首页 > 最新文献

2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks最新文献

英文 中文
A software tool to relate technical performance to user experience in a mobile context 一种在移动环境中将技术性能与用户体验联系起来的软件工具
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594902
T. Deryckere, W. Joseph, L. Martens, L. Marez, K. Moor, K. Berte
Users in todaypsilas mobile ICT environment are confronted with more and more innovations and an ever increasing technical quality, which makes them more demanding and harder to please. It is often hard to measure and to predict the user experience during service consumption. This is nevertheless a very important dimension that should be taken into account while developing applications or frameworks. In this paper we demonstrate a software tool that is integrated in a wireless living lab environment in order to validate and quantify actual user experience. The methodology to assess the user experience combines both technological and social assets. User experience of a Wineguide application on a PDA is related to signal strength, monitored during usage of the applications. Higher signal strengths correspond with a better experience (e.g. speed). Finally, difference in the experience among users will be discussed.
在当今的移动信息通信环境中,用户面临着越来越多的创新和不断提高的技术质量,这使得他们的要求越来越高,也越来越难以取悦。在服务消费期间,通常很难度量和预测用户体验。然而,这是在开发应用程序或框架时应该考虑的一个非常重要的方面。在本文中,我们展示了一个集成在无线生活实验室环境中的软件工具,以验证和量化实际用户体验。评估用户体验的方法结合了技术和社会资产。PDA上的Wineguide应用程序的用户体验与信号强度有关,在应用程序使用期间监控信号强度。更高的信号强度对应于更好的体验(例如速度)。最后,讨论用户之间的体验差异。
{"title":"A software tool to relate technical performance to user experience in a mobile context","authors":"T. Deryckere, W. Joseph, L. Martens, L. Marez, K. Moor, K. Berte","doi":"10.1109/WOWMOM.2008.4594902","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594902","url":null,"abstract":"Users in todaypsilas mobile ICT environment are confronted with more and more innovations and an ever increasing technical quality, which makes them more demanding and harder to please. It is often hard to measure and to predict the user experience during service consumption. This is nevertheless a very important dimension that should be taken into account while developing applications or frameworks. In this paper we demonstrate a software tool that is integrated in a wireless living lab environment in order to validate and quantify actual user experience. The methodology to assess the user experience combines both technological and social assets. User experience of a Wineguide application on a PDA is related to signal strength, monitored during usage of the applications. Higher signal strengths correspond with a better experience (e.g. speed). Finally, difference in the experience among users will be discussed.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the scalability of an efficient “Nonscalable” key distribution scheme 一种有效的“不可扩展”密钥分发方案的可扩展性
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594923
M. Ramkumar
Some important requirements of key distribution schemes for many emerging applications involving resource constrained devices (for example, ad hoc and sensor networks) are 1) low complexity; 2) the ability to support unmediated establishment of security associations and 3) scalability. We propose a novel key distribution scheme based on an elegant scheme proposed by Leighton and Micali (1994). While the scheme in (Leighton and Micali, 1994) was intended to be an alternative to Kerberos (employing a trusted server for mediation), the proposed modifications are towards realizing a scheme for nonmediated establishment of pairwise secrets. We enumerate several compelling advantages of the proposed scheme over existing schemes in the literature.
对于许多涉及资源受限设备的新兴应用(例如,ad hoc和传感器网络),密钥分配方案的一些重要要求是:1)低复杂性;2)支持无中介建立安全关联的能力和3)可伸缩性。我们在Leighton和Micali(1994)提出的一个优雅方案的基础上提出了一个新的密钥分配方案。虽然(Leighton和Micali, 1994)中的方案旨在成为Kerberos(使用可信服务器进行中介)的替代方案,但提出的修改是为了实现非中介建立成对秘密的方案。我们列举了几个令人信服的优势,所提出的方案比现有的方案在文献中。
{"title":"On the scalability of an efficient “Nonscalable” key distribution scheme","authors":"M. Ramkumar","doi":"10.1109/WOWMOM.2008.4594923","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594923","url":null,"abstract":"Some important requirements of key distribution schemes for many emerging applications involving resource constrained devices (for example, ad hoc and sensor networks) are 1) low complexity; 2) the ability to support unmediated establishment of security associations and 3) scalability. We propose a novel key distribution scheme based on an elegant scheme proposed by Leighton and Micali (1994). While the scheme in (Leighton and Micali, 1994) was intended to be an alternative to Kerberos (employing a trusted server for mediation), the proposed modifications are towards realizing a scheme for nonmediated establishment of pairwise secrets. We enumerate several compelling advantages of the proposed scheme over existing schemes in the literature.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cluster filtered KNN: A WLAN-based indoor positioning scheme 聚类滤波KNN:一种基于wlan的室内定位方案
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594840
Jun Ma, Xuansong Li, Xianping Tao, Jian Lu
Location Based Service (LBS) is one kind of ubiquitous applications whose functions are based on the locations of clients. The core of LBS is an effective positioning system. As wireless LAN (WLAN) costs less and is easy to access, using WLAN for indoor positioning has been widely studied recently. K nearest neighbors (KNN) is one of the basic deterministic fingerprint based algorithms and widely used for WLAN-based indoor positioning. However, KNN takes all the nearest K neighbors for calculating the estimated result, which could be improved if some selective work could be done to those neighbors beforehand. In this paper we propose a new scheme called "cluster filtered KNN" (CFK). CFK utilizes clustering technique to partition those neighbors into different clusters and chooses one cluster as the delegate. In the end, the final estimate can be calculated only based on the elements of the delegate. With experiments, we found that CFK does outperform KNN.
基于位置的服务(LBS)是一种普遍存在的应用程序,其功能是基于客户的位置。LBS的核心是一个有效的定位系统。由于无线局域网(WLAN)成本低、接入方便,利用无线局域网进行室内定位得到了广泛的研究。K近邻(KNN)是一种基本的确定性指纹定位算法,广泛应用于基于无线局域网的室内定位。然而,KNN取最近的K个邻居来计算估计结果,如果事先对这些邻居做一些选择性的工作,可以改善KNN的估计结果。本文提出了一种新的聚类滤波KNN (CFK)方案。CFK利用聚类技术将这些邻居划分为不同的簇,并选择一个簇作为委托。最后,最终的估计只能根据委托的元素来计算。通过实验,我们发现CFK确实优于KNN。
{"title":"Cluster filtered KNN: A WLAN-based indoor positioning scheme","authors":"Jun Ma, Xuansong Li, Xianping Tao, Jian Lu","doi":"10.1109/WOWMOM.2008.4594840","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594840","url":null,"abstract":"Location Based Service (LBS) is one kind of ubiquitous applications whose functions are based on the locations of clients. The core of LBS is an effective positioning system. As wireless LAN (WLAN) costs less and is easy to access, using WLAN for indoor positioning has been widely studied recently. K nearest neighbors (KNN) is one of the basic deterministic fingerprint based algorithms and widely used for WLAN-based indoor positioning. However, KNN takes all the nearest K neighbors for calculating the estimated result, which could be improved if some selective work could be done to those neighbors beforehand. In this paper we propose a new scheme called \"cluster filtered KNN\" (CFK). CFK utilizes clustering technique to partition those neighbors into different clusters and chooses one cluster as the delegate. In the end, the final estimate can be calculated only based on the elements of the delegate. With experiments, we found that CFK does outperform KNN.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Link-quality measurement enhancement for routing in wireless mesh networks 无线网状网络中路由的链路质量测量增强
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594842
Golnaz Karbaschi, A. Fladenmuller, B. Wolfinger
In this paper we introduce a novel distributed and robust link-quality measurement framework, called QualRoute. It exploits the existing traffic in the network in order to estimate accurately the quality of the links. Different from existing methods, our proposed scheme takes advantage of the broadcast nature of the wireless medium, and sets up an asynchronous cooperation between neighbors without any extra signaling between the node pairs. The simulation results suggest that the route derived from QualRoute yields to noticeably better performance than the traditional shortest path routes. Moreover, a comparison with a similar link-quality metric which is measured differently confirms the significant impact of the measurement scheme on the overall performance.
本文介绍了一种新的分布式鲁棒链路质量测量框架——QualRoute。它利用网络中现有的流量来准确地估计链路的质量。与现有方法不同的是,该方案利用无线媒体的广播特性,在节点对之间不需要任何额外的信令的情况下,在相邻节点之间建立异步协作。仿真结果表明,由QualRoute导出的路由的性能明显优于传统的最短路径路由。此外,与测量方式不同的类似链路质量度量进行比较,证实了测量方案对整体性能的重大影响。
{"title":"Link-quality measurement enhancement for routing in wireless mesh networks","authors":"Golnaz Karbaschi, A. Fladenmuller, B. Wolfinger","doi":"10.1109/WOWMOM.2008.4594842","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594842","url":null,"abstract":"In this paper we introduce a novel distributed and robust link-quality measurement framework, called QualRoute. It exploits the existing traffic in the network in order to estimate accurately the quality of the links. Different from existing methods, our proposed scheme takes advantage of the broadcast nature of the wireless medium, and sets up an asynchronous cooperation between neighbors without any extra signaling between the node pairs. The simulation results suggest that the route derived from QualRoute yields to noticeably better performance than the traditional shortest path routes. Moreover, a comparison with a similar link-quality metric which is measured differently confirms the significant impact of the measurement scheme on the overall performance.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124585620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multicarrier authentication at the physical layer 物理层的多载波认证
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594926
Paul L. Yu, J. Baras, Brian M. Sadler
Authentication is the process where claims of identity are verified. Though authentication mechanisms typically exist above the physical layer, physical layer methods have recently been introduced that do not require extra bandwidth. In this paper we propose a multi-carrier extension to the work and consider the stealth and robustness tradeoffs. We conclude by discussing the power-reliability tradeoff and the applicability to cross-layer security.
身份验证是验证身份声明的过程。虽然身份验证机制通常存在于物理层之上,但最近引入了不需要额外带宽的物理层方法。在本文中,我们提出了一种多载波扩展,并考虑了隐身性和鲁棒性的权衡。最后讨论了功率可靠性权衡和跨层安全性的适用性。
{"title":"Multicarrier authentication at the physical layer","authors":"Paul L. Yu, J. Baras, Brian M. Sadler","doi":"10.1109/WOWMOM.2008.4594926","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594926","url":null,"abstract":"Authentication is the process where claims of identity are verified. Though authentication mechanisms typically exist above the physical layer, physical layer methods have recently been introduced that do not require extra bandwidth. In this paper we propose a multi-carrier extension to the work and consider the stealth and robustness tradeoffs. We conclude by discussing the power-reliability tradeoff and the applicability to cross-layer security.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A new priority based congestion control protocol for Wireless Multimedia Sensor Networks 基于优先级的无线多媒体传感器网络拥塞控制协议
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594816
M. Moghaddam, D. Adjeroh
New applications made possible by the rapid improvements and miniaturization in hardware has motivated recent developments in wireless multimedia sensor networks (WMSNs). As multimedia applications produce high volumes of data which require high transmission rates, multimedia traffic is usually high speed. This may cause congestion in the sensor nodes, leading to impairments in the quality of service (QoS) of multimedia applications. Thus, to meet the QoS requirements of multimedia applications, a reliable and fair transport protocol is mandatory. An important function of the transport layer in WMSNs is congestion control. In this paper, we present a new queue based congestion control protocol with priority support (QCCP-PS), using the queue length as an indication of congestion degree. The rate assignment to each traffic source is based on its priority index as well as its current congestion degree. Simulation results show that the proposed QCCP-PS protocol can detect congestion better than previous mechanisms. Furthermore it has a good achieved priority close to the ideal and near-zero packet loss probability, which make it an efficient congestion control protocol for multimedia traffic in WMSNs. As congestion wastes the scarce energy due to a large number of retransmissions and packet drops, the proposed QCCP-PS protocol can save energy at each node, given the reduced number of retransmissions and packet losses.
硬件的快速改进和小型化使得新的应用成为可能,这推动了无线多媒体传感器网络(wmsn)的最新发展。由于多媒体应用产生的数据量大,对传输速率要求高,因此多媒体流量通常是高速的。这可能导致传感器节点拥塞,从而影响多媒体应用的服务质量。因此,为了满足多媒体应用对QoS的要求,一个可靠、公平的传输协议是必不可少的。wmsn中传输层的一个重要功能是拥塞控制。本文提出了一种新的具有优先级支持的基于队列的拥塞控制协议(QCCP-PS),该协议使用队列长度作为拥塞程度的指示。每个流量源的速率分配基于其优先级指数和当前的拥塞程度。仿真结果表明,所提出的QCCP-PS协议能够较好地检测拥塞。该协议具有接近理想的优先级和接近于零的丢包概率,是一种有效的wmsn多媒体流量拥塞控制协议。由于拥塞浪费了大量重传和丢包所带来的稀缺能量,提出的QCCP-PS协议在减少重传和丢包数量的情况下,可以在每个节点上节约能量。
{"title":"A new priority based congestion control protocol for Wireless Multimedia Sensor Networks","authors":"M. Moghaddam, D. Adjeroh","doi":"10.1109/WOWMOM.2008.4594816","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594816","url":null,"abstract":"New applications made possible by the rapid improvements and miniaturization in hardware has motivated recent developments in wireless multimedia sensor networks (WMSNs). As multimedia applications produce high volumes of data which require high transmission rates, multimedia traffic is usually high speed. This may cause congestion in the sensor nodes, leading to impairments in the quality of service (QoS) of multimedia applications. Thus, to meet the QoS requirements of multimedia applications, a reliable and fair transport protocol is mandatory. An important function of the transport layer in WMSNs is congestion control. In this paper, we present a new queue based congestion control protocol with priority support (QCCP-PS), using the queue length as an indication of congestion degree. The rate assignment to each traffic source is based on its priority index as well as its current congestion degree. Simulation results show that the proposed QCCP-PS protocol can detect congestion better than previous mechanisms. Furthermore it has a good achieved priority close to the ideal and near-zero packet loss probability, which make it an efficient congestion control protocol for multimedia traffic in WMSNs. As congestion wastes the scarce energy due to a large number of retransmissions and packet drops, the proposed QCCP-PS protocol can save energy at each node, given the reduced number of retransmissions and packet losses.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Improving the resiliency of Ariadne 提高阿里阿德涅的复原力
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594927
K. Sivakumar, M. Ramkumar
Ariadne is a popular secure ad hoc routing protocol based on the dynamic source routing (DSR) protocol. While Ariadne was designed to be capable of detecting attacks by non colluding attackers, it does not include measures to identify or narrow down perpetrators responsible for such attacks. We propose some modifications to Ariadne to improve its resiliency, by affording the ability to identify and route around malicious nodes.
Ariadne是一种基于动态源路由(DSR)协议的安全自组织路由协议。虽然阿里阿德涅被设计为能够检测非串通攻击者的攻击,但它没有包括识别或缩小此类攻击的肇事者的措施。我们建议对Ariadne进行一些修改,通过提供识别和路由恶意节点的能力来提高其弹性。
{"title":"Improving the resiliency of Ariadne","authors":"K. Sivakumar, M. Ramkumar","doi":"10.1109/WOWMOM.2008.4594927","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594927","url":null,"abstract":"Ariadne is a popular secure ad hoc routing protocol based on the dynamic source routing (DSR) protocol. While Ariadne was designed to be capable of detecting attacks by non colluding attackers, it does not include measures to identify or narrow down perpetrators responsible for such attacks. We propose some modifications to Ariadne to improve its resiliency, by affording the ability to identify and route around malicious nodes.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A multi-user ad-hoc resource manager for smart spaces 用于智能空间的多用户临时资源管理器
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594887
Gonzalo Huerta Cánepa, Dongman Lee
Advancement in mobile devices makes possible to add more features to them while reducing the size. If we also consider the fact that they posses advance communications features, we can convert these devices into the central manager of userspsila activities. One feature in this line is the ability to control the devices surrounding the user. Problems arise when the devices belong to a shared space. In this case we also need to consider interactions and conflicts between users. In this research we present a multi-user ad-hoc resource manager for smart spaces, which allow us to control devices present in the area, and avoid conflicts between users.
移动设备的进步使得在减小尺寸的同时增加更多的功能成为可能。如果我们还考虑到它们具有高级通信功能的事实,我们可以将这些设备转换为用户活动的中央管理器。这一行的一个特性是能够控制用户周围的设备。当设备属于共享空间时,问题就出现了。在这种情况下,我们还需要考虑用户之间的交互和冲突。在这项研究中,我们提出了一个多用户自组织的智能空间资源管理器,它允许我们控制区域内存在的设备,并避免用户之间的冲突。
{"title":"A multi-user ad-hoc resource manager for smart spaces","authors":"Gonzalo Huerta Cánepa, Dongman Lee","doi":"10.1109/WOWMOM.2008.4594887","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594887","url":null,"abstract":"Advancement in mobile devices makes possible to add more features to them while reducing the size. If we also consider the fact that they posses advance communications features, we can convert these devices into the central manager of userspsila activities. One feature in this line is the ability to control the devices surrounding the user. Problems arise when the devices belong to a shared space. In this case we also need to consider interactions and conflicts between users. In this research we present a multi-user ad-hoc resource manager for smart spaces, which allow us to control devices present in the area, and avoid conflicts between users.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
di-jest: Autonomic neighbour management for worm resilience in p2p systems p2p系统中蠕虫弹性的自主邻居管理
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594898
D. McIlwraith, M. Paquier, Evangelos Kotsovinos
Internet worms pose a serious and ongoing threat to system security, often resulting in significant service downtime and disruption. In recent years peer-to-peer (p2p) networks have become a target for the deployment of worms as their high connectivity allows for rapid dissemination and homogeneity of the adopted software platform ensures the existence of common susceptibilities. In this paper we observe that peer similarity in p2p networks can greatly increase overall vulnerability; peers with largely different system characteristics are unlikely to be infected by the same worm. With this in mind we present di-jest - an autonomic method for neighbour selection based on heterogeneity. Our results show the efficacy of di-jest in reducing the spread rate and potency of p2p worms. By selecting neighbours with different system characteristics di-jest can reduce the number of peers infected by a worm by up to 80%.
Internet蠕虫对系统安全构成严重和持续的威胁,经常导致严重的服务停机和中断。近年来,点对点(p2p)网络已成为蠕虫部署的目标,因为它们的高连接性允许快速传播,所采用的软件平台的同质性确保了共同敏感性的存在。在本文中,我们观察到对等网络中的对等相似性会大大增加整体脆弱性;系统特征大不相同的节点不太可能被同一蠕虫感染。考虑到这一点,我们提出了dijest -一种基于异质性的邻居选择的自主方法。我们的研究结果表明,dijest在降低p2p蠕虫的传播速度和效力方面具有有效性。通过选择具有不同系统特征的邻居,dijest可以减少被蠕虫感染的对等体数量,最多可减少80%。
{"title":"di-jest: Autonomic neighbour management for worm resilience in p2p systems","authors":"D. McIlwraith, M. Paquier, Evangelos Kotsovinos","doi":"10.1109/WOWMOM.2008.4594898","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594898","url":null,"abstract":"Internet worms pose a serious and ongoing threat to system security, often resulting in significant service downtime and disruption. In recent years peer-to-peer (p2p) networks have become a target for the deployment of worms as their high connectivity allows for rapid dissemination and homogeneity of the adopted software platform ensures the existence of common susceptibilities. In this paper we observe that peer similarity in p2p networks can greatly increase overall vulnerability; peers with largely different system characteristics are unlikely to be infected by the same worm. With this in mind we present di-jest - an autonomic method for neighbour selection based on heterogeneity. Our results show the efficacy of di-jest in reducing the spread rate and potency of p2p worms. By selecting neighbours with different system characteristics di-jest can reduce the number of peers infected by a worm by up to 80%.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Recent progress in moving cognitive radio and services to deployment 将认知无线电和服务推向部署的最新进展
Pub Date : 2008-06-23 DOI: 10.1109/WOWMOM.2008.4594812
P. Marshall
Ongoing research and experimentation activities have rapidly created confidence in the ability to transition from conventional radios to those introducing initial functionality proposed for Dynamic Spectrum Access and Cognitive Radio. Additionally, work on networking concepts, such as Delay Tolerant Networking and Disruption Tolerant Networks provide service architectures appropriate to dynamic and self-reliant edge networks. These technologies make it possible to consider wireless networks that are much more robust, scalable, and self-reliant than was conceived of in the past.
正在进行的研究和实验活动迅速建立了从传统无线电过渡到引入动态频谱接入和认知无线电的初始功能的能力的信心。此外,网络概念方面的工作,如延迟容忍网络和中断容忍网络,提供了适合动态和自依赖边缘网络的服务架构。这些技术使得考虑比过去设想的更加健壮、可扩展和自力更生的无线网络成为可能。
{"title":"Recent progress in moving cognitive radio and services to deployment","authors":"P. Marshall","doi":"10.1109/WOWMOM.2008.4594812","DOIUrl":"https://doi.org/10.1109/WOWMOM.2008.4594812","url":null,"abstract":"Ongoing research and experimentation activities have rapidly created confidence in the ability to transition from conventional radios to those introducing initial functionality proposed for Dynamic Spectrum Access and Cognitive Radio. Additionally, work on networking concepts, such as Delay Tolerant Networking and Disruption Tolerant Networks provide service architectures appropriate to dynamic and self-reliant edge networks. These technologies make it possible to consider wireless networks that are much more robust, scalable, and self-reliant than was conceived of in the past.","PeriodicalId":346269,"journal":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1