which causes high latency and poor fairness. Aiming at the drawbacks of HTLC, we propose Lilac, a cross-chain asset swap protocol that supports parallel asset-locking. Lilac replaces the unique asset-unlocking credential in HTLC with multiple sub-credentials generated by all participating users, and the sequence of sub-credentials is used as the complete asset-unlocking credential. Users obtain the complete credential only when all assets have been locked, and the credential construction process is independent of the order in which assets are locked, so atomicity can be guaranteed when users lock their assets in parallel. Experiments show when a swap involves 2 to 4 blockchains, Lilac reduces the swap latency by 36.75% to 62.20%. Moreover, Lilac reduces the waiting time gap between different users so the fairness of a swap is improved.
Hashed Timelock Contract (HTLC)是一种广泛使用的跨链资产交换协议。然而,它依赖于串行资产锁定来保证原子性,这导致了高延迟和较差的公平性。针对HTLC的不足,我们提出了Lilac,一种支持并行资产锁定的跨链资产交换协议。Lilac用所有参与用户生成的多个子凭据替换HTLC中唯一的资产解锁凭据,子凭据序列用作完整的资产解锁凭据。用户只有在所有资产都被锁定的情况下才能获得完整的凭证,并且凭证的构建过程与资产被锁定的顺序无关,因此可以保证用户并行锁定资产时的原子性。实验表明,当交换涉及2到4个区块链时,Lilac将交换延迟降低了36.75%至62.20%。此外,Lilac减少了不同用户之间的等待时间间隔,从而提高了交换的公平性。
{"title":"Lilac: Parallelizing Atomic Cross-Chain Swaps","authors":"Donghui Ding, Bo Long, Feng Zhuo, Zhongcheng Li, Hanwen Zhang, Chen Tian, Yi Sun","doi":"10.1109/ISCC55528.2022.9912942","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912942","url":null,"abstract":"Hashed Timelock Contract (HTLC) is a widely-used protocol for cross-chain asset swaps. However, it relies on serial asset-locking to guarantee atomicity, which causes high latency and poor fairness. Aiming at the drawbacks of HTLC, we propose Lilac, a cross-chain asset swap protocol that supports parallel asset-locking. Lilac replaces the unique asset-unlocking credential in HTLC with multiple sub-credentials generated by all participating users, and the sequence of sub-credentials is used as the complete asset-unlocking credential. Users obtain the complete credential only when all assets have been locked, and the credential construction process is independent of the order in which assets are locked, so atomicity can be guaranteed when users lock their assets in parallel. Experiments show when a swap involves 2 to 4 blockchains, Lilac reduces the swap latency by 36.75% to 62.20%. Moreover, Lilac reduces the waiting time gap between different users so the fairness of a swap is improved.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131490660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1