首页 > 最新文献

2016 26th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
Emergency broadcast system: A reverse 911 tsunami information dissemination system prototype 紧急广播系统:一个反向911海啸信息传播系统原型
J. Y. Mambu, Jairo Gutiérrez
When an earthquake hits, the dissemination of tsunami warnings can be crucial in saving lives. Unfortunately, some dissemination channels may be insufficient as they may be affected by the earthquake itself (damaged, loss of power or overloaded), may be expensive to build and are not available at certain places. In this research we propose a tsunami warning dissemination system that can serve as an additional channel to the existing systems. The system is lightweight, affordable, and can be powered autonomously. It disseminates messages to the commonly used GSM handsets and may reach numerous at-risk civilians. This paper also reports on the suggested integration plan of our proposed system within the current disaster management operation procedure in Indonesia. A set of experiments were carried out and they showed that the system has adequately met the users' requirements. It also shows the feasibility of the system to be integrated within the existing operational system and its associated early warning dissemination channels.
当地震发生时,发布海啸警报对于拯救生命至关重要。不幸的是,一些传播渠道可能不足,因为它们可能受到地震本身的影响(损坏、断电或过载),可能建设费用昂贵,并且在某些地方无法使用。在这项研究中,我们提出了一个海啸预警传播系统,可以作为现有系统的额外渠道。该系统重量轻,价格实惠,可以自主供电。它将信息传播到常用的GSM手机,并可能接触到许多处于危险中的平民。本文还报告了我们提出的系统在印度尼西亚当前灾害管理操作程序中的建议整合计划。进行了一系列的实验,结果表明该系统能够充分满足用户的需求。它还显示了将该系统纳入现有业务系统及其相关的早期预警传播渠道的可行性。
{"title":"Emergency broadcast system: A reverse 911 tsunami information dissemination system prototype","authors":"J. Y. Mambu, Jairo Gutiérrez","doi":"10.1109/ATNAC.2016.7878783","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878783","url":null,"abstract":"When an earthquake hits, the dissemination of tsunami warnings can be crucial in saving lives. Unfortunately, some dissemination channels may be insufficient as they may be affected by the earthquake itself (damaged, loss of power or overloaded), may be expensive to build and are not available at certain places. In this research we propose a tsunami warning dissemination system that can serve as an additional channel to the existing systems. The system is lightweight, affordable, and can be powered autonomously. It disseminates messages to the commonly used GSM handsets and may reach numerous at-risk civilians. This paper also reports on the suggested integration plan of our proposed system within the current disaster management operation procedure in Indonesia. A set of experiments were carried out and they showed that the system has adequately met the users' requirements. It also shows the feasibility of the system to be integrated within the existing operational system and its associated early warning dissemination channels.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125359573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fractal renewal process based analysis of emerging network traffic in access networks 基于分形更新过程的接入网新兴网络流量分析
M. A. Arfeen, K. Pawlikowski, A. Willig, D. McNickle
The statistical properties of traffic in Internet access networks have long been of interest to networking researchers and practitioners. In this paper, we analyse network traffic originating and terminating from various types of Internet access networks (Ethernet, Digital Subscriber Line, Wireless hotspot and their next tier Internet Service Provider's core network) and show that renewal processes having heavy-tail distributed interarrival times (also known as fractal renewal processes) have a great potential in capturing statistical properties of traffic in access networks.
互联网接入网络中流量的统计特性一直是网络研究人员和实践者感兴趣的问题。在本文中,我们分析了来自各种类型的互联网接入网(以太网、数字用户线、无线热点和它们的下一层互联网服务提供商的核心网)的网络流量,并表明具有重尾分布到达时间的更新过程(也称为分形更新过程)在捕获接入网流量的统计特性方面具有很大的潜力。
{"title":"Fractal renewal process based analysis of emerging network traffic in access networks","authors":"M. A. Arfeen, K. Pawlikowski, A. Willig, D. McNickle","doi":"10.1109/ATNAC.2016.7878820","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878820","url":null,"abstract":"The statistical properties of traffic in Internet access networks have long been of interest to networking researchers and practitioners. In this paper, we analyse network traffic originating and terminating from various types of Internet access networks (Ethernet, Digital Subscriber Line, Wireless hotspot and their next tier Internet Service Provider's core network) and show that renewal processes having heavy-tail distributed interarrival times (also known as fractal renewal processes) have a great potential in capturing statistical properties of traffic in access networks.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115518117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Securing RPL routing protocol from blackhole attacks using a trust-based mechanism 使用基于信任的机制保护RPL路由协议免受黑洞攻击
David Airehrour, Jairo Gutiérrez, S. K. Ray
This research addresses blackhole routing attacks —a fundamental security attack on the routing of data in IoT networks. Most IoT devices today, from medical devices to connected vehicles and even smart buildings, come bundled with the capability of communicating wirelessly with one another. Consumers are progressively embracing the concept of connected devices while recent studies indicate that security is not high on the priority list of manufacturers especially in the way these devices route and communicate data amongst themselves thus, leaving the door wide open to attacks and compromises. We propose a trust-based RPL routing protocol, which addresses the blackhole attacks. We show that our proposed system is both secure from blackhole attacks while not imposing undue overheads on network traffic.
本研究解决了黑洞路由攻击-物联网网络中数据路由的基本安全攻击。今天的大多数物联网设备,从医疗设备到联网车辆,甚至智能建筑,都捆绑了彼此无线通信的能力。消费者逐渐接受了连接设备的概念,而最近的研究表明,安全性在制造商的优先级列表中并不高,特别是在这些设备之间路由和通信数据的方式上,因此为攻击和妥协敞开了大门。我们提出了一种基于信任的RPL路由协议,以解决黑洞攻击。我们表明,我们提出的系统既安全的黑洞攻击,而不是强加不必要的开销在网络流量。
{"title":"Securing RPL routing protocol from blackhole attacks using a trust-based mechanism","authors":"David Airehrour, Jairo Gutiérrez, S. K. Ray","doi":"10.1109/ATNAC.2016.7878793","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878793","url":null,"abstract":"This research addresses blackhole routing attacks —a fundamental security attack on the routing of data in IoT networks. Most IoT devices today, from medical devices to connected vehicles and even smart buildings, come bundled with the capability of communicating wirelessly with one another. Consumers are progressively embracing the concept of connected devices while recent studies indicate that security is not high on the priority list of manufacturers especially in the way these devices route and communicate data amongst themselves thus, leaving the door wide open to attacks and compromises. We propose a trust-based RPL routing protocol, which addresses the blackhole attacks. We show that our proposed system is both secure from blackhole attacks while not imposing undue overheads on network traffic.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Energy management policy for fitness gadgets: A case study of human daily routines 健身器材的能量管理策略:人类日常生活的案例研究
S. Zareei, Jeremiah D. Deng
The idea of employing scavenged power from human daily routines to run electronic devices are attracting increased attention of many researchers worldwide. However, there is still limited knowledge of energy characteristics generated by human motions. Moreover, level of human activities vary during a day from sitting for several hours to running on a treadmill. This highlights a vital need for energy management strategies. Hence, in this paper, we analyse more than 200 hours of day-scale human activities collected from 5 participants in 25 days. We divide energy generated by human daily routines into mild and intense activities. Subsequently, we develop an energy management policy which estimates required time for a device to store needed power between each active interval. We also evaluate the validity of our model using real world data. The results present an understanding towards a design of energy harvesting fitness gadgets.
利用人类日常生活中收集的能量来运行电子设备的想法越来越受到世界各地许多研究人员的关注。然而,关于人体运动产生的能量特性的知识仍然有限。此外,人的活动水平在一天中变化,从坐几个小时到在跑步机上跑步。这突出了对能源管理战略的迫切需要。因此,在本文中,我们分析了25天内从5名参与者那里收集的200多小时的日尺度人类活动。我们把人类日常活动产生的能量分为轻度活动和剧烈活动。随后,我们开发了一种能量管理策略,该策略估计设备在每个活动间隔之间存储所需功率所需的时间。我们还使用真实世界的数据来评估我们模型的有效性。研究结果为能量收集健身设备的设计提供了新的思路。
{"title":"Energy management policy for fitness gadgets: A case study of human daily routines","authors":"S. Zareei, Jeremiah D. Deng","doi":"10.1109/ATNAC.2016.7878774","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878774","url":null,"abstract":"The idea of employing scavenged power from human daily routines to run electronic devices are attracting increased attention of many researchers worldwide. However, there is still limited knowledge of energy characteristics generated by human motions. Moreover, level of human activities vary during a day from sitting for several hours to running on a treadmill. This highlights a vital need for energy management strategies. Hence, in this paper, we analyse more than 200 hours of day-scale human activities collected from 5 participants in 25 days. We divide energy generated by human daily routines into mild and intense activities. Subsequently, we develop an energy management policy which estimates required time for a device to store needed power between each active interval. We also evaluate the validity of our model using real world data. The results present an understanding towards a design of energy harvesting fitness gadgets.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated network design for measurement and communication infrastructures in smart grids 智能电网中测量和通信基础设施的集成网络设计
H. Tokel, G. Alirezaei, R. Mathar
A large-scale roll-out of a communication and measurement infrastructure is an essential prerequisite for more efficient and robust power grids with a high number of renewable energy resources. In this work, we propose an integrated optimization model for the minimum cost design of a wide area measurement system in smart power grids. The planning approaches proposed so far in the literature mostly consider the optimal placement of measurement devices and the design of a communication network independently, and assume the existence of only one communication technology. In contrast, our proposed novel model enables an integrated planning with a minimum number of both data concentrator and measurement units for observability of the whole power system, and a hierarchical heterogeneous communication network design under data communication requirements of delay and capacity. The application of the proposed model on test networks validates the reduction of the deployment and operational costs as a result of the integrated modeling.
大规模推出通信和测量基础设施是实现拥有大量可再生能源的更高效、更稳健电网的必要先决条件。在这项工作中,我们提出了一个集成优化模型,用于智能电网中广域测量系统的最小成本设计。目前文献中提出的规划方法多是独立考虑测量设备的最佳布置和通信网络的设计,并假设仅存在一种通信技术。相比之下,我们提出的新模型能够以最小数量的数据集中器和测量单元对整个电力系统的可观测性进行综合规划,以及在数据通信延迟和容量要求下的分层异构通信网络设计。该模型在测试网络上的应用验证了集成建模降低了部署和运行成本。
{"title":"Integrated network design for measurement and communication infrastructures in smart grids","authors":"H. Tokel, G. Alirezaei, R. Mathar","doi":"10.1109/ATNAC.2016.7878819","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878819","url":null,"abstract":"A large-scale roll-out of a communication and measurement infrastructure is an essential prerequisite for more efficient and robust power grids with a high number of renewable energy resources. In this work, we propose an integrated optimization model for the minimum cost design of a wide area measurement system in smart power grids. The planning approaches proposed so far in the literature mostly consider the optimal placement of measurement devices and the design of a communication network independently, and assume the existence of only one communication technology. In contrast, our proposed novel model enables an integrated planning with a minimum number of both data concentrator and measurement units for observability of the whole power system, and a hierarchical heterogeneous communication network design under data communication requirements of delay and capacity. The application of the proposed model on test networks validates the reduction of the deployment and operational costs as a result of the integrated modeling.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data ferrying in tactical networks using swarm intelligence and stigmergic coordination 基于群体智能和污名协同的战术网络数据传输
B. Fraser, R. Hunjet
Swarming and emergent behaviour techniques can offer simple control schemes for the organisation of many nodes, with little communications overhead and processing time. These mechanisms are robust against node losses, and are able to run on cheap, disposable platforms. For these reasons, we argue that these techniques are well suited to the tactical environment. This paper examines the usefulness of swarming techniques to address data ferrying in fragmented networks to provide delay-tolerant type communications. Simulation results from static, regular and irregular network topologies, and a dynamic topology representing a fictitious amphibious landing scenario show encouraging results in coordinating data ferries in a disconnected environment.
蜂群和紧急行为技术可以为许多节点的组织提供简单的控制方案,并且通信开销和处理时间很少。这些机制对于节点损失是健壮的,并且能够在廉价的一次性平台上运行。基于这些原因,我们认为这些技术非常适合战术环境。本文探讨了蜂群技术在解决碎片网络中的数据传输以提供容忍延迟类型通信方面的有用性。来自静态、规则和不规则网络拓扑以及代表虚拟两栖登陆场景的动态拓扑的仿真结果显示,在断开连接的环境中协调数据渡轮方面取得了令人鼓舞的结果。
{"title":"Data ferrying in tactical networks using swarm intelligence and stigmergic coordination","authors":"B. Fraser, R. Hunjet","doi":"10.1109/ATNAC.2016.7878772","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878772","url":null,"abstract":"Swarming and emergent behaviour techniques can offer simple control schemes for the organisation of many nodes, with little communications overhead and processing time. These mechanisms are robust against node losses, and are able to run on cheap, disposable platforms. For these reasons, we argue that these techniques are well suited to the tactical environment. This paper examines the usefulness of swarming techniques to address data ferrying in fragmented networks to provide delay-tolerant type communications. Simulation results from static, regular and irregular network topologies, and a dynamic topology representing a fictitious amphibious landing scenario show encouraging results in coordinating data ferries in a disconnected environment.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126912312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A taxonomy for network policy description languages 网络策略描述语言的分类法
Andrew Curtis-Black, A. Willig, M. Galster
Network policy description languages (PDLs) enable the unambiguous specification of network behaviour. Due to the increasing number of PDLs and new and emerging network paradigms (eg: software defined networking) there is a need for tools to analyze these languages in an effective, efficient, and consistent manner. In this paper we present a taxonomy for policy description languages to help compare, understand, and create PDLs. This taxonomy is based on the policy-based network management (PBNM) literature and on consultations with industry experts, and has been validated by applying it to three PDLs (Ponder, Ponder2 and Kinetic). From this application we determine that all three PDLs promote reusability, maintainability and scalability, and that Ponder2 is easier to use in practice.
网络策略描述语言(pdl)支持明确的网络行为规范。由于pdl和新兴网络范例(例如:软件定义的网络)的数量不断增加,因此需要一种工具来以有效、高效和一致的方式分析这些语言。在本文中,我们提出了策略描述语言的分类,以帮助比较、理解和创建pdl。该分类法基于基于策略的网络管理(PBNM)文献和与行业专家的磋商,并已通过将其应用于三个pdl (Ponder, Ponder2和Kinetic)进行了验证。从这个应用程序中,我们确定所有三个pdl都提高了可重用性、可维护性和可伸缩性,并且Ponder2在实践中更易于使用。
{"title":"A taxonomy for network policy description languages","authors":"Andrew Curtis-Black, A. Willig, M. Galster","doi":"10.1109/ATNAC.2016.7878802","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878802","url":null,"abstract":"Network policy description languages (PDLs) enable the unambiguous specification of network behaviour. Due to the increasing number of PDLs and new and emerging network paradigms (eg: software defined networking) there is a need for tools to analyze these languages in an effective, efficient, and consistent manner. In this paper we present a taxonomy for policy description languages to help compare, understand, and create PDLs. This taxonomy is based on the policy-based network management (PBNM) literature and on consultations with industry experts, and has been validated by applying it to three PDLs (Ponder, Ponder2 and Kinetic). From this application we determine that all three PDLs promote reusability, maintainability and scalability, and that Ponder2 is easier to use in practice.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122308546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Peering into peering: Building better tools for better peering decisions 对等:为更好的对等决策构建更好的工具
John Robert Mendoza, Josuel Racca, Isabel Montes, R. Ocampo, C. Festin
Network operators need to assess the effects of routing policies and traffic engineering methods in order to guide planning and operational decisions related to peering. We propose a peering analysis framework based on the correlation of inferred AS paths and traffic flow information. We define the data sets needed and a four-step methodology designed to reduce network data dimensionality, determine traffic proximity, identify traffic propensity, and quantify the impact of traffic locality. We demonstrate how the correlation of traffic flow and AS paths, and the application of our four-step approach, uncovers rich information when applied to a real-world case study of a local Internet service provider.
网络运营商需要评估路由策略和流量工程方法的效果,以指导与对等网络相关的规划和运营决策。我们提出了一种基于推断出的AS路径和交通流信息的相关性的对等分析框架。我们定义了所需的数据集和四步方法,旨在降低网络数据维度,确定交通接近度,识别交通倾向,并量化交通局部性的影响。我们演示了流量流和AS路径的相关性,以及我们的四步方法的应用,如何在应用于本地互联网服务提供商的实际案例研究时发现丰富的信息。
{"title":"Peering into peering: Building better tools for better peering decisions","authors":"John Robert Mendoza, Josuel Racca, Isabel Montes, R. Ocampo, C. Festin","doi":"10.1109/ATNAC.2016.7878809","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878809","url":null,"abstract":"Network operators need to assess the effects of routing policies and traffic engineering methods in order to guide planning and operational decisions related to peering. We propose a peering analysis framework based on the correlation of inferred AS paths and traffic flow information. We define the data sets needed and a four-step methodology designed to reduce network data dimensionality, determine traffic proximity, identify traffic propensity, and quantify the impact of traffic locality. We demonstrate how the correlation of traffic flow and AS paths, and the application of our four-step approach, uncovers rich information when applied to a real-world case study of a local Internet service provider.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124995226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy preserving proximity testing using elliptic curves 使用椭圆曲线的隐私保护接近测试
M. N. Sakib, Chin-Tser Huang
The availability of GPS in smartphones and other wireless devices has made location based services extremely popular. One of the most widely used location based services is finding nearby friends. Popular social networks like Facebook offer this service purely based on exact user locations. To subscribe to this feature, users are forced to let the service provider know their actual locations, compromising their location privacy. In this paper, we present a protocol based on elliptic curve cryptography concepts for proximity testing which can preserve location privacy of the users. Our protocol enables two parties, Alice and Bob, to test whether they are within an agreed upon distance range from each other without revealing their exact location. Our security analysis shows that our protocol is secure against most known location privacy threats including location triangulation attacks. From experimental evaluation performed on prototype implementation, we found that our protocol is practical for resource-constrained smartphone devices requiring a reasonably small execution time (53 ms) without the communication overhead.
GPS在智能手机和其他无线设备上的可用性使得基于位置的服务非常受欢迎。最广泛使用的定位服务之一是寻找附近的朋友。像Facebook这样的流行社交网络提供的这项服务完全基于用户的精确位置。要订阅此功能,用户必须让服务提供商知道他们的实际位置,从而损害他们的位置隐私。本文提出了一种基于椭圆曲线密码学概念的近距离测试协议,可以保护用户的位置隐私。我们的协议使双方,Alice和Bob,能够在不透露确切位置的情况下测试他们是否在约定的距离范围内。我们的安全分析表明,我们的协议对大多数已知的位置隐私威胁都是安全的,包括位置三角测量攻击。从对原型实现进行的实验评估中,我们发现我们的协议对于资源受限的智能手机设备来说是实用的,需要相当小的执行时间(53毫秒),而且没有通信开销。
{"title":"Privacy preserving proximity testing using elliptic curves","authors":"M. N. Sakib, Chin-Tser Huang","doi":"10.1109/ATNAC.2016.7878794","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878794","url":null,"abstract":"The availability of GPS in smartphones and other wireless devices has made location based services extremely popular. One of the most widely used location based services is finding nearby friends. Popular social networks like Facebook offer this service purely based on exact user locations. To subscribe to this feature, users are forced to let the service provider know their actual locations, compromising their location privacy. In this paper, we present a protocol based on elliptic curve cryptography concepts for proximity testing which can preserve location privacy of the users. Our protocol enables two parties, Alice and Bob, to test whether they are within an agreed upon distance range from each other without revealing their exact location. Our security analysis shows that our protocol is secure against most known location privacy threats including location triangulation attacks. From experimental evaluation performed on prototype implementation, we found that our protocol is practical for resource-constrained smartphone devices requiring a reasonably small execution time (53 ms) without the communication overhead.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software Defined Networking properties in multi-domain networks 多域网络中的软件定义网络属性
F. Wibowo, M. Gregory
Software Defined Networking (SDN) is an approach developed to facilitate next generation computer networking by decoupling the traffic control system from the underlying traffic transmission system. One key focus in the transition of next-generation computer networking is the service management improvement of network connectivity services. Connectivity across the global digital network requires a multi-domain capability. Decoupled of the control plane from data plane is the main character of SDN, along with the programmability for network services, utilizing management controllers. SDN had intrinsic potential to improve how a multi-domain implementation might occur utilizing the programmability capability. In this paper, we provide the outcomes of research into how SDN's decoupled programmable control regime affects the performance of multi-domain connectivity services.
软件定义网络(SDN)是一种通过将流量控制系统与底层流量传输系统解耦来促进下一代计算机网络的方法。下一代计算机网络转型的一个重点是网络连接服务的服务管理改进。跨全球数字网络的连接需要多域能力。SDN的主要特点是控制平面与数据平面的解耦,以及利用管理控制器实现网络业务的可编程性。SDN具有利用可编程能力改进多域实现的内在潜力。在本文中,我们提供了SDN的解耦可编程控制机制如何影响多域连接服务性能的研究结果。
{"title":"Software Defined Networking properties in multi-domain networks","authors":"F. Wibowo, M. Gregory","doi":"10.1109/ATNAC.2016.7878790","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878790","url":null,"abstract":"Software Defined Networking (SDN) is an approach developed to facilitate next generation computer networking by decoupling the traffic control system from the underlying traffic transmission system. One key focus in the transition of next-generation computer networking is the service management improvement of network connectivity services. Connectivity across the global digital network requires a multi-domain capability. Decoupled of the control plane from data plane is the main character of SDN, along with the programmability for network services, utilizing management controllers. SDN had intrinsic potential to improve how a multi-domain implementation might occur utilizing the programmability capability. In this paper, we provide the outcomes of research into how SDN's decoupled programmable control regime affects the performance of multi-domain connectivity services.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"5 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 26th International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1