首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
Optimized CL-PKE with lightweight encryption for resource constrained devices 优化的CL-PKE与轻量级加密资源受限的设备
Mayank K. Aditia, Fahiem Altaf, Moirangthem R. Singh, M. S. Burra, Chanchal Maurya, S. S. Sahoo, Soumyadev Maity
Resource constrained devices such as sensors and RFIDs are utilized in many application areas to sense, store and transmit the sensitive data. This data must be encrypted to achieve confidentiality. The implementation of traditional public key encryption (PKE) techniques by these devices is always challenging as they possess very limited computational resources. Various encryption schemes based on identity-based encryption (IBE) and certificate-less public key encryption (CL-PKE) have been proposed to overcome limitations of PKI. However, many of these schemes involve the computationally expensive exponentiation and bilinear pairing operations on elliptic curve group to encrypt the messages. In this context, we propose a lightweight optimized CL-PKE scheme in which exponentiation and pairing operations are completely eliminated during encryption and only involves computation of cheaper addition and multiplication operations on elliptic curve. Implementation of the proposed scheme confirms its lightweight nature as compared to original CL-PKE scheme.
资源受限的设备如传感器和rfid在许多应用领域被用来感知、存储和传输敏感数据。必须对这些数据进行加密以实现机密性。由于这些设备具有非常有限的计算资源,因此通过这些设备实现传统的公钥加密(PKE)技术一直具有挑战性。为了克服PKI的局限性,人们提出了基于身份的加密(IBE)和无证书公钥加密(CL-PKE)的各种加密方案。然而,这些方案中有许多都涉及到计算代价高昂的幂运算和椭圆曲线群上的双线性配对运算来对消息进行加密。在此背景下,我们提出了一种轻量级的优化CL-PKE方案,该方案在加密过程中完全消除了幂运算和配对运算,只涉及椭圆曲线上便宜的加法和乘法运算的计算。与原来的CL-PKE方案相比,拟议方案的实施证实了其轻量级的性质。
{"title":"Optimized CL-PKE with lightweight encryption for resource constrained devices","authors":"Mayank K. Aditia, Fahiem Altaf, Moirangthem R. Singh, M. S. Burra, Chanchal Maurya, S. S. Sahoo, Soumyadev Maity","doi":"10.1145/3288599.3296014","DOIUrl":"https://doi.org/10.1145/3288599.3296014","url":null,"abstract":"Resource constrained devices such as sensors and RFIDs are utilized in many application areas to sense, store and transmit the sensitive data. This data must be encrypted to achieve confidentiality. The implementation of traditional public key encryption (PKE) techniques by these devices is always challenging as they possess very limited computational resources. Various encryption schemes based on identity-based encryption (IBE) and certificate-less public key encryption (CL-PKE) have been proposed to overcome limitations of PKI. However, many of these schemes involve the computationally expensive exponentiation and bilinear pairing operations on elliptic curve group to encrypt the messages. In this context, we propose a lightweight optimized CL-PKE scheme in which exponentiation and pairing operations are completely eliminated during encryption and only involves computation of cheaper addition and multiplication operations on elliptic curve. Implementation of the proposed scheme confirms its lightweight nature as compared to original CL-PKE scheme.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125319911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building resilient community using social technologies: a precursory measure for effective disaster management 利用社会技术建设有复原力的社区:有效灾害管理的前兆措施
S. Bhattacharyya, Priyadarshini Dey, J. Basak, Siuli Roy, S. Bandyopadhyay
Natural disasters like cyclones are a common phenomenon in India, especially in coastal regions. During disaster, victims of a village/ locality normally take shelters in groups in some nearby safe areas (for example, Multi Purpose Cyclone Shelters). Despite of having access to physical infrastructure with basic facilities, disaster victims at cyclone shelters often find it difficult to communicate their exact situational information (like, resource needs and damage information) directly to the local/central authorities. Due to lack of coordination among relief workers and the remote central office, conflicting demands are often generated, causing mismanagement and delay in relief operation. This paper proposes innovative usage of social technology to build resilient community, a mandatory prerequisite to enhance disaster preparedness and coping up mechanisms among collectives inhabited in vulnerable areas. This paper presents an architecture of a Knowledge Informatics Hubs using social technologies at local multipurpose cyclone shelters (MPCS) in coastal areas that will empower the local community members to interact and collaborate with each other, establish communication with various supporting agencies during disaster, establish links with experts and participate in local governance. The aim of creating such a hub would be to create digitally empowered resilient communities who are not only prepared to prevent or minimize the risk of damage to life, property, and the environment due to disaster, but also have the ability to quickly reinstate their normal life and livelihood after a crisis, reopen businesses, and restore other essential services needed for the full economic recovery.
像飓风这样的自然灾害在印度很常见,尤其是在沿海地区。在灾害期间,一个村庄/地区的灾民通常会在附近的一些安全区域集体避难(例如多功能气旋避难所)。尽管可以使用具有基本设施的有形基础设施,但飓风避难所的灾民往往很难将他们的确切情况信息(如资源需求和损害信息)直接传达给地方/中央当局。由于救援人员与偏远的中央办事处之间缺乏协调,经常产生相互冲突的需求,造成救援工作管理不善和延误。本文提出创新地利用社会技术来建设有弹性的社区,这是加强脆弱地区居民集体备灾和应对机制的必要前提。本文介绍了沿海地区当地多用途气旋避难所(MPCS)使用社交技术的知识信息学中心架构,该架构将使当地社区成员能够相互互动和协作,在灾害期间与各种支持机构建立联系,与专家建立联系并参与地方治理。建立这样一个中心的目的是创建具有数字化能力的弹性社区,这些社区不仅准备好预防或尽量减少灾害对生命、财产和环境造成的损害,而且有能力在危机发生后迅速恢复正常生活和生计,重新开业,并恢复全面经济复苏所需的其他基本服务。
{"title":"Building resilient community using social technologies: a precursory measure for effective disaster management","authors":"S. Bhattacharyya, Priyadarshini Dey, J. Basak, Siuli Roy, S. Bandyopadhyay","doi":"10.1145/3288599.3295591","DOIUrl":"https://doi.org/10.1145/3288599.3295591","url":null,"abstract":"Natural disasters like cyclones are a common phenomenon in India, especially in coastal regions. During disaster, victims of a village/ locality normally take shelters in groups in some nearby safe areas (for example, Multi Purpose Cyclone Shelters). Despite of having access to physical infrastructure with basic facilities, disaster victims at cyclone shelters often find it difficult to communicate their exact situational information (like, resource needs and damage information) directly to the local/central authorities. Due to lack of coordination among relief workers and the remote central office, conflicting demands are often generated, causing mismanagement and delay in relief operation. This paper proposes innovative usage of social technology to build resilient community, a mandatory prerequisite to enhance disaster preparedness and coping up mechanisms among collectives inhabited in vulnerable areas. This paper presents an architecture of a Knowledge Informatics Hubs using social technologies at local multipurpose cyclone shelters (MPCS) in coastal areas that will empower the local community members to interact and collaborate with each other, establish communication with various supporting agencies during disaster, establish links with experts and participate in local governance. The aim of creating such a hub would be to create digitally empowered resilient communities who are not only prepared to prevent or minimize the risk of damage to life, property, and the environment due to disaster, but also have the ability to quickly reinstate their normal life and livelihood after a crisis, reopen businesses, and restore other essential services needed for the full economic recovery.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel selection in dynamic networks of unknown size 未知大小动态网络中的信道选择
Rohit Kumar, S. Darak
The dynamic spectrum access (DSA) algorithms aim to maximize network throughput by ensuring orthogonal channel allocation among secondary users (SUs) in cognitive radio network. Most of the existing DSA algorithms need prior knowledge of the number of active SUs and thus may not be suitable for battery operated resource constrained SU terminals in the infrastructure-less cognitive radio terminals. Another drawback of these algorithms is that they assume the static network with a fixed number of SUs in the network throughout the horizon and their extension for dynamic network in which SUs may enter or exit the network anytime is challenging. Thus, our goal is to design the DSA algorithms for the dynamic networks of unknown size.
在认知无线网络中,动态频谱接入(DSA)算法通过保证辅助用户间信道的正交分配来实现网络吞吐量的最大化。现有的大多数DSA算法需要事先知道活动单元的数量,因此可能不适合在无基础设施的认知无线电终端中使用电池供电的资源受限的单元终端。这些算法的另一个缺点是,它们假设在整个视界中具有固定数量的网络单元的静态网络,并且它们对动态网络中的单元可以随时进入或退出网络的扩展具有挑战性。因此,我们的目标是为未知大小的动态网络设计DSA算法。
{"title":"Channel selection in dynamic networks of unknown size","authors":"Rohit Kumar, S. Darak","doi":"10.1145/3288599.3299727","DOIUrl":"https://doi.org/10.1145/3288599.3299727","url":null,"abstract":"The dynamic spectrum access (DSA) algorithms aim to maximize network throughput by ensuring orthogonal channel allocation among secondary users (SUs) in cognitive radio network. Most of the existing DSA algorithms need prior knowledge of the number of active SUs and thus may not be suitable for battery operated resource constrained SU terminals in the infrastructure-less cognitive radio terminals. Another drawback of these algorithms is that they assume the static network with a fixed number of SUs in the network throughout the horizon and their extension for dynamic network in which SUs may enter or exit the network anytime is challenging. Thus, our goal is to design the DSA algorithms for the dynamic networks of unknown size.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid classifier approach to multivariate sensor data for climate smart agriculture cyber-physical systems 气候智能型农业信息物理系统多变量传感器数据的混合分类方法
Ankur Pandey, Piyush Tiwary, Sudhir Kumar, Sajal K. Das
In this paper, we propose a novel climate-smart Agriculture Cyber-Physical System (ACPS) for precision farming. The primary motive of the ACPS is to perform real-time fault location tracking in the agricultural field using multivariate sensor data. The computing model in the ACPS uses a novel hybrid classification approach which combines two classifiers for the location estimation of the sensor node. The novelty of the proposed method lies in predicting the locations that need more irrigation, soil nutrients or immediate human intervention using the sensor data. We also derive the computational complexity of the proposed method. The location accuracy improves reasonably as compared to the current-state-of-the-art methods.
在本文中,我们提出了一种用于精准农业的新型气候智能农业信息物理系统(ACPS)。ACPS的主要目的是利用多变量传感器数据对农业现场进行实时故障定位跟踪。ACPS中的计算模型采用了一种新的混合分类方法,将两个分类器结合在一起进行传感器节点的位置估计。该方法的新颖之处在于利用传感器数据预测需要更多灌溉、土壤养分或立即人工干预的位置。我们还推导了该方法的计算复杂度。与现有的定位方法相比,定位精度有了一定的提高。
{"title":"A hybrid classifier approach to multivariate sensor data for climate smart agriculture cyber-physical systems","authors":"Ankur Pandey, Piyush Tiwary, Sudhir Kumar, Sajal K. Das","doi":"10.1145/3288599.3288621","DOIUrl":"https://doi.org/10.1145/3288599.3288621","url":null,"abstract":"In this paper, we propose a novel climate-smart Agriculture Cyber-Physical System (ACPS) for precision farming. The primary motive of the ACPS is to perform real-time fault location tracking in the agricultural field using multivariate sensor data. The computing model in the ACPS uses a novel hybrid classification approach which combines two classifiers for the location estimation of the sensor node. The novelty of the proposed method lies in predicting the locations that need more irrigation, soil nutrients or immediate human intervention using the sensor data. We also derive the computational complexity of the proposed method. The location accuracy improves reasonably as compared to the current-state-of-the-art methods.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel compression based neuronal architecture for memory encoding 一种新的基于压缩的记忆编码神经元结构
Aditi Kathpalia, N. Nagaraj
Research in neuro-biological memory encoding suggests that it takes place through various biophysical and biochemical mechanisms during synaptic transmission of information between neurons. However, there are no mathematical models to explain how these processes result in real-time memory encoding which is compressed and distributed in different neuronal pathways across different brain regions. Biologically inspired artificial neural networks that accomplish learning by updating its synaptic weights, lack a theoretical justification. In this work, we propose a novel biologically inspired network architecture of neural memory encoding, preserving its various attributes including compression, non-linearity, distributed processing and dynamical nature. We demonstrate that our model is capable of universal computation and satisfies the approximation theorem.
神经生物学记忆编码的研究表明,在神经元之间的突触传递信息过程中,记忆编码是通过多种生物物理和生化机制进行的。然而,没有数学模型来解释这些过程是如何导致实时记忆编码的,这些编码被压缩并分布在不同大脑区域的不同神经元通路中。生物学启发的人工神经网络通过更新其突触权重来完成学习,缺乏理论依据。在这项工作中,我们提出了一种新颖的生物学启发的神经记忆编码网络架构,保留了其各种属性,包括压缩,非线性,分布式处理和动态性。我们证明了我们的模型能够进行普遍计算,并且满足近似定理。
{"title":"A novel compression based neuronal architecture for memory encoding","authors":"Aditi Kathpalia, N. Nagaraj","doi":"10.1145/3288599.3295575","DOIUrl":"https://doi.org/10.1145/3288599.3295575","url":null,"abstract":"Research in neuro-biological memory encoding suggests that it takes place through various biophysical and biochemical mechanisms during synaptic transmission of information between neurons. However, there are no mathematical models to explain how these processes result in real-time memory encoding which is compressed and distributed in different neuronal pathways across different brain regions. Biologically inspired artificial neural networks that accomplish learning by updating its synaptic weights, lack a theoretical justification. In this work, we propose a novel biologically inspired network architecture of neural memory encoding, preserving its various attributes including compression, non-linearity, distributed processing and dynamical nature. We demonstrate that our model is capable of universal computation and satisfies the approximation theorem.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A percolation-based recovery mechanism for bot infected P2P cloud 基于渗透的僵尸感染P2P云恢复机制
Sanghamitra De, M. S. Barik, I. Banerjee
Execution of any recovery procedure in compromised nodes of a Cloud should aim at covering as many nodes as possible in a given time. The authors propose an innovative approach using the concept of percolation centrality to spread the execution of a recovery procedure across adjacent nodes in a P2PCloud. Compromised networks can be large since botnets and malware infections use the advantage of the internet to spread rapidly. Using percolation centrality to choose a node from where to begin, the recovery procedure runs in parallel in different nodes which can be reached from a chosen node and spreads fast.
在云的受损节点中执行任何恢复过程都应以在给定时间内覆盖尽可能多的节点为目标。作者提出了一种创新的方法,使用渗透中心性的概念,在P2PCloud中跨相邻节点传播恢复过程的执行。由于僵尸网络和恶意软件感染利用互联网的优势迅速传播,受损的网络可能很大。利用渗透中心性选择起始节点,恢复过程在从选定节点可到达的不同节点上并行运行,传播速度快。
{"title":"A percolation-based recovery mechanism for bot infected P2P cloud","authors":"Sanghamitra De, M. S. Barik, I. Banerjee","doi":"10.1145/3288599.3295597","DOIUrl":"https://doi.org/10.1145/3288599.3295597","url":null,"abstract":"Execution of any recovery procedure in compromised nodes of a Cloud should aim at covering as many nodes as possible in a given time. The authors propose an innovative approach using the concept of percolation centrality to spread the execution of a recovery procedure across adjacent nodes in a P2PCloud. Compromised networks can be large since botnets and malware infections use the advantage of the internet to spread rapidly. Using percolation centrality to choose a node from where to begin, the recovery procedure runs in parallel in different nodes which can be reached from a chosen node and spreads fast.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COR-HR: an efficient hybrid routing approach using coefficient of restitution in MANET 基于恢复系数的混合路由方法
Sumana Sinha, Snehanshu Saha, Sudeepta Mishra
The rapid expansion of mobile technology and real time applications partake strictly to support quality of service (QoS) such as throughput, delay, energy consumption, jitter etc. Mobile technology like MANET experiences frequent and randomly changing network topology. A major challenge is to design QoS based congestion free routing algorithm in MANET. The paper presents a novel, hybrid routing protocol driven by the principles of Newtonian Mechanics. We select the shortest paths and nodes based on the residual energy state of the nodes enabling the protocol mitigate the problem of congestion. Path selection and congestion control are handled by the values calculated by using a physics based concept namely the Coefficient of Restitution. The simulation results show that the protocol provides reasonably good benchmarks of Quality of Service (QoS) in terms of end to end delay, packet delivery ratio and throughput.
移动技术的快速发展和实时应用对服务质量(QoS)的要求越来越高,如吞吐量、延迟、能耗、抖动等。像MANET这样的移动技术经历了频繁和随机变化的网络拓扑。在MANET中设计基于QoS的无拥塞路由算法是一个主要的挑战。提出了一种基于牛顿力学原理的新型混合路由协议。我们根据节点的剩余能量状态选择最短路径和节点,使协议能够缓解拥塞问题。路径选择和拥塞控制是通过使用基于物理的概念即恢复系数计算的值来处理的。仿真结果表明,该协议在端到端延迟、分组传送率和吞吐量方面提供了较好的服务质量(QoS)基准。
{"title":"COR-HR: an efficient hybrid routing approach using coefficient of restitution in MANET","authors":"Sumana Sinha, Snehanshu Saha, Sudeepta Mishra","doi":"10.1145/3288599.3295579","DOIUrl":"https://doi.org/10.1145/3288599.3295579","url":null,"abstract":"The rapid expansion of mobile technology and real time applications partake strictly to support quality of service (QoS) such as throughput, delay, energy consumption, jitter etc. Mobile technology like MANET experiences frequent and randomly changing network topology. A major challenge is to design QoS based congestion free routing algorithm in MANET. The paper presents a novel, hybrid routing protocol driven by the principles of Newtonian Mechanics. We select the shortest paths and nodes based on the residual energy state of the nodes enabling the protocol mitigate the problem of congestion. Path selection and congestion control are handled by the values calculated by using a physics based concept namely the Coefficient of Restitution. The simulation results show that the protocol provides reasonably good benchmarks of Quality of Service (QoS) in terms of end to end delay, packet delivery ratio and throughput.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131862583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low complexity landmark-node tracing in WSNs using multi-agent random walks 基于多智能体随机行走的wsn低复杂度地标节点跟踪
Surender Redhu, R. Hegde
Mobile sinks are generally used in wireless sensor networks for energy-efficient data collection. Scheduling of mobile sink in a large scale network is a challenging problem. Tracing of some nodes in the network as landmark-nodes, via clustering can lead to efficient mobile sink scheduling. In this paper, a novel method for landmark-node tracing based on multi-agent random walks on network graphs is proposed. This method ensures low complexity while maintaining the clustering efficiency, especially over large WSN. Additionally, it is energy-efficient and improves the lifetime of a network. Low complexity of the proposed method is illustrated by analysing the cover time and hitting time of multi-agent random walks. Extensive experimental results obtained on Intel Berkeley Research Lab data indicate large improvements in energy-efficiency and computational complexity when the proposed method is used for landmark-node tracing.
移动接收器通常用于无线传感器网络中,以实现高能效的数据收集。大规模网络中移动sink的调度是一个具有挑战性的问题。将网络中的节点作为标杆节点,通过聚类方法进行跟踪,可以实现高效的移动sink调度。提出了一种基于网络图上多智能体随机行走的地标节点跟踪方法。该方法在保持聚类效率的同时保证了较低的复杂度,特别是在大型WSN上。此外,它是节能的,提高了网络的寿命。通过分析多智能体随机行走的覆盖时间和命中时间,说明了该方法的低复杂度。在英特尔伯克利研究实验室数据上获得的大量实验结果表明,当所提出的方法用于地标节点跟踪时,能源效率和计算复杂性有了很大的提高。
{"title":"Low complexity landmark-node tracing in WSNs using multi-agent random walks","authors":"Surender Redhu, R. Hegde","doi":"10.1145/3288599.3288628","DOIUrl":"https://doi.org/10.1145/3288599.3288628","url":null,"abstract":"Mobile sinks are generally used in wireless sensor networks for energy-efficient data collection. Scheduling of mobile sink in a large scale network is a challenging problem. Tracing of some nodes in the network as landmark-nodes, via clustering can lead to efficient mobile sink scheduling. In this paper, a novel method for landmark-node tracing based on multi-agent random walks on network graphs is proposed. This method ensures low complexity while maintaining the clustering efficiency, especially over large WSN. Additionally, it is energy-efficient and improves the lifetime of a network. Low complexity of the proposed method is illustrated by analysing the cover time and hitting time of multi-agent random walks. Extensive experimental results obtained on Intel Berkeley Research Lab data indicate large improvements in energy-efficiency and computational complexity when the proposed method is used for landmark-node tracing.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS and performance metrics for container-based virtualization in cloud environments 云环境中基于容器的虚拟化的QoS和性能指标
I. M. A. Jawarneh, P. Bellavista, L. Foschini, Giuseppe Martuscelli, R. Montanari, Amedeo Palopoli, F. Bosi
Current cloud deployments heavily depend on hypervisor-based virtualizations. The overarching characteristics of Docker and containerization have given them a momentum in their widespread adoption recently as alternatives for their counterparts. However, little research has been done for comparing the QoS of both technologies, thus leaving the domain without widely accepted performance metrics. Aiming at informing the decision of the best fit in a specific cloud deployment, we have designed performance metrics that compare the performance of both designs in an in-house cluster deployed by using OpenStack. We focus on well-established representatives as baselines, including KVM from the hypervisor-based side, LXD from the container-based side in addition to Docker. Our results show that containerization is not a predominant fit-all solution that can always replace hypervisors for all cluster deployment and application scenarios. It can instead be thought of as a complementary solution to use for specific application scenarios that are constrained with conditions that are solved by containerization merits.
当前的云部署严重依赖于基于管理程序的虚拟化。Docker和容器化的主要特性使它们最近被广泛采用,成为同类产品的替代品。然而,很少有研究对这两种技术的QoS进行比较,从而使该领域没有被广泛接受的性能指标。针对通知最适合的决定在一个特定的云部署,我们设计了性能指标比较这两款设计的性能在一个内部使用OpenStack集群部署。除了Docker之外,我们还专注于完善的代表作为基准,包括基于管理程序的KVM、基于容器的LXD。我们的结果表明,容器化并不是一种万能的解决方案,它不能替代所有集群部署和应用程序场景的管理程序。相反,它可以被视为一种补充解决方案,用于受容器化优点所解决的条件约束的特定应用程序场景。
{"title":"QoS and performance metrics for container-based virtualization in cloud environments","authors":"I. M. A. Jawarneh, P. Bellavista, L. Foschini, Giuseppe Martuscelli, R. Montanari, Amedeo Palopoli, F. Bosi","doi":"10.1145/3288599.3288631","DOIUrl":"https://doi.org/10.1145/3288599.3288631","url":null,"abstract":"Current cloud deployments heavily depend on hypervisor-based virtualizations. The overarching characteristics of Docker and containerization have given them a momentum in their widespread adoption recently as alternatives for their counterparts. However, little research has been done for comparing the QoS of both technologies, thus leaving the domain without widely accepted performance metrics. Aiming at informing the decision of the best fit in a specific cloud deployment, we have designed performance metrics that compare the performance of both designs in an in-house cluster deployed by using OpenStack. We focus on well-established representatives as baselines, including KVM from the hypervisor-based side, LXD from the container-based side in addition to Docker. Our results show that containerization is not a predominant fit-all solution that can always replace hypervisors for all cluster deployment and application scenarios. It can instead be thought of as a complementary solution to use for specific application scenarios that are constrained with conditions that are solved by containerization merits.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections 基于时间自相关和随机检测的ITS信标拒绝攻击检测
Shaheen Sultana, Fahiem Altaf, Mayank K. Aditia, M. S. Burra, Chanchal Maurya, Soumyadev Maity
For many Intelligent Transportation System (ITS) applications, periodic transmission of beacon messages by a source vehicle is paramount for providing the unhindered service and to maintain its accuracy. A malicious source vehicle could deny beacon messages of a target ITS application and intelligently cover-up this denial with signal loss faced due to wireless channel error and surrounding environment obstacles. In this context, we propose a lightweight technique to detect a beacon denial attacker using Auto-Correlation Function (ACF). This technique possesses higher detection accuracy in comparison to fixed threshold scheme which depends upon the number of beacon messages denied by the source vehicle. Furthermore, we propose a random vehicle inspection scheme for inspecting randomly chosen set of vehicles for beacon denial attack. In addition to reducing computational overhead, the advantage of this scheme is that an attacker with knowledge about detection algorithm cannot decide the time and place of inspection. Simulation results confirm the accurate and lightweight nature of the proposed technique.
对于许多智能交通系统(ITS)应用,由源车辆定期传输信标信息对于提供畅通无阻的服务和保持其准确性至关重要。恶意源车辆可以拒绝目标ITS应用程序的信标信息,并通过无线信道错误和周围环境障碍导致的信号丢失来智能地掩盖这种拒绝。在这种情况下,我们提出了一种使用自相关函数(ACF)检测信标拒绝攻击者的轻量级技术。与依赖于被源车辆拒绝的信标消息数量的固定阈值方案相比,该技术具有更高的检测精度。此外,我们还提出了一种随机车辆检测方案,对随机选择的车辆进行信标拒绝攻击检测。除了减少计算开销外,该方案的优点是,了解检测算法的攻击者无法确定检测的时间和地点。仿真结果证实了该技术的准确性和轻量化。
{"title":"Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections","authors":"Shaheen Sultana, Fahiem Altaf, Mayank K. Aditia, M. S. Burra, Chanchal Maurya, Soumyadev Maity","doi":"10.1145/3288599.3288616","DOIUrl":"https://doi.org/10.1145/3288599.3288616","url":null,"abstract":"For many Intelligent Transportation System (ITS) applications, periodic transmission of beacon messages by a source vehicle is paramount for providing the unhindered service and to maintain its accuracy. A malicious source vehicle could deny beacon messages of a target ITS application and intelligently cover-up this denial with signal loss faced due to wireless channel error and surrounding environment obstacles. In this context, we propose a lightweight technique to detect a beacon denial attacker using Auto-Correlation Function (ACF). This technique possesses higher detection accuracy in comparison to fixed threshold scheme which depends upon the number of beacon messages denied by the source vehicle. Furthermore, we propose a random vehicle inspection scheme for inspecting randomly chosen set of vehicles for beacon denial attack. In addition to reducing computational overhead, the advantage of this scheme is that an attacker with knowledge about detection algorithm cannot decide the time and place of inspection. Simulation results confirm the accurate and lightweight nature of the proposed technique.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129450553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1