首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
Proceedings of the 20th International Conference on Distributed Computing and Networking 第20届分布式计算与网络国际会议论文集
{"title":"Proceedings of the 20th International Conference on Distributed Computing and Networking","authors":"","doi":"10.1145/3288599","DOIUrl":"https://doi.org/10.1145/3288599","url":null,"abstract":"","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Flexible cryptographic access control through proxy re-encryption between groups 灵活的密码访问控制,通过代理在组之间重新加密
Gaurav Pareek, B. Purushothama
A cryptographic access control scheme enforces access control policy of the data owner on his encrypted data. Most widely used cryptographic access control mechanism is hierarchical access control. Set of users for which access of data is to be managed/controlled, is divided into disjoint partitions called "security classes" or simply "classes". A hierarchical key assignment scheme (HKAS) assigns encryption keys of the data items in such a way that a class can only access data intended for class(es) lower down in the hierarchy [1]. So, we say each class has "designated access" to data intended for class(es) lower in the hierarchy. Suppose a class Ci, not having designated access to another class Cj, wishes to temporarily have access to data intended for Cj for a finite duration of time and Cj agrees for the same. However, consider that Cj does not wish to share its designated access with Ci. That is, Cj wishes to allow Ci to access data intended directly for Cj but not the one intended for any of the classes to which Cj has designated access and Ci does not. This flexibility requirement has various practical applications. In health-care services for instance, it may be desired that patient's data accessible directly to a doctor is securely delegated to another doctor in another service center for a finite period of time for expert consultation. However, it may be desired that the two doctors do not share information of any other patient.
加密访问控制方案是数据所有者对其加密数据的访问控制策略。应用最广泛的密码访问控制机制是分层访问控制。需要管理/控制其数据访问的一组用户被划分为不相连的分区,称为“安全类”或简称为“类”。分级密钥分配方案(HKAS)以一种方式分配数据项的加密密钥,使一个类别只能访问层级[1]中较低类别的数据。因此,我们说每个类对层次结构中较低的类的数据具有“指定访问”。假设一个类Ci没有对另一个类Cj的指定访问权,它希望在有限的时间内临时访问为Cj准备的数据,Cj也同意这样做。但是,考虑到Cj不希望与Ci共享其指定的访问。也就是说,Cj希望允许Ci访问直接为Cj准备的数据,而不是为Cj指定访问权限而Ci没有指定访问权限的任何类准备的数据。这种灵活性要求有各种实际应用。例如,在保健服务中,可能希望医生可以直接访问的患者数据在有限的时间内安全地委托给另一个服务中心的另一名医生进行专家咨询。然而,可能希望两位医生不共享任何其他患者的信息。
{"title":"Flexible cryptographic access control through proxy re-encryption between groups","authors":"Gaurav Pareek, B. Purushothama","doi":"10.1145/3288599.3299722","DOIUrl":"https://doi.org/10.1145/3288599.3299722","url":null,"abstract":"A cryptographic access control scheme enforces access control policy of the data owner on his encrypted data. Most widely used cryptographic access control mechanism is hierarchical access control. Set of users for which access of data is to be managed/controlled, is divided into disjoint partitions called \"security classes\" or simply \"classes\". A hierarchical key assignment scheme (HKAS) assigns encryption keys of the data items in such a way that a class can only access data intended for class(es) lower down in the hierarchy [1]. So, we say each class has \"designated access\" to data intended for class(es) lower in the hierarchy. Suppose a class Ci, not having designated access to another class Cj, wishes to temporarily have access to data intended for Cj for a finite duration of time and Cj agrees for the same. However, consider that Cj does not wish to share its designated access with Ci. That is, Cj wishes to allow Ci to access data intended directly for Cj but not the one intended for any of the classes to which Cj has designated access and Ci does not. This flexibility requirement has various practical applications. In health-care services for instance, it may be desired that patient's data accessible directly to a doctor is securely delegated to another doctor in another service center for a finite period of time for expert consultation. However, it may be desired that the two doctors do not share information of any other patient.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128311759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Community cloud architecture to improve use accessibility with security compliance in health big data applications 社区云架构提高健康大数据应用的可访问性和安全合规性
Samaikya Valluripally, M. Raju, P. Calyam, M. Chisholm, Sai Swathi Sivarathri, A. Mosa, T. Joshi
The adoption of big data analytics in healthcare applications is overwhelming not only because of the huge volume of data being analyzed, but also because of the heterogeneity and sensitivity of the data. Effective and efficient analysis and visualization of secure patient health records are needed to e.g., find new trends in disease management, determining risk factors for diseases, and personalized medicine. In this paper, we propose a novel community cloud architecture to help clinicians and researchers to have easy/increased accessibility to data sets from multiple sources, while also ensuring security compliance of data providers is not compromised. Our cloud-based system design configuration with cloudlet principles ensures application performance has high-speed processing, and data analytics is sufficiently scalable while adhering to security standards (e.g., HIPAA, NIST). Through a case study, we show how our community cloud architecture can be implemented along with best practices in an ophthalmology case study which includes health big data (i.e., Health Facts database, I2B2, Millennium) hosted in a campus cloud infrastructure featuring virtual desktop thin-clients and relevant Data Classification Levels in storage.
在医疗保健应用中采用大数据分析是压倒性的,这不仅是因为要分析的数据量巨大,还因为数据的异质性和敏感性。需要对安全的患者健康记录进行有效和高效的分析和可视化,例如,发现疾病管理的新趋势,确定疾病的风险因素,以及个性化医疗。在本文中,我们提出了一种新的社区云架构,以帮助临床医生和研究人员轻松/增加对来自多个来源的数据集的访问,同时还确保数据提供商的安全合规性不会受到损害。我们基于云的系统设计配置与cloudlet原则确保应用程序性能具有高速处理,数据分析具有足够的可扩展性,同时坚持安全标准(例如,HIPAA, NIST)。通过案例研究,我们展示了如何在眼科案例研究中实现我们的社区云架构以及最佳实践,该案例研究包括健康大数据(即health Facts数据库、I2B2、Millennium),托管在具有虚拟桌面瘦客户机和存储中相关数据分类级别的校园云基础设施中。
{"title":"Community cloud architecture to improve use accessibility with security compliance in health big data applications","authors":"Samaikya Valluripally, M. Raju, P. Calyam, M. Chisholm, Sai Swathi Sivarathri, A. Mosa, T. Joshi","doi":"10.1145/3288599.3295594","DOIUrl":"https://doi.org/10.1145/3288599.3295594","url":null,"abstract":"The adoption of big data analytics in healthcare applications is overwhelming not only because of the huge volume of data being analyzed, but also because of the heterogeneity and sensitivity of the data. Effective and efficient analysis and visualization of secure patient health records are needed to e.g., find new trends in disease management, determining risk factors for diseases, and personalized medicine. In this paper, we propose a novel community cloud architecture to help clinicians and researchers to have easy/increased accessibility to data sets from multiple sources, while also ensuring security compliance of data providers is not compromised. Our cloud-based system design configuration with cloudlet principles ensures application performance has high-speed processing, and data analytics is sufficiently scalable while adhering to security standards (e.g., HIPAA, NIST). Through a case study, we show how our community cloud architecture can be implemented along with best practices in an ophthalmology case study which includes health big data (i.e., Health Facts database, I2B2, Millennium) hosted in a campus cloud infrastructure featuring virtual desktop thin-clients and relevant Data Classification Levels in storage.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed α-fair transmit power adaptation based congestion control in VANET 基于分布式α-公平发射功率自适应的VANET拥塞控制
Chandrakant Navdeti, C. Giri, I. Banerjee
Major problem of IEEE 802.11 based Vehicular Ad-hoc Network (VANET) is traffic congestion. The traffic congestion occurs due to unnecessary bandwidth usages, high vehicle density, excess increase in transmission power and immediate topology changes in a vehicular ad-hoc network which leads to excessive packet loss and lowers the safety of the applications. Under such conditions, all the transmitted packets from the source may not be delivered to the destination. Vehicles unaware of the traffic congestion increase the difficulty of it by eventually joining it. Many congestion control techniques have been proposed, but still, the problem arises. In this paper, we propose Distributed α-Fair Transmit Power Adaptation Based Congestion Control in Vehicular Ad-hoc Network to discover and reduce traffic congestion using the transmit power control and optimum node selection for cooperative VANET in the framework of the utility function optimization. The proposed system has better performance as compared to DFAV, DV-CAST, and UV-CAST regarding packet reception probability, average packet delivery ratio, and average end-to-end packet delivery delay in Vehicular Ad-hoc Network (VANET).
基于IEEE 802.11的车辆自组织网络(VANET)面临的主要问题是交通拥堵。由于不必要的带宽使用、过高的车辆密度、传输功率的过度增加以及拓扑结构的即时变化,导致车辆自组织网络中出现了大量的丢包,降低了应用程序的安全性。在这种情况下,源端发送的数据包可能不会全部送到目的端。没有意识到交通拥堵的车辆最终加入其中,增加了交通拥堵的难度。人们提出了许多拥塞控制技术,但问题仍然存在。本文提出了基于分布式α-公平发射功率自适应的车辆自组织网络拥塞控制方法,在效用函数优化的框架下,利用发射功率控制和合作VANET的最优节点选择来发现和减少交通拥塞。在车载自组织网络(VANET)中,与DFAV、DV-CAST和UV-CAST相比,该系统在数据包接收概率、平均数据包投递率和端到端平均数据包投递延迟方面具有更好的性能。
{"title":"Distributed α-fair transmit power adaptation based congestion control in VANET","authors":"Chandrakant Navdeti, C. Giri, I. Banerjee","doi":"10.1145/3288599.3288606","DOIUrl":"https://doi.org/10.1145/3288599.3288606","url":null,"abstract":"Major problem of IEEE 802.11 based Vehicular Ad-hoc Network (VANET) is traffic congestion. The traffic congestion occurs due to unnecessary bandwidth usages, high vehicle density, excess increase in transmission power and immediate topology changes in a vehicular ad-hoc network which leads to excessive packet loss and lowers the safety of the applications. Under such conditions, all the transmitted packets from the source may not be delivered to the destination. Vehicles unaware of the traffic congestion increase the difficulty of it by eventually joining it. Many congestion control techniques have been proposed, but still, the problem arises. In this paper, we propose Distributed α-Fair Transmit Power Adaptation Based Congestion Control in Vehicular Ad-hoc Network to discover and reduce traffic congestion using the transmit power control and optimum node selection for cooperative VANET in the framework of the utility function optimization. The proposed system has better performance as compared to DFAV, DV-CAST, and UV-CAST regarding packet reception probability, average packet delivery ratio, and average end-to-end packet delivery delay in Vehicular Ad-hoc Network (VANET).","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122216130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
End to end secure anonymous communication for secure directed diffusion in IoT 物联网中安全定向扩散的端到端安全匿名通信
Jayasree Sengupta, S. Ruj, S. Bit
The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.
物联网(IoT)范例集成了智能设备和传感器,以构建智能家居、医疗保健等系统。然而,传感器容易受到来自恶意内部人员和外部人员的几种攻击。因此,为了保护基于物联网的应用程序,提供匿名通信和端到端数据保密,同时防止冒充和保护节点的隐私是重要的问题。现有的实现匿名通信或数据保密的解决方案,要么无法实现完全匿名,要么存储或通信开销大,难以在资源受限的传感器物联网中实现。因此,在这项工作中,我们提出了一种改进的安全定向扩散(ISDD)协议,针对所有上述安全目标的低开销解决方案。ISDD使用假名来隐藏节点的真实身份,从而保证匿名通信。它还使用双线性配对来派生共享密钥,然后使用共享密钥在明文消息上生成多个加密层。因此,ISDD实现了端到端的数据保密和节点的隐私性,并有效地防止恶意攻击者冒充合法节点。最后,通过安全性分析,我们建立了上述权利要求,同时实现了与其他最先进的竞争方案相比的附加功能。我们还计算了不同的开销,并与两种现有方案进行了比较。结果表明,与两种竞争方案相比,ISDD在通信和存储开销方面有了显著的改善,其代价是计算量的边际增加,同时能耗保持在可接受的范围内。
{"title":"End to end secure anonymous communication for secure directed diffusion in IoT","authors":"Jayasree Sengupta, S. Ruj, S. Bit","doi":"10.1145/3288599.3295577","DOIUrl":"https://doi.org/10.1145/3288599.3295577","url":null,"abstract":"The Internet of Things (IoT) paradigm integrates smart devices and sensors to build systems such as smart homes, healthcare etc. However, sensors are prone to several attacks from malicious insiders as well as outsiders. Thus to secure IoT based applications, providing anonymous communication and end to end data secrecy while preventing impersonation and preserving privacy of nodes are important concerns. The existing solutions on achieving anonymous communication or data secrecy, either cannot achieve complete anonymity or have large storage or communication overhead which is difficult to implement in resource-constrained sensor based IoT. So, in this work we propose an Improved Secure Directed Diffusion (ISDD) protocol targeting a low-overhead solution for all the said security goals. The ISDD uses pseudonyms to conceal the node's real identity thereby ensuring anonymous communication. It also uses bilinear pairing to derive shared keys which are then used to generate multiple encryption layers over the plaintext message. Thus ISDD achieves end to end data secrecy, privacy of nodes and also effectively prevents malicious adversaries from impersonating a legitimate node. Finally, through security analysis we establish the aforementioned claims while achieving additional features compared to other state-of-the-art competing schemes. We also compute different overheads which are compared with two existing schemes. Results show significant improvement of ISDD in communication and storage overhead over both the competing schemes at the cost of marginal higher computation while keeping energy consumption within an acceptable limit.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129496184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cache attacks on blockchain based information centric networks: an experimental evaluation 基于区块链的信息中心网络缓存攻击:实验评估
Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee
Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.
由于越来越多的网络攻击,保护和保护驻留在互联网上不同主机上的数据变得比以往任何时候都更加重要。虽然已经有一些关于拒绝服务和缓存攻击的研究,但这些研究主要是基于对真实网络攻击的模拟和调查,仍然缺乏。在本文中,我们实验研究了缓存攻击对基于区块链的信息中心网络的影响。我们使用超级账本结构来实现中小型网络的区块链。我们实现了缓存攻击,攻击者以不受欢迎的内容为目标缓存,迫使用户从web服务器获取数据。我们尝试了两种不同的拓扑(线性和网状),并考虑了节点上的两种缓存大小。使用了三种缓存替换策略:最近最少使用、随机和先进先出。缓存命中、获取数据所需的时间以及为请求提供服务的跳数都是通过真实的网络流量获得的。在超级分类账结构框架上,我们实现了两种类型的请求,并展示了查询延迟、调用延迟和更新延迟如何随时间变化。根据我们的研究结果,我们发现大多数以信息为中心的网络,包括基于区块链的网络,都容易受到缓存攻击。
{"title":"Cache attacks on blockchain based information centric networks: an experimental evaluation","authors":"Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee","doi":"10.1145/3288599.3288640","DOIUrl":"https://doi.org/10.1145/3288599.3288640","url":null,"abstract":"Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133858691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effect of sign-bit-flipping trojan on turbo coded communication systems 符号位翻转木马对turbo编码通信系统的影响
Karthi Balasubramanian, B. Yamuna, P. Salija, K. Lingasubramanian, D. Mishra
In complex systems like 'Internet of Things' and 'Cyber Physical Systems', reliable communication is made possible by the use of error control codes like turbo codes. Such systems are vulnerable to attack by Trojans during the design or fabrication phases of IC manufacturing. This leads to a severe performance degradation of the entire system. This paper aims at analyzing the effect of a sign-bit-flipping Trojan on a turbo coded communication system. Simulations were carried out on a conventional iterative turbo decoder and the results point out that the Trojan affects the performance of the decoder at SNRs greater than -2 dB. This performance degradation is seen even with minimal activation of the Trojan and a finite error persists even at very high SNRs.
在像“物联网”和“网络物理系统”这样的复杂系统中,可靠的通信是通过使用像涡轮码这样的错误控制代码来实现的。这样的系统在集成电路制造的设计或制造阶段容易受到木马程序的攻击。这将导致整个系统的严重性能下降。本文旨在分析符号位翻转木马对turbo编码通信系统的影响。仿真结果表明,在信噪比大于-2 dB时,该木马会影响译码器的性能。即使在最小程度上激活木马,也会出现这种性能下降,即使在非常高的信噪比下,也会出现有限的误差。
{"title":"Effect of sign-bit-flipping trojan on turbo coded communication systems","authors":"Karthi Balasubramanian, B. Yamuna, P. Salija, K. Lingasubramanian, D. Mishra","doi":"10.1145/3288599.3295586","DOIUrl":"https://doi.org/10.1145/3288599.3295586","url":null,"abstract":"In complex systems like 'Internet of Things' and 'Cyber Physical Systems', reliable communication is made possible by the use of error control codes like turbo codes. Such systems are vulnerable to attack by Trojans during the design or fabrication phases of IC manufacturing. This leads to a severe performance degradation of the entire system. This paper aims at analyzing the effect of a sign-bit-flipping Trojan on a turbo coded communication system. Simulations were carried out on a conventional iterative turbo decoder and the results point out that the Trojan affects the performance of the decoder at SNRs greater than -2 dB. This performance degradation is seen even with minimal activation of the Trojan and a finite error persists even at very high SNRs.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silent self-stabilizing scheme for spanning-tree-like constructions 类生成树结构的无声自稳定方案
Stéphane Devismes, D. Ilcinkas, C. Johnen
In this paper, we propose a general scheme, called Algorithm STIC, to compute spanning-tree-like data structures on arbitrary networks. STIC is self-stabilizing and silent and, despite its generality, is also efficient. It is written in the locally shared memory model with composite atomicity assuming the distributed unfair daemon, the weakest scheduling assumption of the model. Its stabilization time is in O(nmaxCC) rounds, where nmaxCC is the maximum number of processes in a connected component. We also exhibit polynomial upper bounds on its stabilization time in steps and process moves holding for large classes of instantiations of Algorithm STIC. We illustrate the versatility of our approach by proposing several such instantiations that efficiently solve classical problems such as leader election, as well as, unconstrained and shortest-path spanning tree constructions.
在本文中,我们提出了一种称为STIC算法的通用方案来计算任意网络上的生成树数据结构。STIC是自稳定和无声的,尽管它是通用的,但也是高效的。它是在本地共享内存模型中编写的,具有复合原子性,假设分布式不公平守护进程是该模型中最弱的调度假设。它的稳定时间为O(nmaxCC)轮,其中nmaxCC是连接组件中的最大进程数。我们还展示了其稳定时间的多项式上界的步骤和过程移动保持算法的大类实例化。我们通过提出几个这样的实例来说明我们方法的多功能性,这些实例有效地解决了经典问题,例如领导者选举,以及无约束和最短路径生成树构造。
{"title":"Silent self-stabilizing scheme for spanning-tree-like constructions","authors":"Stéphane Devismes, D. Ilcinkas, C. Johnen","doi":"10.1145/3288599.3288607","DOIUrl":"https://doi.org/10.1145/3288599.3288607","url":null,"abstract":"In this paper, we propose a general scheme, called Algorithm STIC, to compute spanning-tree-like data structures on arbitrary networks. STIC is self-stabilizing and silent and, despite its generality, is also efficient. It is written in the locally shared memory model with composite atomicity assuming the distributed unfair daemon, the weakest scheduling assumption of the model. Its stabilization time is in O(nmaxCC) rounds, where nmaxCC is the maximum number of processes in a connected component. We also exhibit polynomial upper bounds on its stabilization time in steps and process moves holding for large classes of instantiations of Algorithm STIC. We illustrate the versatility of our approach by proposing several such instantiations that efficiently solve classical problems such as leader election, as well as, unconstrained and shortest-path spanning tree constructions.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123765321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving performance of TCP for wireless network using SDN 利用SDN提高TCP无线网络的性能
Krishna Vijay Kumar Singh, Sakshi Gupta, Saurabh Verma, M. Pandey
This paper addresses the problem of non-optimal performance of Transmission Control Protocol (TCP) over Wi-Fi networks. TCP considers packet loss as a signal for congestion leading to reduced sending rate. This idea works well for the wired networks where majority of the packet losses are due to congestion. However, in wireless networks, packets are mostly lost because of transmission errors and mobility of the end hosts. Also, when packets are lost due to disassociation of the receiver from the network during mobility, sender remains idle for a significant period even after the receiver is re-associated. In this paper, we present the design and implementation of Software Defined Network (SDN) assisted TCP for wireless networks. In our approach, mobility induced packet losses are tackled smartly to avoid reduction in sending rate. Further, the data transfer starts immediately as soon as the receiver is re-associated to the network during mobility. Unlike existing solutions, our SDN assisted TCP does not violate the end-to-end semantics and no modification is required in the TCP protocol running at the end hosts. We have implemented and evaluated our approach using Mininet Wi-fi emulation platform. The results establish the applicability of our approach.
本文研究了Wi-Fi网络传输控制协议(TCP)的非最优性能问题。TCP认为丢包是导致发送速率降低的拥塞信号。这个想法对有线网络很有效,因为有线网络中大部分的数据包丢失是由于拥塞造成的。然而,在无线网络中,由于传输错误和终端主机的移动,大多数数据包都会丢失。此外,当在移动过程中由于接收方与网络解除关联而导致数据包丢失时,即使在接收方重新关联之后,发送方仍会有相当长的一段时间处于空闲状态。在本文中,我们提出了软件定义网络(SDN)辅助TCP无线网络的设计和实现。在我们的方法中,巧妙地解决了移动引起的数据包丢失,以避免发送速率的降低。此外,在移动期间,一旦接收器重新关联到网络,数据传输就立即开始。与现有的解决方案不同,我们的SDN辅助TCP不违反端到端语义,并且在终端主机上运行的TCP协议不需要修改。我们已经使用Mininet Wi-fi仿真平台实现并评估了我们的方法。结果证实了我们的方法的适用性。
{"title":"Improving performance of TCP for wireless network using SDN","authors":"Krishna Vijay Kumar Singh, Sakshi Gupta, Saurabh Verma, M. Pandey","doi":"10.1145/3288599.3288626","DOIUrl":"https://doi.org/10.1145/3288599.3288626","url":null,"abstract":"This paper addresses the problem of non-optimal performance of Transmission Control Protocol (TCP) over Wi-Fi networks. TCP considers packet loss as a signal for congestion leading to reduced sending rate. This idea works well for the wired networks where majority of the packet losses are due to congestion. However, in wireless networks, packets are mostly lost because of transmission errors and mobility of the end hosts. Also, when packets are lost due to disassociation of the receiver from the network during mobility, sender remains idle for a significant period even after the receiver is re-associated. In this paper, we present the design and implementation of Software Defined Network (SDN) assisted TCP for wireless networks. In our approach, mobility induced packet losses are tackled smartly to avoid reduction in sending rate. Further, the data transfer starts immediately as soon as the receiver is re-associated to the network during mobility. Unlike existing solutions, our SDN assisted TCP does not violate the end-to-end semantics and no modification is required in the TCP protocol running at the end hosts. We have implemented and evaluated our approach using Mininet Wi-fi emulation platform. The results establish the applicability of our approach.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HydraDoctor: real-time liquids intake monitoring by collaborative sensing HydraDoctor:通过协作传感进行实时液体摄入监测
Bowen Du, Chris Xiaoxuan Lu, Xuan Kan, Kai Wu, Man Luo, Jian Hou, K. Li, S. Kanhere, Yiran Shen, Hongkai Wen
Water has been widely acknowledged as an essential part of all living things. It is the fundamental necessity for all life's activities and most biochemical reactions in human body are executed in water. Therefore, the type and quantity of liquid intake everyday have a critical impact on individuals' health. In this paper, we demonstrate HydraDoctor, a real-time liquids intake monitoring system which is able to detect drinking activities, classify the categories of liquids and estimate the amount of intake. The system runs on multiple platforms including a smartwatch to detect the motion of hands and a smartglass to capture the images of mugs. A smartphone is also used as an edge computing platform and a remote server is designed for computationally intensive image processing. In HydraDoctor, multiple state-of-the-art machine learning techniques are applied: a Support Vector Machine (SVM)-based classifier is proposed to achieve accurate and efficient liquids intake monitoring, which is trained to detect the hand raising action. Both of them are well optimized to enable in-situ processing on smartwatch. To provide more robust and detailed monitoring, the smartglass is also incorporated and trigged to capture a short video clip in the front of the user when potential drinking activity is detected. The smartglass will send the video clip to the remote server via its companion smartphone and a Faster-RCNN is performed on the server to confirm the detected drinking activity and identify the type of intake liquid. According to our evaluation on the real-world experiments, HydraDoctor achieves very high accuracy both in drinking activity detection and types of liquids classification, whose accuracy is 85.64% and 84% respectively.
人们普遍认为水是所有生物的基本组成部分。水是一切生命活动的基本必需品,人体内的大部分生化反应都是在水中进行的。因此,每天摄入液体的种类和数量对个人的健康有着至关重要的影响。在本文中,我们演示了HydraDoctor,这是一个实时液体摄入监测系统,能够检测饮酒活动,分类液体类别并估计摄入量。该系统在多个平台上运行,包括用于检测手部运动的智能手表和用于捕捉马克杯图像的智能眼镜。智能手机也被用作边缘计算平台,远程服务器被设计用于计算密集型图像处理。在hydradotor中,应用了多种最先进的机器学习技术:提出了基于支持向量机(SVM)的分类器,以实现准确有效的液体摄入监测,该分类器经过训练以检测举手动作。它们都经过了很好的优化,可以在智能手表上进行原位处理。为了提供更强大、更详细的监控,智能眼镜还被整合在一起,当检测到潜在的饮酒活动时,它会在用户面前捕捉一个短视频片段。智能眼镜将通过配套的智能手机将视频片段发送到远程服务器,然后在服务器上执行Faster-RCNN,以确认检测到的饮酒活动并识别摄入的液体类型。根据我们对实际实验的评价,hydraddoctor在饮水活性检测和液体种类分类方面都达到了非常高的准确率,准确率分别为85.64%和84%。
{"title":"HydraDoctor: real-time liquids intake monitoring by collaborative sensing","authors":"Bowen Du, Chris Xiaoxuan Lu, Xuan Kan, Kai Wu, Man Luo, Jian Hou, K. Li, S. Kanhere, Yiran Shen, Hongkai Wen","doi":"10.1145/3288599.3288635","DOIUrl":"https://doi.org/10.1145/3288599.3288635","url":null,"abstract":"Water has been widely acknowledged as an essential part of all living things. It is the fundamental necessity for all life's activities and most biochemical reactions in human body are executed in water. Therefore, the type and quantity of liquid intake everyday have a critical impact on individuals' health. In this paper, we demonstrate HydraDoctor, a real-time liquids intake monitoring system which is able to detect drinking activities, classify the categories of liquids and estimate the amount of intake. The system runs on multiple platforms including a smartwatch to detect the motion of hands and a smartglass to capture the images of mugs. A smartphone is also used as an edge computing platform and a remote server is designed for computationally intensive image processing. In HydraDoctor, multiple state-of-the-art machine learning techniques are applied: a Support Vector Machine (SVM)-based classifier is proposed to achieve accurate and efficient liquids intake monitoring, which is trained to detect the hand raising action. Both of them are well optimized to enable in-situ processing on smartwatch. To provide more robust and detailed monitoring, the smartglass is also incorporated and trigged to capture a short video clip in the front of the user when potential drinking activity is detected. The smartglass will send the video clip to the remote server via its companion smartphone and a Faster-RCNN is performed on the server to confirm the detected drinking activity and identify the type of intake liquid. According to our evaluation on the real-world experiments, HydraDoctor achieves very high accuracy both in drinking activity detection and types of liquids classification, whose accuracy is 85.64% and 84% respectively.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1