首页 > 最新文献

2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)最新文献

英文 中文
Cross-layer switch handover in Software defined Wireless Networks 软件定义无线网络中的跨层交换机切换
Y. Reddy, D. Krishnaswamy, B. S. Manoj
Software-defined networking (SDN) is evolving to be one of the most important technologies for managing networks efficiently with minimum complexity. SDN achieves flexible routing by decoupling control and data planes. The control-plane populates forwarding devices with flow tables which contain actions to forward packets. OpenFlow is a standard protocol which enables the communication between the control-plane and the data-plane. Communications between a controller and a switch in Software-defined Wireless Networks are prone to failure. In this regard, a distributed control plane can be worth considering. In addition, since a controller possesses limited packet processing capabilities, we need to have an efficient solution for switch handover. In this work, we have studied the issues associated with OpenFlow wireless networks and have proposed a cross-layer handover solution for efficient switch handover. Our Cross-Layer OpenFlow Switch handover utilizes the RSSI of wireless links and the traffic load of Controllers for effective handover decision-making. We have further enhanced our cross-layer switch handover with a soft handover capability in order to avoid the packet drops due to hard handover. We have developed a test-bed for OpenFlow Wireless networks for evaluating the performance of our handover strategies. On an average, the packet drops observed were 10 and 8 during high traffic load and moderate traffic load, respectively, in Cross-Layer OpenFlow Switch handovers. Additionally, the soft handover extension eliminated the packet drops during switch handovers. The time taken for the switch handover is measured to be around 4.92 ms.
软件定义网络(SDN)正在发展成为以最小复杂性高效管理网络的最重要技术之一。SDN通过解耦控制平面和数据平面实现灵活的路由。控制平面用流表填充转发设备,流表包含转发数据包的动作。OpenFlow是一种标准协议,用于实现控制平面和数据平面之间的通信。在软件定义无线网络中,控制器和交换机之间的通信容易出现故障。在这方面,分布式控制平面值得考虑。此外,由于控制器的数据包处理能力有限,我们需要一个有效的切换解决方案。在这项工作中,我们研究了与OpenFlow无线网络相关的问题,并提出了一种跨层切换解决方案,以实现高效的交换机切换。我们的跨层OpenFlow交换机切换利用无线链路的RSSI和控制器的流量负载进行有效的切换决策。为了避免硬切换造成的数据包丢失,我们进一步增强了跨层交换机切换的软切换能力。我们已经为OpenFlow无线网络开发了一个测试平台,用于评估我们的切换策略的性能。在跨层OpenFlow交换机切换中,在高流量负载和中等流量负载期间,平均观察到的数据包丢弃次数分别为10和8。此外,软切换扩展消除了交换机切换期间的数据包丢失。开关切换所花费的时间约为4.92 ms。
{"title":"Cross-layer switch handover in Software defined Wireless Networks","authors":"Y. Reddy, D. Krishnaswamy, B. S. Manoj","doi":"10.1109/ANTS.2015.7413639","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413639","url":null,"abstract":"Software-defined networking (SDN) is evolving to be one of the most important technologies for managing networks efficiently with minimum complexity. SDN achieves flexible routing by decoupling control and data planes. The control-plane populates forwarding devices with flow tables which contain actions to forward packets. OpenFlow is a standard protocol which enables the communication between the control-plane and the data-plane. Communications between a controller and a switch in Software-defined Wireless Networks are prone to failure. In this regard, a distributed control plane can be worth considering. In addition, since a controller possesses limited packet processing capabilities, we need to have an efficient solution for switch handover. In this work, we have studied the issues associated with OpenFlow wireless networks and have proposed a cross-layer handover solution for efficient switch handover. Our Cross-Layer OpenFlow Switch handover utilizes the RSSI of wireless links and the traffic load of Controllers for effective handover decision-making. We have further enhanced our cross-layer switch handover with a soft handover capability in order to avoid the packet drops due to hard handover. We have developed a test-bed for OpenFlow Wireless networks for evaluating the performance of our handover strategies. On an average, the packet drops observed were 10 and 8 during high traffic load and moderate traffic load, respectively, in Cross-Layer OpenFlow Switch handovers. Additionally, the soft handover extension eliminated the packet drops during switch handovers. The time taken for the switch handover is measured to be around 4.92 ms.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rumor detection in twitter: An analysis in retrospect twitter中的谣言检测:回顾分析
Raveena Dayani, Nikita Chhabra, Taruna Kadian, Rishabh Kaushal
Online social media websites like Twitter has become one of the most popular platforms for people to obtain or spread information. However, in absence of any moderation and use of crowd sourcing, there is no guarantee that the information shared is credible or not. This makes online social media highly susceptible to the spread of rumors. As part of our work, we investigate in retrospect a dataset on which rumor detection was done in the past in 2009 and perform machine learning algorithms like k-nearest neighbor and naive bayes classifier to detect tweets spreading rumors. We present the results of our retrospective analysis and extraction of user attributes. An algorithm for preprocessing on tweet content is proposed to retain key information to be passed on to learning algorithm to obtain improved results as far as rumor detection accuracy is concerned.
像Twitter这样的在线社交媒体网站已经成为人们获取或传播信息的最受欢迎的平台之一。然而,在没有任何节制和使用众包的情况下,无法保证共享的信息是可信的或不可信的。这使得在线社交媒体极易受到谣言传播的影响。作为我们工作的一部分,我们回顾了一个数据集,该数据集在2009年进行了谣言检测,并执行了像k近邻和朴素贝叶斯分类器这样的机器学习算法来检测传播谣言的推文。我们展示了回顾性分析和用户属性提取的结果。提出了一种对推文内容进行预处理的算法,保留关键信息传递给学习算法,以提高谣言检测的准确率。
{"title":"Rumor detection in twitter: An analysis in retrospect","authors":"Raveena Dayani, Nikita Chhabra, Taruna Kadian, Rishabh Kaushal","doi":"10.1109/ANTS.2015.7413660","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413660","url":null,"abstract":"Online social media websites like Twitter has become one of the most popular platforms for people to obtain or spread information. However, in absence of any moderation and use of crowd sourcing, there is no guarantee that the information shared is credible or not. This makes online social media highly susceptible to the spread of rumors. As part of our work, we investigate in retrospect a dataset on which rumor detection was done in the past in 2009 and perform machine learning algorithms like k-nearest neighbor and naive bayes classifier to detect tweets spreading rumors. We present the results of our retrospective analysis and extraction of user attributes. An algorithm for preprocessing on tweet content is proposed to retain key information to be passed on to learning algorithm to obtain improved results as far as rumor detection accuracy is concerned.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Target coverage using a collaborative platform for sensor cloud 目标覆盖使用传感器云协作平台
Biplab K. Sen, Sunirmal Khatua, R. Das
Nowadays Sensor-cloud has received a lot of interests among researchers in the field of Wireless Sensor Networks (WSN) as well as Cloud Computing. An integral part of the Sensor Cloud platform is the Collaboration of WSN providers which improves the utilization of sensor resources. The physical sensors in such a collaborative environment are shared among multiple applications from different administrative domains. In this paper, we propose a Sensor Cloud Architecture which allows the users to deploy their sensor applications on-demand within the collaborative platform. The sensor resources used by the application are provided as a service to the user. The cost for offering such service depends on the number of physical sensors selected for covering the targets (locations of interest) for that application as well as connecting the selected physical sensors to the base station. In this paper, we proposed a two phase algorithm for this problem. In the first phase (Coverage), an Integer Programming Problem(IPP) is used to find a minimum set of sensors to cover the targets. In the next phase (Connectivity) a heuristic is used to extend the set such that connectivity of all the selected sensors is ensured. The performance of the proposed approach is validated through simulation which shows significant improvement of using collaboration over multiple non-collaborative WSNs. We also establish the superiority of the heuristic for ensuring connectivity over one such algorithm in the literature.
目前,传感器云已经成为无线传感器网络(WSN)和云计算领域的研究热点。传感器云平台的一个组成部分是无线传感器网络供应商之间的协作,它提高了传感器资源的利用率。这种协作环境中的物理传感器在来自不同管理域的多个应用程序之间共享。在本文中,我们提出了一个传感器云架构,允许用户在协作平台内按需部署他们的传感器应用程序。应用程序使用的传感器资源作为服务提供给用户。提供这种服务的成本取决于为该应用所选择的覆盖目标(感兴趣的位置)的物理传感器的数量以及将所选择的物理传感器连接到基站的数量。本文针对该问题提出了一种两阶段算法。在第一阶段(覆盖),使用整数规划问题(IPP)找到覆盖目标的最小传感器集。在下一阶段(连通性)中,使用启发式方法扩展集合,以确保所有选定传感器的连通性。通过仿真验证了该方法的性能,表明在多个非协作wsn上使用协作具有显著的改进。我们还在文献中建立了启发式算法在确保连通性方面的优越性。
{"title":"Target coverage using a collaborative platform for sensor cloud","authors":"Biplab K. Sen, Sunirmal Khatua, R. Das","doi":"10.1109/ANTS.2015.7413651","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413651","url":null,"abstract":"Nowadays Sensor-cloud has received a lot of interests among researchers in the field of Wireless Sensor Networks (WSN) as well as Cloud Computing. An integral part of the Sensor Cloud platform is the Collaboration of WSN providers which improves the utilization of sensor resources. The physical sensors in such a collaborative environment are shared among multiple applications from different administrative domains. In this paper, we propose a Sensor Cloud Architecture which allows the users to deploy their sensor applications on-demand within the collaborative platform. The sensor resources used by the application are provided as a service to the user. The cost for offering such service depends on the number of physical sensors selected for covering the targets (locations of interest) for that application as well as connecting the selected physical sensors to the base station. In this paper, we proposed a two phase algorithm for this problem. In the first phase (Coverage), an Integer Programming Problem(IPP) is used to find a minimum set of sensors to cover the targets. In the next phase (Connectivity) a heuristic is used to extend the set such that connectivity of all the selected sensors is ensured. The performance of the proposed approach is validated through simulation which shows significant improvement of using collaboration over multiple non-collaborative WSNs. We also establish the superiority of the heuristic for ensuring connectivity over one such algorithm in the literature.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"62 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of secondary user with combined RF and non-RF based energy-harvesting in cognitive radio network 认知无线电网络中射频与非射频联合能量采集的二次用户性能
A. Bhowmick, Sanjay Dhar Roy, S. Kundu
In this paper the performance of a cognitive radio (CR)network is investigated under harvesting of energy from combined RF signal and ambient sources, i.e., non-RF signal. The CR harvests energy from ambient sources as well as from primary user (PU) signal depending on the sensing decision. The quality of service (QoS) of PU is protected in terms of collision probability. The performance has been investigated in terms of harvested energy, throughput and harvested energy left for next detection cycle with respect to different sensing parameters such as sensing channel SNR, collision probability and sensing time etc. A Novel analytical expressions of harvested energy and throughput are developed under such scenario.
本文研究了认知无线电(CR)网络在射频信号和环境源(即非射频信号)联合能量采集下的性能。根据传感决策,CR从环境源以及主用户(PU)信号中获取能量。从碰撞概率的角度保护PU的服务质量(QoS)。根据不同的传感参数(如传感信道信噪比、碰撞概率和传感时间等),研究了该算法的性能,包括收获的能量、吞吐量和为下一个检测周期留下的收获能量。在这种情况下,提出了一种新的收获能量和吞吐量的解析表达式。
{"title":"Performance of secondary user with combined RF and non-RF based energy-harvesting in cognitive radio network","authors":"A. Bhowmick, Sanjay Dhar Roy, S. Kundu","doi":"10.1109/ANTS.2015.7413665","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413665","url":null,"abstract":"In this paper the performance of a cognitive radio (CR)network is investigated under harvesting of energy from combined RF signal and ambient sources, i.e., non-RF signal. The CR harvests energy from ambient sources as well as from primary user (PU) signal depending on the sensing decision. The quality of service (QoS) of PU is protected in terms of collision probability. The performance has been investigated in terms of harvested energy, throughput and harvested energy left for next detection cycle with respect to different sensing parameters such as sensing channel SNR, collision probability and sensing time etc. A Novel analytical expressions of harvested energy and throughput are developed under such scenario.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115777612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Coverage area maximization by heterogeneous sensor nodes with minimum displacement in mobile networks 移动网络中位移最小的异构传感器节点覆盖面积最大化
D. Saha, Avirup Das
Given a random deployment of heterogeneous mobile nodes having different sensing ranges, this paper addresses the problem of covering a region using minimum number of nodes with minimum displacement. We propose an energy-efficient and light-weight self-organized distributed greedy heuristic to maximize area coverage such that the amount of computation, rounds of communication, and the distance traversed by a node, can be reduced utilizing minimal number of nodes. Extensive simulation studies on random deployment of nodes with sufficient node density over a 2-D area, show that our proposed technique results hole free area coverage with small number of nodes with minimum possible displacement, both in turn help to prolong the network lifetime.
给定具有不同感知范围的异构移动节点的随机部署,本文解决了用最小位移的最小节点数覆盖一个区域的问题。我们提出了一种节能且轻量级的自组织分布式贪婪启发式算法,以最大化区域覆盖,从而可以利用最少的节点数量来减少计算量、通信轮数和节点穿越的距离。大量的模拟研究表明,在二维区域内随机部署具有足够节点密度的节点,我们提出的技术可以实现以最小可能位移的少量节点覆盖无孔区域,从而有助于延长网络寿命。
{"title":"Coverage area maximization by heterogeneous sensor nodes with minimum displacement in mobile networks","authors":"D. Saha, Avirup Das","doi":"10.1109/ANTS.2015.7413629","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413629","url":null,"abstract":"Given a random deployment of heterogeneous mobile nodes having different sensing ranges, this paper addresses the problem of covering a region using minimum number of nodes with minimum displacement. We propose an energy-efficient and light-weight self-organized distributed greedy heuristic to maximize area coverage such that the amount of computation, rounds of communication, and the distance traversed by a node, can be reduced utilizing minimal number of nodes. Extensive simulation studies on random deployment of nodes with sufficient node density over a 2-D area, show that our proposed technique results hole free area coverage with small number of nodes with minimum possible displacement, both in turn help to prolong the network lifetime.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125670031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
INFLATE: Incremental wireless transmission for sensor information in industrial environments 膨胀:工业环境中传感器信息的增量无线传输
R. Naumann, S. Dietzel, B. Scheuermann
As smart factory trends gain momentum, there is a growing need for robust information transmission protocols that make available sensor information gathered by individual machines and enable their algorithmic exploitation. Wireless transmission enables often-called-for flexibility, yet it poses challenges for reliable and timely transmission of information. This paper proposes a wireless transmission scheme for sensor information of production cycles in industrial environments. We include a preview functionality based on a discrete cosine transform that allows for rapid detection of problematic characteristics. The transmitted information's precision is improved using incremental updates as wireless capacity permits. Further, we include compact meta data that allows receivers to bound the received information's error. Evaluation results show that, even with high packet loss, characteristic features of sensor information are available early, and that error bounds closely follow the actual error.
随着智能工厂趋势的发展,越来越需要强大的信息传输协议,使单个机器收集的传感器信息可用,并使其算法得以利用。无线传输实现了人们常说的灵活性,但它对信息的可靠和及时传输提出了挑战。提出了一种工业环境下生产周期传感器信息的无线传输方案。我们包含了一个基于离散余弦变换的预览功能,允许快速检测有问题的特征。在无线容量允许的情况下,使用增量更新来提高传输信息的精度。此外,我们还包括紧凑的元数据,允许接收器绑定接收到的信息的错误。评估结果表明,即使丢包率较高,传感器信息的特征特征也能较早得到,且误差范围与实际误差接近。
{"title":"INFLATE: Incremental wireless transmission for sensor information in industrial environments","authors":"R. Naumann, S. Dietzel, B. Scheuermann","doi":"10.1109/ANTS.2015.7413631","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413631","url":null,"abstract":"As smart factory trends gain momentum, there is a growing need for robust information transmission protocols that make available sensor information gathered by individual machines and enable their algorithmic exploitation. Wireless transmission enables often-called-for flexibility, yet it poses challenges for reliable and timely transmission of information. This paper proposes a wireless transmission scheme for sensor information of production cycles in industrial environments. We include a preview functionality based on a discrete cosine transform that allows for rapid detection of problematic characteristics. The transmitted information's precision is improved using incremental updates as wireless capacity permits. Further, we include compact meta data that allows receivers to bound the received information's error. Evaluation results show that, even with high packet loss, characteristic features of sensor information are available early, and that error bounds closely follow the actual error.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decision making in assessment of RRAP of WSN using fuzzy-hybrid approach 基于模糊混合方法的无线传感器网络RRAP评价决策
A. Banerjee, M. Gavrilas, G. Grigoraș, Samiran Chattopadhyay
Reliability Redundancy Allocation Problem (RRAP) in Wireless Sensor Network (WSN) system is obviously an important problem. The basic function of WSN system is to provide surveillance data transmission over a specified area maintaining minimum power consumption (minimum cost), occupying minimum volume and weight of system components with a reasonable level of reliability. In this paper, a decision making assessment of reliability of Redundancy Allocation Problem (RAP) is proposed using fuzzy approach. The fuzzy approach incurs the virtue of uncertainty in account to make the approach more practical. Triangular Fuzzy membership function is introduced to produce fuzzy number set as input variables (cost, weight and volume) to a hybrid optimization algorithm. The hybrid meta-heuristic algorithm aiming for reliability optimization in RAP of system components of WSN is discussed. This algorithm is based on a new hybrid algorithm using Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). The fuzzy results obtained are used to exhibit decision making matrix to enhance decidability property of WSN. Finally after defuzzification crisp data are obtained and compared with other approaches from literature and found satisfactory.
在无线传感器网络(WSN)系统中,可靠性冗余分配问题显然是一个重要的问题。WSN系统的基本功能是在指定区域内提供监控数据传输,保持最小的功耗(最小的成本),占用最小的系统组件体积和重量,并具有合理的可靠性。本文采用模糊方法对冗余分配问题(RAP)的可靠性进行决策评估。模糊方法引入了考虑不确定性的优点,使该方法更加实用。引入三角模糊隶属函数产生模糊数集作为混合优化算法的输入变量(成本、权重和体积)。讨论了基于混合元启发式算法的无线传感器网络系统组件RAP可靠性优化问题。该算法是基于遗传算法和粒子群算法的一种新的混合算法。将得到的模糊结果用于表示决策矩阵,以增强无线传感器网络的可判决性。最后进行去模糊处理,得到清晰的数据,并与文献中其他方法进行比较,结果令人满意。
{"title":"Decision making in assessment of RRAP of WSN using fuzzy-hybrid approach","authors":"A. Banerjee, M. Gavrilas, G. Grigoraș, Samiran Chattopadhyay","doi":"10.1109/ANTS.2015.7413655","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413655","url":null,"abstract":"Reliability Redundancy Allocation Problem (RRAP) in Wireless Sensor Network (WSN) system is obviously an important problem. The basic function of WSN system is to provide surveillance data transmission over a specified area maintaining minimum power consumption (minimum cost), occupying minimum volume and weight of system components with a reasonable level of reliability. In this paper, a decision making assessment of reliability of Redundancy Allocation Problem (RAP) is proposed using fuzzy approach. The fuzzy approach incurs the virtue of uncertainty in account to make the approach more practical. Triangular Fuzzy membership function is introduced to produce fuzzy number set as input variables (cost, weight and volume) to a hybrid optimization algorithm. The hybrid meta-heuristic algorithm aiming for reliability optimization in RAP of system components of WSN is discussed. This algorithm is based on a new hybrid algorithm using Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). The fuzzy results obtained are used to exhibit decision making matrix to enhance decidability property of WSN. Finally after defuzzification crisp data are obtained and compared with other approaches from literature and found satisfactory.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework for continuity of mission-critical network services 关键任务网络服务连续性的框架
Rajiv Kumar, P. Chołda
A framework for the continuous delivery of mission-critical network services is proposed. The risk involved is assessed in a binary way, i.e., there is no risk until the network system supports the services up to the intended duration; otherwise, the mission fails and this gives rise to failure impact. The proposed framework is used to allocate network resources.
提出了一个关键任务网络服务持续交付的框架。所涉及的风险以二元方式进行评估,即,在网络系统支持服务达到预期持续时间之前不存在风险;否则,任务失败,这就产生了失败影响。该框架用于网络资源的分配。
{"title":"A framework for continuity of mission-critical network services","authors":"Rajiv Kumar, P. Chołda","doi":"10.1109/ANTS.2015.7413662","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413662","url":null,"abstract":"A framework for the continuous delivery of mission-critical network services is proposed. The risk involved is assessed in a binary way, i.e., there is no risk until the network system supports the services up to the intended duration; otherwise, the mission fails and this gives rise to failure impact. The proposed framework is used to allocate network resources.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Capacity improvement of reversible data hiding scheme through better prediction and double cycle embedding process 通过更好的预测和双周期嵌入过程提高可逆数据隐藏方案的容量
A. Kamal, M. M. Islam
For better protection of surreptitious information from the intruders, steganography is now a widely used technique for hiding information through bits embedding inside a picture, speech and other multimedia contents. Among many different steganography schemes, prediction errors based reversible data hiding methods are more effective for security reasons. Nevertheless such techniques presented so far can embed limited number of message bits in a cover media and thus limit the length of covert message to be sent through embedding. In this paper, the authors presented a novel embedding process, called double cycle embedding scheme, where embedding capacity is increased significantly by modifying the scheme of estimation of pixel values, the block-variance calculation technique, selecting two highest most peaks in the histogram regardless their positions and embedding twice in the same cover image. The scheme also modified the pixel-prediction technique for the better predictions and for generalization of block-sizes in the cover image to increase the robustness of the policy. The experimental results demonstrate that the proposed scheme dictates other competing schemes with an embedding gain of 40%~700% depending on the cover image. The experimental results also demonstrate that the scheme exhibits stronger resistance against several statistical attacks, e.g. Benford generalized laws, SPAM features.
为了更好地保护秘密信息不被入侵者窃取,隐写术现在是一种广泛使用的技术,它通过嵌入在图片、语音和其他多媒体内容中的比特来隐藏信息。在许多不同的隐写方案中,基于预测误差的可逆数据隐藏方法在安全性方面更为有效。然而,目前所提出的这些技术只能在隐藏媒体中嵌入有限数量的信息位,从而限制了通过嵌入发送的隐蔽信息的长度。本文提出了一种新的嵌入方法——双周期嵌入方案,该方案通过修改像素值估计方案、块方差计算技术,在直方图中选择两个最大的峰,而不考虑其位置,在同一封面图像中进行两次嵌入,从而显著提高了嵌入容量。该方案还改进了像素预测技术,以更好地预测和推广覆盖图像中的块大小,以提高策略的鲁棒性。实验结果表明,根据不同的覆盖图像,该方法的嵌入增益可达40%~700%。实验结果还表明,该方案对Benford广义定律、SPAM特征等统计攻击具有较强的抵抗能力。
{"title":"Capacity improvement of reversible data hiding scheme through better prediction and double cycle embedding process","authors":"A. Kamal, M. M. Islam","doi":"10.1109/ANTS.2015.7413636","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413636","url":null,"abstract":"For better protection of surreptitious information from the intruders, steganography is now a widely used technique for hiding information through bits embedding inside a picture, speech and other multimedia contents. Among many different steganography schemes, prediction errors based reversible data hiding methods are more effective for security reasons. Nevertheless such techniques presented so far can embed limited number of message bits in a cover media and thus limit the length of covert message to be sent through embedding. In this paper, the authors presented a novel embedding process, called double cycle embedding scheme, where embedding capacity is increased significantly by modifying the scheme of estimation of pixel values, the block-variance calculation technique, selecting two highest most peaks in the histogram regardless their positions and embedding twice in the same cover image. The scheme also modified the pixel-prediction technique for the better predictions and for generalization of block-sizes in the cover image to increase the robustness of the policy. The experimental results demonstrate that the proposed scheme dictates other competing schemes with an embedding gain of 40%~700% depending on the cover image. The experimental results also demonstrate that the scheme exhibits stronger resistance against several statistical attacks, e.g. Benford generalized laws, SPAM features.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack 利用DHCP服务器端IP地址冲突检测:DHCP饥渴攻击
Nikhil Tripathi, N. Hubballi
Dynamic Host Configuration Protocol (DHCP) starvation is an insider attack which prevents legitimate DHCP clients from acquiring network configuration parameters from DHCP server. The classical methods of creating starvation attack has a practical difficulty in wireless networks where an Access Point (AP) mandates a client to associate with unique MAC address before it can transmit such requests. This limits the effectiveness of starvation in wireless networks. In this paper, we describe a new method of creating starvation which is effective in both wired and wireless networks. This new method exploits a precautionary probing done by a DHCP server as described in RFC 2131. This probing verifies the to be offered IP address for accidental usage by other clients in the network. We show that a malicious insider can just send spoofed replies to these probes to create the effect of starvation in both wired and wireless networks.
DHCP (Dynamic Host Configuration Protocol)饥饿是一种内部攻击,其目的是阻止合法的DHCP客户端从DHCP服务器获取网络配置参数。在无线网络中,接入点(AP)要求客户端在传输此类请求之前必须与唯一的MAC地址相关联,因此创建饥饿攻击的经典方法具有实际困难。这限制了无线网络中饥饿的有效性。在本文中,我们描述了一种在有线和无线网络中有效的创建饥饿的新方法。这种新方法利用了RFC 2131中描述的DHCP服务器进行的预防性探测。这种探测验证要提供的IP地址是否会被网络中的其他客户端意外使用。我们表明,恶意的内部人员可以向这些探测器发送欺骗的回复,从而在有线和无线网络中造成饥饿的效果。
{"title":"Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack","authors":"Nikhil Tripathi, N. Hubballi","doi":"10.1109/ANTS.2015.7413661","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413661","url":null,"abstract":"Dynamic Host Configuration Protocol (DHCP) starvation is an insider attack which prevents legitimate DHCP clients from acquiring network configuration parameters from DHCP server. The classical methods of creating starvation attack has a practical difficulty in wireless networks where an Access Point (AP) mandates a client to associate with unique MAC address before it can transmit such requests. This limits the effectiveness of starvation in wireless networks. In this paper, we describe a new method of creating starvation which is effective in both wired and wireless networks. This new method exploits a precautionary probing done by a DHCP server as described in RFC 2131. This probing verifies the to be offered IP address for accidental usage by other clients in the network. We show that a malicious insider can just send spoofed replies to these probes to create the effect of starvation in both wired and wireless networks.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1