首页 > 最新文献

The 18th IEEE International Conference on Network Protocols最新文献

英文 中文
On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks 基于暂态接触模式的容延迟网络数据转发研究
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762768
Wei Gao, G. Cao
Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and forward data, but these nodes may not be the best relay choices within a short time period, due to the heterogeneity of the transient node contact patterns. In this paper, we propose a novel approach to improve the performance of data forwarding in DTNs by exploiting the transient node contact patterns. We formulate the transient node contact patterns based on experimental studies of realistic DTN traces, and propose appropriate forwarding metrics based on these patterns to improve the effectiveness of data forwarding decision. When applied to various data forwarding strategies, our proposed forwarding metrics achieve much better performance compared to existing schemes with similar forwarding cost.
由于容忍延迟网络(DTNs)中节点密度低、节点移动不可预测以及缺乏全局信息,使得有效的数据转发具有挑战性。目前的数据转发方案大多选择具有最佳累积联系能力的节点作为中继来承载和转发数据,但由于暂态节点接触模式的异质性,这些节点可能不是短时间内的最佳中继选择。在本文中,我们提出了一种利用瞬态节点接触模式来提高数据转发性能的新方法。在对实际DTN走线进行实验研究的基础上,提出了瞬态节点接触模式,并在此基础上提出了相应的转发指标,以提高数据转发决策的有效性。当应用于各种数据转发策略时,我们提出的转发指标与现有的转发成本相似的方案相比具有更好的性能。
{"title":"On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks","authors":"Wei Gao, G. Cao","doi":"10.1109/ICNP.2010.5762768","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762768","url":null,"abstract":"Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and forward data, but these nodes may not be the best relay choices within a short time period, due to the heterogeneity of the transient node contact patterns. In this paper, we propose a novel approach to improve the performance of data forwarding in DTNs by exploiting the transient node contact patterns. We formulate the transient node contact patterns based on experimental studies of realistic DTN traces, and propose appropriate forwarding metrics based on these patterns to improve the effectiveness of data forwarding decision. When applied to various data forwarding strategies, our proposed forwarding metrics achieve much better performance compared to existing schemes with similar forwarding cost.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Exploring the hidden connectivity in urban vehicular networks 探索城市车辆网络中的隐藏连接
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762773
Kebin Liu, Mo Li, Yunhao Liu, Xiangyang Li, Minglu Li, Huadong Ma
The high mobility of VANET makes information exchange across the network excessively difficult. Traditional approaches designed for stationary networks are not applicable due to the high dynamics among the nodes. Applying the routing techniques tailored for general mobile networks inevitably brings huge traffic burden to the crowded urban VANET and leads to low efficiency. To make the information exchange fluent and efficient, we explore the unique features of the urban VANET. By exploring the invariants in the mobile network topology, we are able to efficiently manage the information on top of the “intersection graph” transformed from the underlying network of road segments in the urban area. Our approach can thus achieve efficient query dissemination and data retrieval on this information organization. We intensively investigate and analyze a trace that records the movement of more than 4000 taxies in the urban area of Shanghai City over several months. We grasp the key impact of the fundamental factors that affect the VANET behaviors and accordingly develop tailored techniques to maximize the performance of this design. Experimental results validate the effectiveness and efficiency of our design.
VANET的高移动性使得跨网络的信息交换异常困难。由于静态网络节点间的高度动态性,传统的静态网络设计方法不适用。采用针对通用移动网络的路由技术,必然会给拥挤的城市VANET带来巨大的流量负担,导致效率低下。为了使信息交换更加流畅和高效,我们探索了城市VANET的独特之处。通过探索移动网络拓扑中的不变量,我们能够有效地管理从城市区域的底层路段网络转换而来的“交叉口图”顶部的信息。因此,我们的方法可以在该信息组织上实现高效的查询分发和数据检索。我们对上海市区4000多辆出租车在几个月内的行驶轨迹进行了深入调查和分析。我们掌握了影响VANET行为的基本因素的关键影响,并相应地开发了量身定制的技术,以最大限度地提高该设计的性能。实验结果验证了设计的有效性和高效性。
{"title":"Exploring the hidden connectivity in urban vehicular networks","authors":"Kebin Liu, Mo Li, Yunhao Liu, Xiangyang Li, Minglu Li, Huadong Ma","doi":"10.1109/ICNP.2010.5762773","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762773","url":null,"abstract":"The high mobility of VANET makes information exchange across the network excessively difficult. Traditional approaches designed for stationary networks are not applicable due to the high dynamics among the nodes. Applying the routing techniques tailored for general mobile networks inevitably brings huge traffic burden to the crowded urban VANET and leads to low efficiency. To make the information exchange fluent and efficient, we explore the unique features of the urban VANET. By exploring the invariants in the mobile network topology, we are able to efficiently manage the information on top of the “intersection graph” transformed from the underlying network of road segments in the urban area. Our approach can thus achieve efficient query dissemination and data retrieval on this information organization. We intensively investigate and analyze a trace that records the movement of more than 4000 taxies in the urban area of Shanghai City over several months. We grasp the key impact of the fundamental factors that affect the VANET behaviors and accordingly develop tailored techniques to maximize the performance of this design. Experimental results validate the effectiveness and efficiency of our design.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132080584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance 超越共存:利用WiFi空白空间实现Zigbee性能保证
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762779
Jun Huang, G. Xing, Gang Zhou, Ruogu Zhou
Recent years have witnessed the increasing adoption of ZigBee technology for performance-sensitive applications such as wireless patient monitoring in hospitals. However, operating in unlicensed ISM bands, ZigBee devices often yield unpredictable throughput and packet delivery ratio due to the interference from ever increasing WiFi hotspots in 2.4 GHz band. Our empirical results show that, although WiFi traffic contains abundant white space, the existing coexistence mechanisms such as CSMA are surprisingly inadequate for exploiting it. In this paper, we propose a novel approach that enables ZigBee links to achieve assured performance in the presence of heavy WiFi interference. First, based on statistical analysis of real-life network traces, we present a Pareto model to accurately characterize the white space in WiFi traffic. Second, we analytically model the performance of a ZigBee link in the presence of WiFi interference. Third, based on the white space model and our analysis, we develop a new ZigBee frame control protocol called WISE, which can achieve desired trade-offs between link throughput and delivery ratio. Our extensive experiments on a testbed of 802.11 netbooks and 802.15.4 TelosB motes show that, in the presence of heavy WiFi interference, WISE achieves 4× and 2× performance gains over B-MAC and a recent reliable transmission protocol, respectively, while only incurring 10.9% and 39.5% of their overhead.
近年来,ZigBee技术越来越多地应用于性能敏感型应用,如医院的无线患者监护。然而,由于在未经许可的ISM频段中运行,由于2.4 GHz频段中不断增加的WiFi热点的干扰,ZigBee设备通常会产生不可预测的吞吐量和分组传输比。我们的实证结果表明,尽管WiFi流量中含有丰富的空白空间,但现有的共存机制(如CSMA)对于利用它却令人惊讶地不足。在本文中,我们提出了一种新颖的方法,使ZigBee链路能够在存在严重WiFi干扰的情况下实现可靠的性能。首先,基于对现实网络轨迹的统计分析,我们提出了一个帕累托模型来准确表征WiFi流量中的空白区域。其次,我们对存在WiFi干扰的ZigBee链路的性能进行了分析建模。第三,基于空白空间模型和我们的分析,我们开发了一种新的ZigBee帧控制协议WISE,它可以在链路吞吐量和交付率之间实现理想的权衡。我们在802.11上网本和802.15.4 TelosB笔记本的测试平台上进行了广泛的实验,结果表明,在存在严重WiFi干扰的情况下,WISE分别比B-MAC和最近的可靠传输协议实现了4倍和2倍的性能提升,同时仅产生10.9%和39.5%的开销。
{"title":"Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance","authors":"Jun Huang, G. Xing, Gang Zhou, Ruogu Zhou","doi":"10.1109/ICNP.2010.5762779","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762779","url":null,"abstract":"Recent years have witnessed the increasing adoption of ZigBee technology for performance-sensitive applications such as wireless patient monitoring in hospitals. However, operating in unlicensed ISM bands, ZigBee devices often yield unpredictable throughput and packet delivery ratio due to the interference from ever increasing WiFi hotspots in 2.4 GHz band. Our empirical results show that, although WiFi traffic contains abundant white space, the existing coexistence mechanisms such as CSMA are surprisingly inadequate for exploiting it. In this paper, we propose a novel approach that enables ZigBee links to achieve assured performance in the presence of heavy WiFi interference. First, based on statistical analysis of real-life network traces, we present a Pareto model to accurately characterize the white space in WiFi traffic. Second, we analytically model the performance of a ZigBee link in the presence of WiFi interference. Third, based on the white space model and our analysis, we develop a new ZigBee frame control protocol called WISE, which can achieve desired trade-offs between link throughput and delivery ratio. Our extensive experiments on a testbed of 802.11 netbooks and 802.15.4 TelosB motes show that, in the presence of heavy WiFi interference, WISE achieves 4× and 2× performance gains over B-MAC and a recent reliable transmission protocol, respectively, while only incurring 10.9% and 39.5% of their overhead.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 302
Identifying suspicious activities through DNS failure graph analysis 通过DNS故障图分析识别可疑活动
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762763
Nan Jiang, Jin Cao, Yu Jin, Erran L. Li, Zhi-Li Zhang
As a key approach to securing large networks, existing anomaly detection techniques focus primarily on network traffic data. However, the sheer volume of such data often renders detailed analysis very expensive and reduces the effectiveness of these tools. In this paper, we propose a light-weight anomaly detection approach based on unproductive DNS traffic, namely, the failed DNS queries, with a novel tool - DNS failure graphs. A DNS failure graph captures the interactions between hosts and failed domain names. We apply a graph decomposition algorithm based on the tri-nonnegative matrix factorization technique to iteratively extract coherent co-clusters (dense subgraphs) from DNS failure graphs. By analyzing the co-clusters in the daily DNS failure graphs from a 3-month DNS trace captured at a large campus network, we find these co-clusters represent a variety of anomalous activities, e.g., spamming, trojans, bots, etc.. In addition, these activities often exhibit distinguishable subgraph structures. By exploring the temporal properties of the co-clusters, we show our method can identify new anomalies that likely correspond to unreported domain-flux bots.
作为保障大型网络安全的关键手段,现有的异常检测技术主要集中在网络流量数据上。然而,此类数据的庞大数量往往使详细分析变得非常昂贵,并降低了这些工具的有效性。在本文中,我们提出了一种基于非生产性DNS流量(即失败的DNS查询)的轻量级异常检测方法,并使用了一种新的工具- DNS故障图。DNS故障图捕获主机与故障域名之间的交互。采用基于三非负矩阵分解技术的图分解算法,从DNS故障图中迭代提取相干共聚类(密集子图)。通过分析从一个大型校园网捕获的3个月DNS跟踪的每日DNS故障图中的共同集群,我们发现这些共同集群代表了各种异常活动,例如,垃圾邮件,特洛伊木马,机器人等。此外,这些活动通常表现出可区分的子图结构。通过探索共簇的时间特性,我们表明我们的方法可以识别可能对应于未报告的域通量机器人的新异常。
{"title":"Identifying suspicious activities through DNS failure graph analysis","authors":"Nan Jiang, Jin Cao, Yu Jin, Erran L. Li, Zhi-Li Zhang","doi":"10.1109/ICNP.2010.5762763","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762763","url":null,"abstract":"As a key approach to securing large networks, existing anomaly detection techniques focus primarily on network traffic data. However, the sheer volume of such data often renders detailed analysis very expensive and reduces the effectiveness of these tools. In this paper, we propose a light-weight anomaly detection approach based on unproductive DNS traffic, namely, the failed DNS queries, with a novel tool - DNS failure graphs. A DNS failure graph captures the interactions between hosts and failed domain names. We apply a graph decomposition algorithm based on the tri-nonnegative matrix factorization technique to iteratively extract coherent co-clusters (dense subgraphs) from DNS failure graphs. By analyzing the co-clusters in the daily DNS failure graphs from a 3-month DNS trace captured at a large campus network, we find these co-clusters represent a variety of anomalous activities, e.g., spamming, trojans, bots, etc.. In addition, these activities often exhibit distinguishable subgraph structures. By exploring the temporal properties of the co-clusters, we show our method can identify new anomalies that likely correspond to unreported domain-flux bots.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129432613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution SocialSwarm:利用社交网络中的距离进行协作flash文件分发
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762775
M. J. Probst, Jun Cheol Park, Ravin Abraham, S. Kasera
Social networks can serve as an effective mechanism for distribution of vulnerability patches and other malware immunization code. We propose a novel approach—SocialSwarm—by which peers exploit distances to their social peers to approximate levels of altruism and to collaborate on flash distribution of large files. SocialSwarm supports heterogeneous BitTorrent swarms of mixed social and non-social peers. We implement SocialSwarm as an extension to the Rasterbar libtorrent library—widely used by BitTorrent clients—and evaluate it on a testbed of 500 independent clients with social distances extracted from Facebook. We show that SocialSwarm can significantly reduce the average file distribution time, not only among socially connected peers, but also among other swarm participants.
社交网络可以作为分发漏洞补丁和其他恶意软件免疫代码的有效机制。我们提出了一种新颖的方法——socialswarm——通过这种方法,同伴们利用与他们的社会同伴之间的距离来接近利他主义的水平,并在大文件的快速分发上进行合作。SocialSwarm支持混合社交和非社交同伴的异构BitTorrent群。我们将SocialSwarm作为Rasterbar libtorrent库(BitTorrent客户端广泛使用)的扩展来实现,并在500个独立客户端使用从Facebook提取的社交距离进行测试。我们的研究表明,SocialSwarm不仅在社交连接的同伴之间,而且在其他群体参与者之间,都能显著缩短平均文件分发时间。
{"title":"SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution","authors":"M. J. Probst, Jun Cheol Park, Ravin Abraham, S. Kasera","doi":"10.1109/ICNP.2010.5762775","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762775","url":null,"abstract":"Social networks can serve as an effective mechanism for distribution of vulnerability patches and other malware immunization code. We propose a novel approach—SocialSwarm—by which peers exploit distances to their social peers to approximate levels of altruism and to collaborate on flash distribution of large files. SocialSwarm supports heterogeneous BitTorrent swarms of mixed social and non-social peers. We implement SocialSwarm as an extension to the Rasterbar libtorrent library—widely used by BitTorrent clients—and evaluate it on a testbed of 500 independent clients with social distances extracted from Facebook. We show that SocialSwarm can significantly reduce the average file distribution time, not only among socially connected peers, but also among other swarm participants.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"40 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Identification-free batch authentication for RFID tags RFID标签的免识别批量认证
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762764
Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu
Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Identification (RFID) systems. While there exist both per-tag and probabilistic approaches for the cardinality estimation, the RFID-oriented authentication protocols are mainly per-tag based: the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, incurring large volume of authentication data and huge communication cost. We study the RFID batch authentication issue and propose the first probabilistic approach, termed as Single Echo based Batch Authentication (SEBA), to meet the requirement of prompt and reliable batch authentications in large scale RFID applications, e.g., the anti-counterfeiting solution. Without the need of identifying tags, SEBA provides a provable probabilistic guarantee that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates the effectiveness of SEBA in fast batch authentications and significant improvement compared to existing approaches.
基数估计和标签认证是大规模射频识别(RFID)系统中的两个主要问题。虽然基数估计有单标签和概率两种方法,但面向rfid的身份验证协议主要是基于单标签的:阅读器每次对一个标签进行身份验证。目前的RFID系统对一批标签进行识别,然后依次对每个标签进行身份验证,产生了大量的身份验证数据和巨大的通信成本。我们研究了RFID批量认证问题,并提出了第一种概率方法,称为基于单回声的批量认证(SEBA),以满足大规模RFID应用中快速可靠的批量认证要求,例如防伪解决方案。在不需要识别标签的情况下,SEBA提供了一个可证明的概率保证,即潜在假冒产品的百分比低于用户定义的阈值。实验结果证明了SEBA在快速批认证中的有效性,并且与现有方法相比有了显著的改进。
{"title":"Identification-free batch authentication for RFID tags","authors":"Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu","doi":"10.1109/ICNP.2010.5762764","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762764","url":null,"abstract":"Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Identification (RFID) systems. While there exist both per-tag and probabilistic approaches for the cardinality estimation, the RFID-oriented authentication protocols are mainly per-tag based: the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, incurring large volume of authentication data and huge communication cost. We study the RFID batch authentication issue and propose the first probabilistic approach, termed as Single Echo based Batch Authentication (SEBA), to meet the requirement of prompt and reliable batch authentications in large scale RFID applications, e.g., the anti-counterfeiting solution. Without the need of identifying tags, SEBA provides a provable probabilistic guarantee that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates the effectiveness of SEBA in fast batch authentications and significant improvement compared to existing approaches.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Optimal cache-based route repair for real-time traffic 基于缓存的实时流量最优路由修复
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762770
Chuan Han, Yaling Yang, Y. Peng
Real-time applications in ad hoc networks require fast route repair mechanisms to minimize the interruptions to their communications. Cache-based route repair schemes are popular choices since they can quickly resume communications using cached backup paths after a route break. In this paper, through thorough theoretical modeling of the cache-based route repair process, we derive the optimal cache-based route repair policy. This optimal policy considers both the overhead of the route repair schemes and the promptness of the repair action. The correctness and advantages of our optimal policy are validated by extensive simulations.
自组织网络中的实时应用需要快速路由修复机制,以尽量减少对其通信的中断。基于缓存的路由修复方案是受欢迎的选择,因为它们可以在路由中断后使用缓存的备份路径快速恢复通信。本文通过对基于缓存的路由修复过程进行深入的理论建模,推导出基于缓存的最优路由修复策略。该最优策略既考虑了线路修复方案的开销,又考虑了修复动作的及时性。通过大量的仿真验证了该优化策略的正确性和优越性。
{"title":"Optimal cache-based route repair for real-time traffic","authors":"Chuan Han, Yaling Yang, Y. Peng","doi":"10.1109/ICNP.2010.5762770","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762770","url":null,"abstract":"Real-time applications in ad hoc networks require fast route repair mechanisms to minimize the interruptions to their communications. Cache-based route repair schemes are popular choices since they can quickly resume communications using cached backup paths after a route break. In this paper, through thorough theoretical modeling of the cache-based route repair process, we derive the optimal cache-based route repair policy. This optimal policy considers both the overhead of the route repair schemes and the promptness of the repair action. The correctness and advantages of our optimal policy are validated by extensive simulations.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134154482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TowerDefense: Deployment strategies for battling against IP prefix hijacking 塔防:对抗IP前缀劫持的部署策略
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762762
Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun Xu
IP prefix hijacking is one of the top security threats targeting today's Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a large-scale on the Internet for reasons such as scalability, economical practicality, or unrealistic assumptions about the collaborations among ISPs. Thus there are no actionable and deployable solutions for dealing with prefix hijacking. In this paper, we study key issues related to deploying and operating an IP prefix hijacking detection and mitigation system. Our contributions include (i) deployment strategies for hijacking detection and mitigation system (named as TowerDefense): a practical service model for prefix hijacking protection and effective algorithms for selecting agent locations for detecting and mitigating prefix hijacking attacks; and (ii) large scale experiments on PlanetLab and extensive analysis on the performance of TowerDefense.
IP前缀劫持是当今互联网路由协议的主要安全威胁之一。已经提出了几种检测或减轻前缀劫持事件的方案。然而,由于可伸缩性、经济实用性或对isp之间协作的不切实际的假设等原因,这些方法都没有被大规模地采用和部署在互联网上。因此,没有可操作和可部署的解决方案来处理前缀劫持。在本文中,我们研究了部署和运行IP前缀劫持检测和缓解系统相关的关键问题。我们的贡献包括:(i)劫持检测和缓解系统的部署策略(称为TowerDefense):前缀劫持保护的实用服务模型和用于选择检测和缓解前缀劫持攻击的代理位置的有效算法;(ii)在PlanetLab上进行大规模实验,并对塔防系统的性能进行广泛分析。
{"title":"TowerDefense: Deployment strategies for battling against IP prefix hijacking","authors":"Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun Xu","doi":"10.1109/ICNP.2010.5762762","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762762","url":null,"abstract":"IP prefix hijacking is one of the top security threats targeting today's Internet routing protocol. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none of these approaches is adopted and deployed on a large-scale on the Internet for reasons such as scalability, economical practicality, or unrealistic assumptions about the collaborations among ISPs. Thus there are no actionable and deployable solutions for dealing with prefix hijacking. In this paper, we study key issues related to deploying and operating an IP prefix hijacking detection and mitigation system. Our contributions include (i) deployment strategies for hijacking detection and mitigation system (named as TowerDefense): a practical service model for prefix hijacking protection and effective algorithms for selecting agent locations for detecting and mitigating prefix hijacking attacks; and (ii) large scale experiments on PlanetLab and extensive analysis on the performance of TowerDefense.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115471144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Impairment-aware path selection and regenerator placement in translucent optical networks 半透明光网络中损伤感知路径选择和再生器放置
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762750
F. Kuipers, Anteneh Beshir, A. Orda, P. Mieghem
Physical impairments, such as noise and signal distortions, negatively affect the quality of information transfer in optical networks. The effect of physical impairments predominantly augments with distance and bit rate of the signal to the point that it becomes detrimental to the information transfer. To reverse the effect of physical impairments, the signal needs to be regenerated at nodes that have regeneration capabilities. Regenerators are costly and are, therefore, usually only sparsely placed in the network, in which case it is referred to as a translucent network. This paper deals with two problems in translucent networks, namely: (1) how to incorporate impairment awareness in the routing algorithms, and (2) how many regenerators to place inside the network and where. We propose exact and heuristic algorithms for impairment-aware path selection and, through simulations, show that our heuristic TIARA is computationally efficient and performs very close to our exact algorithm EIARA. Subsequently, we propose a greedy algorithm for placing regenerators that, contrary to previous proposals, is suitable for multiple impairment metrics, has polynomial complexity for a single impairment metric, and is cheaper in terms of the number of regenerators needed.
物理缺陷,如噪声和信号失真,会对光网络中的信息传输质量产生负面影响。物理障碍的影响主要是随着信号的距离和比特率的增加而增加,直到它对信息传输有害。为了逆转身体损伤的影响,信号需要在具有再生能力的节点上再生。再生器是昂贵的,因此,通常只稀疏地放置在网络中,在这种情况下,它被称为半透明网络。本文研究了半透明网络中的两个问题,即:(1)如何在路由算法中加入损伤感知;(2)在网络中放置多少再生器以及在哪里。我们提出了精确和启发式算法用于损伤感知路径选择,并通过模拟表明,我们的启发式TIARA计算效率高,并且执行非常接近我们的精确算法EIARA。随后,我们提出了一种贪婪算法来放置再生器,与之前的建议相反,该算法适用于多个减值度量,单个减值度量具有多项式复杂度,并且在所需的再生器数量方面更便宜。
{"title":"Impairment-aware path selection and regenerator placement in translucent optical networks","authors":"F. Kuipers, Anteneh Beshir, A. Orda, P. Mieghem","doi":"10.1109/ICNP.2010.5762750","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762750","url":null,"abstract":"Physical impairments, such as noise and signal distortions, negatively affect the quality of information transfer in optical networks. The effect of physical impairments predominantly augments with distance and bit rate of the signal to the point that it becomes detrimental to the information transfer. To reverse the effect of physical impairments, the signal needs to be regenerated at nodes that have regeneration capabilities. Regenerators are costly and are, therefore, usually only sparsely placed in the network, in which case it is referred to as a translucent network. This paper deals with two problems in translucent networks, namely: (1) how to incorporate impairment awareness in the routing algorithms, and (2) how many regenerators to place inside the network and where. We propose exact and heuristic algorithms for impairment-aware path selection and, through simulations, show that our heuristic TIARA is computationally efficient and performs very close to our exact algorithm EIARA. Subsequently, we propose a greedy algorithm for placing regenerators that, contrary to previous proposals, is suitable for multiple impairment metrics, has polynomial complexity for a single impairment metric, and is cheaper in terms of the number of regenerators needed.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116164792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Peer-assisted VoD prefetching in double auction markets 双拍卖市场的同行辅助VoD预取
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762776
Yuan Feng, Baochun Li, Bo Li
In peer-assisted video-on-demand (VoD) streaming systems, server bandwidth costs can be astronomical when the number of videos and peers scales up. Since peers are able to seek to an arbitrary point of playback in any video at any time, prefetching is often considered a desirable way to redistribute media content in the entire system so that less server bandwidth may be consumed. In this paper, we point out that the benefits of prefetching in peer-assisted VoD do not come without considerable upfront costs of bandwidth, and as such prefetching strategies should be carefully designed to remain beneficial, but practically carried out in a decentralized manner. We show how the challenge of minimizing server bandwidth is equivalent to maximizing the system-wide utility in the context of double auction markets, where each peer participates in a number of double auctions by bidding for and selling video segments. With simulations, we show that prefetching strategies based on such double auction markets are decentralized, and are effective in reducing the consumption of server bandwidth as well, as compared to existing alternative heuristics in the literature.
在对等辅助视频点播(VoD)流媒体系统中,当视频和对等端数量增加时,服务器带宽成本可能是天文数字。由于对等点能够在任何时间寻找任何视频中的任意播放点,因此预取通常被认为是在整个系统中重新分发媒体内容的理想方法,这样可以减少服务器带宽的消耗。在本文中,我们指出,如果没有可观的前期带宽成本,在对等辅助VoD中预取的好处就不会到来,并且应该仔细设计这样的预取策略以保持有益,但实际上以分散的方式进行。我们展示了最小化服务器带宽的挑战如何等同于在双重拍卖市场背景下最大化系统范围的效用,其中每个对等体通过竞标和出售视频片段参与许多双重拍卖。通过模拟,我们表明,与文献中现有的替代启发式方法相比,基于这种双重拍卖市场的预取策略是分散的,并且在减少服务器带宽消耗方面也很有效。
{"title":"Peer-assisted VoD prefetching in double auction markets","authors":"Yuan Feng, Baochun Li, Bo Li","doi":"10.1109/ICNP.2010.5762776","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762776","url":null,"abstract":"In peer-assisted video-on-demand (VoD) streaming systems, server bandwidth costs can be astronomical when the number of videos and peers scales up. Since peers are able to seek to an arbitrary point of playback in any video at any time, prefetching is often considered a desirable way to redistribute media content in the entire system so that less server bandwidth may be consumed. In this paper, we point out that the benefits of prefetching in peer-assisted VoD do not come without considerable upfront costs of bandwidth, and as such prefetching strategies should be carefully designed to remain beneficial, but practically carried out in a decentralized manner. We show how the challenge of minimizing server bandwidth is equivalent to maximizing the system-wide utility in the context of double auction markets, where each peer participates in a number of double auctions by bidding for and selling video segments. With simulations, we show that prefetching strategies based on such double auction markets are decentralized, and are effective in reducing the consumption of server bandwidth as well, as compared to existing alternative heuristics in the literature.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
The 18th IEEE International Conference on Network Protocols
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1