首页 > 最新文献

10th IEEE Symposium on Computers and Communications (ISCC'05)最新文献

英文 中文
Dynamic component assessment on PvC environments PvC环境下动态组分评估
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.56
A. Flores, Macario Polo
We aim at automating an integration process for component-based systems. Hence we describe a reference model where its first phase (qualification) is our current work. We intend to compare components data by semantic analysis, i.e. interoperability at a semantic level. Assessment is based on meta-data added to components: their context, assertions, and interface protocol. In a previous work we showed a component interface matching. In this paper we explain the assertions matching, that uses a technique based on abstract syntax trees, which detects similar pieces of code ('clones'). We aim to enhance the procedure by a semantic component treatment using ontologies. Thus the whole assessment procedure is highly improved both on efficacy and reliability.
我们的目标是自动化基于组件的系统的集成过程。因此,我们描述了一个参考模型,它的第一阶段(鉴定)是我们当前的工作。我们打算通过语义分析来比较组件数据,即语义层面的互操作性。评估基于添加到组件中的元数据:它们的上下文、断言和接口协议。在之前的工作中,我们展示了一个组件接口匹配。在本文中,我们解释断言匹配,它使用一种基于抽象语法树的技术来检测相似的代码片段(“克隆”)。我们的目标是通过使用本体的语义组件处理来增强该过程。因此,整个评估程序的有效性和可靠性都得到了很大的提高。
{"title":"Dynamic component assessment on PvC environments","authors":"A. Flores, Macario Polo","doi":"10.1109/ISCC.2005.56","DOIUrl":"https://doi.org/10.1109/ISCC.2005.56","url":null,"abstract":"We aim at automating an integration process for component-based systems. Hence we describe a reference model where its first phase (qualification) is our current work. We intend to compare components data by semantic analysis, i.e. interoperability at a semantic level. Assessment is based on meta-data added to components: their context, assertions, and interface protocol. In a previous work we showed a component interface matching. In this paper we explain the assertions matching, that uses a technique based on abstract syntax trees, which detects similar pieces of code ('clones'). We aim to enhance the procedure by a semantic component treatment using ontologies. Thus the whole assessment procedure is highly improved both on efficacy and reliability.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An analytical model for evaluating interrupt-driven system performance of Gigabit Ethernet hosts with finite buffer 有限缓冲区千兆以太网主机中断驱动系统性能评估分析模型
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.21
K. Salah
A novel analytical model based on Markov processes is developed to study the impact of interrupt overhead on operating system performance of network hosts such as PC-based routers, servers, and end hosts 'when subjected to Gigabit network traffic. Under heavy network traffic, the system performance will be negatively affected due to interrupt overhead caused by incoming traffic. In particular, excessive latency and significant degradation in system throughput can be experienced. Also, user applications may livelock as the CPU power is mostly consumed by interrupt handling and protocol processing. In this paper, we present an analytical model to evaluate system performance. The system performance is studied in terms of throughput, latency, stability condition, CPU utilizations of interrupt handling and protocol processing, and CPU availability for user applications. The analysis can be instrumental in choosing system design parameters offline, therefore allows capacity planning and system diagnosis. Analytical results are compared with the ideal limited buffer queueing system without interrupt overhead.
本文提出了一种基于马尔可夫过程的分析模型,用于研究在千兆网络流量下,中断开销对网络主机(如基于pc的路由器、服务器和终端主机)操作系统性能的影响。在网络流量较大的情况下,进入的流量会造成中断开销,对系统性能产生负面影响。特别是,可能会出现过多的延迟和系统吞吐量的显著下降。此外,用户应用程序可能会因为CPU功率主要被中断处理和协议处理所消耗而陷入僵局。在本文中,我们提出了一个分析模型来评估系统的性能。从吞吐量、延迟、稳定性条件、中断处理和协议处理的CPU利用率以及用户应用的CPU可用性等方面对系统性能进行了研究。该分析可用于离线选择系统设计参数,从而实现容量规划和系统诊断。分析结果与理想的无中断开销的有限缓冲排队系统进行了比较。
{"title":"An analytical model for evaluating interrupt-driven system performance of Gigabit Ethernet hosts with finite buffer","authors":"K. Salah","doi":"10.1109/ISCC.2005.21","DOIUrl":"https://doi.org/10.1109/ISCC.2005.21","url":null,"abstract":"A novel analytical model based on Markov processes is developed to study the impact of interrupt overhead on operating system performance of network hosts such as PC-based routers, servers, and end hosts 'when subjected to Gigabit network traffic. Under heavy network traffic, the system performance will be negatively affected due to interrupt overhead caused by incoming traffic. In particular, excessive latency and significant degradation in system throughput can be experienced. Also, user applications may livelock as the CPU power is mostly consumed by interrupt handling and protocol processing. In this paper, we present an analytical model to evaluate system performance. The system performance is studied in terms of throughput, latency, stability condition, CPU utilizations of interrupt handling and protocol processing, and CPU availability for user applications. The analysis can be instrumental in choosing system design parameters offline, therefore allows capacity planning and system diagnosis. Analytical results are compared with the ideal limited buffer queueing system without interrupt overhead.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126485607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Web-based attacks through Markovian protocol parsing 基于马尔可夫协议解析的web攻击检测
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.51
J. Tapiador, P. García-Teodoro, J. D. Verdejo
This paper presents a novel approach based on the monitoring of incoming HTTP requests to detect attacks against Web servers. The detection is accomplished through a Markovian model whose states and transitions between them are determined from the specification of the HTTP protocol while the probabilities of the symbols associated to the Markovian source are obtained during a training stage according to a set of attack-free requests for the target server. The experiments carried out show a high detection capability with low false positive rates at reasonable computation requirements.
本文提出了一种基于对传入HTTP请求的监控来检测对Web服务器的攻击的新方法。检测通过马尔可夫模型完成,该模型的状态和状态之间的转换由HTTP协议规范确定,而与马尔可夫源相关的符号的概率是在训练阶段根据目标服务器的一组无攻击请求获得的。实验结果表明,在合理的计算要求下,该方法具有较高的检测能力和较低的误报率。
{"title":"Detection of Web-based attacks through Markovian protocol parsing","authors":"J. Tapiador, P. García-Teodoro, J. D. Verdejo","doi":"10.1109/ISCC.2005.51","DOIUrl":"https://doi.org/10.1109/ISCC.2005.51","url":null,"abstract":"This paper presents a novel approach based on the monitoring of incoming HTTP requests to detect attacks against Web servers. The detection is accomplished through a Markovian model whose states and transitions between them are determined from the specification of the HTTP protocol while the probabilities of the symbols associated to the Markovian source are obtained during a training stage according to a set of attack-free requests for the target server. The experiments carried out show a high detection capability with low false positive rates at reasonable computation requirements.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Scheduling and call admission control for burst-error wireless channels 突发错误无线信道的调度和呼叫接纳控制
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.136
P. Koutsakis
We design and evaluate ,the performance of a new unified mechanism for downlink scheduling and call admission control (CAC) of multimedia traffic in a high-capacity TDMA wireless channel. In our scheme, the base station interacts with the call admission controller and incorporates predictions on the channel condition in its decision making. Our results show that, with the use of the "intelligent" scheduler-admission controller mechanism, system performance is significantly enhanced compared to two other schemes without prediction on the channel condition.
我们设计并评估了一种新的统一机制,用于大容量TDMA无线信道中多媒体业务的下行调度和呼叫接纳控制(CAC)的性能。在我们的方案中,基站与呼叫接纳控制器交互,并在其决策中纳入对信道状况的预测。我们的研究结果表明,与不预测信道条件的其他两种方案相比,使用“智能”调度-接纳控制器机制,系统性能显着提高。
{"title":"Scheduling and call admission control for burst-error wireless channels","authors":"P. Koutsakis","doi":"10.1109/ISCC.2005.136","DOIUrl":"https://doi.org/10.1109/ISCC.2005.136","url":null,"abstract":"We design and evaluate ,the performance of a new unified mechanism for downlink scheduling and call admission control (CAC) of multimedia traffic in a high-capacity TDMA wireless channel. In our scheme, the base station interacts with the call admission controller and incorporates predictions on the channel condition in its decision making. Our results show that, with the use of the \"intelligent\" scheduler-admission controller mechanism, system performance is significantly enhanced compared to two other schemes without prediction on the channel condition.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124487466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hydra: a new approach for integrating various wireless environments Hydra:一种集成各种无线环境的新方法
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.81
Karthik Ramachandra, H. Ali
In this paper we present the design of Hydra, an experimental Linux platform for integrating various wireless environments. Currently, mobile devices are often equipped with many network interfaces, which may be of different access technologies, like wireless, cellular and wired. Applications have different requirements, which results in different network preferences. Also, the network preferences of some applications change over time and they would like to use multiple access technologies to satisfy their needs best. Hydra is an attempt to provide users control such that they may manage their own and available devices in a more flexible way than the existing networks are offering. With Hydra, there is a way for applications to provide the operating system, features of the environment they are interested in. Also, there is a mechanism that enables applications to track their environment. The biggest feature is the ability to integrate multiple wireless technologies.
本文介绍了Hydra的设计,这是一个用于集成各种无线环境的实验性Linux平台。目前,移动设备通常配备许多网络接口,这些接口可能具有不同的接入技术,如无线、蜂窝和有线。应用程序有不同的需求,这就导致了不同的网络偏好。此外,一些应用程序的网络偏好会随着时间的推移而变化,它们希望使用多址技术来最好地满足自己的需求。Hydra试图为用户提供控制权,使他们能够以比现有网络更灵活的方式管理自己的可用设备。有了Hydra,应用程序就可以提供它们感兴趣的操作系统和环境特性。此外,还有一种使应用程序能够跟踪其环境的机制。最大的特点是能够集成多种无线技术。
{"title":"Hydra: a new approach for integrating various wireless environments","authors":"Karthik Ramachandra, H. Ali","doi":"10.1109/ISCC.2005.81","DOIUrl":"https://doi.org/10.1109/ISCC.2005.81","url":null,"abstract":"In this paper we present the design of Hydra, an experimental Linux platform for integrating various wireless environments. Currently, mobile devices are often equipped with many network interfaces, which may be of different access technologies, like wireless, cellular and wired. Applications have different requirements, which results in different network preferences. Also, the network preferences of some applications change over time and they would like to use multiple access technologies to satisfy their needs best. Hydra is an attempt to provide users control such that they may manage their own and available devices in a more flexible way than the existing networks are offering. With Hydra, there is a way for applications to provide the operating system, features of the environment they are interested in. Also, there is a mechanism that enables applications to track their environment. The biggest feature is the ability to integrate multiple wireless technologies.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtual machine management for Tele-Lab "IT-security" server 远程实验室“it安全”服务器的虚拟机管理
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.153
Ji Hu, Dirk Cordel, C. Meinel
Tele-Lab "IT-security" Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines and features a pure Web user interface. Thus, students can easily exercise security over the Internet. Running such a security laboratory on the Internet is difficult. Its infrastructure is subject to misuse and crash due to the nature of security tasks. The management of virtual machines is a crucial component which enables running the Tele-Lab server on the Internet. It effectively saves resources and improves security and reliability of the virtual laboratory. This paper briefly reviews the architecture of the Tele-Lab "IT-security" server, describes its virtual machine management in detail, and presents some experiential and experimental results.
远程实验室“it安全”服务器是一种实用的安全教育新概念。远程实验室服务器使用轻量级虚拟机构建虚拟安全实验室,并提供纯Web用户界面。因此,学生可以很容易地在互联网上行使安全。在互联网上运行这样一个安全实验室是很困难的。由于安全任务的性质,它的基础设施容易被误用和崩溃。虚拟机的管理是在Internet上运行远程实验室服务器的关键组件。有效地节约了资源,提高了虚拟实验室的安全性和可靠性。本文简要介绍了远程实验室“it安全”服务器的体系结构,详细描述了其虚拟机管理,并给出了一些经验和实验结果。
{"title":"Virtual machine management for Tele-Lab \"IT-security\" server","authors":"Ji Hu, Dirk Cordel, C. Meinel","doi":"10.1109/ISCC.2005.153","DOIUrl":"https://doi.org/10.1109/ISCC.2005.153","url":null,"abstract":"Tele-Lab \"IT-security\" Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines and features a pure Web user interface. Thus, students can easily exercise security over the Internet. Running such a security laboratory on the Internet is difficult. Its infrastructure is subject to misuse and crash due to the nature of security tasks. The management of virtual machines is a crucial component which enables running the Tele-Lab server on the Internet. It effectively saves resources and improves security and reliability of the virtual laboratory. This paper briefly reviews the architecture of the Tele-Lab \"IT-security\" server, describes its virtual machine management in detail, and presents some experiential and experimental results.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124150052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A DINloop-based inter-domain multicast using MPLS 基于dinloop的基于MPLS的域间组播
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.8
Huaqun Guo, L. Ngoh, L. Wong
To overcome scalability and control overhead problems existing in inter-domain multicast, DINloop (data-in-network loop) based multicast with MPLS is proposed. DINloop is a special logical path formed using MPLS label switched paths and it consists of multiple DIN nodes which are core routers that connect to each intra-domain. We use DINloop to manage inter-domain multicast group membership. Facilitated by the DINloop, multiple DIN nodes in the core network easily form a Steiner tree for multicast traffic. Furthermore, traffic for different multicast groups sharing the same path are aggregated through a label stack. Simulations demonstrate that DINloop-based multicast results in less message load needed to form the multicast structure. In addition, the routing table size in other core routers does not increase as the number of multicast group increases, and therefore routing scalability is improved. Finally, the inter-domain multicast delay in DINloop-based multicast is lower than that of a unidirectional tree.
为了克服域间组播存在的可扩展性和控制开销问题,提出了基于MPLS的DINloop(数据在网环路)组播技术。DINloop是使用MPLS标签交换路径形成的特殊逻辑路径,它由多个DIN节点组成,这些节点是连接到每个域内的核心路由器。我们使用DINloop来管理域间多播组成员关系。在DINloop的帮助下,核心网络中的多个DIN节点很容易形成一棵斯坦纳树,用于组播流量。此外,共享同一路径的不同多播组的流量通过标签堆栈进行聚合。仿真结果表明,基于dinloop的组播可以减少组成组播结构所需的消息负载。此外,其他核心路由器的路由表大小不会随着组播组数量的增加而增加,从而提高了路由的可扩展性。最后,基于dinloop的组播延迟比单向树的组播延迟低。
{"title":"A DINloop-based inter-domain multicast using MPLS","authors":"Huaqun Guo, L. Ngoh, L. Wong","doi":"10.1109/ISCC.2005.8","DOIUrl":"https://doi.org/10.1109/ISCC.2005.8","url":null,"abstract":"To overcome scalability and control overhead problems existing in inter-domain multicast, DINloop (data-in-network loop) based multicast with MPLS is proposed. DINloop is a special logical path formed using MPLS label switched paths and it consists of multiple DIN nodes which are core routers that connect to each intra-domain. We use DINloop to manage inter-domain multicast group membership. Facilitated by the DINloop, multiple DIN nodes in the core network easily form a Steiner tree for multicast traffic. Furthermore, traffic for different multicast groups sharing the same path are aggregated through a label stack. Simulations demonstrate that DINloop-based multicast results in less message load needed to form the multicast structure. In addition, the routing table size in other core routers does not increase as the number of multicast group increases, and therefore routing scalability is improved. Finally, the inter-domain multicast delay in DINloop-based multicast is lower than that of a unidirectional tree.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid methods for blind adaptive equalization: new results and comparisons 盲自适应均衡的混合方法:新结果和比较
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.80
K. Banović, E. Abdel-Raheem, Mohammed A. S. Khalid
This paper proposes two new hybrid blind algorithms based on a new radius-adjusted approach for QAM signal constellations and presents a comprehensive survey of hybrid methods for blind adaptive equalization. The proposed hybrid blind algorithms define static circular regions around symbol points that correspond to a specific weighting factor and stepsize, which optimize the equalizer tap update based on the adaptation phase. Hybrid methods are discussed for the constant modulus algorithm (CMA), improved transfer to the decision-directed (DD) algorithm, and dual-mode hybrid algorithms. Comparisons are made between the proposed algorithms and related hybrid methods, and it is shown that the new algorithms lead to enhanced performance with minimal added complexity.
针对QAM信号星座,提出了两种新的基于半径调整方法的混合盲均衡算法,并对混合盲自适应均衡方法进行了综述。提出的混合盲算法在符号点周围定义与特定权重因子和步长对应的静态圆形区域,根据自适应阶段优化均衡器抽头更新。讨论了常模算法(CMA)、改进的向决策导向(DD)算法和双模混合算法的混合方法。将所提出的算法与相关的混合方法进行了比较,结果表明,新算法在增加最小复杂度的情况下提高了性能。
{"title":"Hybrid methods for blind adaptive equalization: new results and comparisons","authors":"K. Banović, E. Abdel-Raheem, Mohammed A. S. Khalid","doi":"10.1109/ISCC.2005.80","DOIUrl":"https://doi.org/10.1109/ISCC.2005.80","url":null,"abstract":"This paper proposes two new hybrid blind algorithms based on a new radius-adjusted approach for QAM signal constellations and presents a comprehensive survey of hybrid methods for blind adaptive equalization. The proposed hybrid blind algorithms define static circular regions around symbol points that correspond to a specific weighting factor and stepsize, which optimize the equalizer tap update based on the adaptation phase. Hybrid methods are discussed for the constant modulus algorithm (CMA), improved transfer to the decision-directed (DD) algorithm, and dual-mode hybrid algorithms. Comparisons are made between the proposed algorithms and related hybrid methods, and it is shown that the new algorithms lead to enhanced performance with minimal added complexity.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
CACMAN: a framework for efficient and highly available CA services in MANETs 在manet中提供高效和高可用的CA服务的框架
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.39
Laith A. Al-Sulaiman, H. Abdel-Wahab
MANET applications and services pose many interesting challenges due to their unique features. Specifically, security is getting a lot of attention in every aspect of MANETs due to their inherent vulnerability to attacks. Threats exist in every layer of the MANET stack, and different solutions have been adapted for each security problem. Another problem for MANETs is availability, and adding more resources does not necessarily make the system more available. Certificate authority (CA) is one of the most important entities in public key infrastructure (PKI) and needs to be designed carefully when adapted to MANETs. The main goal of our work is to provide a framework that addresses the issues of performance and security of CA in MANETs. Additionally, we would like to increase the availability of CA services, while lowering packet overhead of the network, without increasing the network vulnerability. In this paper, we present a framework suitable for exchanging PKI certificates in MANETs. By caching and exchanging certificates between clients collaboratively, we show that our system can meet the performance challenges of providing CA service without sacrificing system security. Using NS-2 Simulator, we have demonstrated the feasibility of the framework, quantitatively, compared to other related research that has addressed the same problem in MANETs environments.
由于其独特的特性,MANET应用程序和服务提出了许多有趣的挑战。具体来说,由于其固有的易受攻击的脆弱性,安全在manet的各个方面都受到了很多关注。威胁存在于MANET堆栈的每一层,并且针对每个安全问题采用了不同的解决方案。manet的另一个问题是可用性,增加更多的资源并不一定使系统更可用。证书颁发机构(CA)是公钥基础设施(PKI)中最重要的实体之一,在适应manet时需要仔细设计。我们工作的主要目标是提供一个框架来解决manet中CA的性能和安全问题。此外,我们希望增加CA服务的可用性,同时降低网络的数据包开销,而不增加网络漏洞。在本文中,我们提出了一个适用于在manet中交换PKI证书的框架。通过在客户端之间协作地缓存和交换证书,我们证明了我们的系统可以在不牺牲系统安全性的情况下满足提供CA服务的性能挑战。与在manet环境中解决相同问题的其他相关研究相比,使用NS-2模拟器,我们已经定量地证明了该框架的可行性。
{"title":"CACMAN: a framework for efficient and highly available CA services in MANETs","authors":"Laith A. Al-Sulaiman, H. Abdel-Wahab","doi":"10.1109/ISCC.2005.39","DOIUrl":"https://doi.org/10.1109/ISCC.2005.39","url":null,"abstract":"MANET applications and services pose many interesting challenges due to their unique features. Specifically, security is getting a lot of attention in every aspect of MANETs due to their inherent vulnerability to attacks. Threats exist in every layer of the MANET stack, and different solutions have been adapted for each security problem. Another problem for MANETs is availability, and adding more resources does not necessarily make the system more available. Certificate authority (CA) is one of the most important entities in public key infrastructure (PKI) and needs to be designed carefully when adapted to MANETs. The main goal of our work is to provide a framework that addresses the issues of performance and security of CA in MANETs. Additionally, we would like to increase the availability of CA services, while lowering packet overhead of the network, without increasing the network vulnerability. In this paper, we present a framework suitable for exchanging PKI certificates in MANETs. By caching and exchanging certificates between clients collaboratively, we show that our system can meet the performance challenges of providing CA service without sacrificing system security. Using NS-2 Simulator, we have demonstrated the feasibility of the framework, quantitatively, compared to other related research that has addressed the same problem in MANETs environments.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131513289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Empirical model optimization of microwave devices exploiting genetic algorithms 利用遗传算法优化微波器件的经验模型
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.62
F. J. Garrigós, J. Hinojosa, J. Martínez-Alajarín, G. Doménech
Genetic algorithms (GAs) have shown to be suitable for optimizing real value functions with a considerably large number of variables. Thus, we have applied GA to develop an equivalent-circuit or empirical model optimization technique of microwave devices. The result of the optimization provides accurate device modeling for geometric and material parameters chosen and therefore, models computationally very efficient with respect to any electromagnetic technique. This technique is illustrated for a tunable microwave phase shifter whose dispersion model has been optimized for a fixed structure.
遗传算法(GAs)已被证明适合于优化具有相当大量变量的实值函数。因此,我们将遗传算法应用于微波器件的等效电路或经验模型优化技术。优化的结果为所选择的几何和材料参数提供了精确的器件建模,因此,相对于任何电磁技术,模型的计算效率非常高。以一种可调谐微波移相器为例,该移相器的色散模型已优化为固定结构。
{"title":"Empirical model optimization of microwave devices exploiting genetic algorithms","authors":"F. J. Garrigós, J. Hinojosa, J. Martínez-Alajarín, G. Doménech","doi":"10.1109/ISCC.2005.62","DOIUrl":"https://doi.org/10.1109/ISCC.2005.62","url":null,"abstract":"Genetic algorithms (GAs) have shown to be suitable for optimizing real value functions with a considerably large number of variables. Thus, we have applied GA to develop an equivalent-circuit or empirical model optimization technique of microwave devices. The result of the optimization provides accurate device modeling for geometric and material parameters chosen and therefore, models computationally very efficient with respect to any electromagnetic technique. This technique is illustrated for a tunable microwave phase shifter whose dispersion model has been optimized for a fixed structure.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
10th IEEE Symposium on Computers and Communications (ISCC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1