首页 > 最新文献

2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications最新文献

英文 中文
Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach 在分布式认知无线网络中实现上下文感知和智能:一种收益传播方法
K. Yau, P. Komisarczuk, Paul D. Teal
Cognitive Radio (CR) is a next-generation wireless communication system that exploits underutilized licensed spectrum to optimize the utilization of the overall radio spectrum. A Distributed Cognitive Radio Network (DCRN) is a distributed wireless network established by a number of CR hosts in the absence of fixed network infrastructure. Context awareness and intelligence are key characteristics of CR networks that enable the CR hosts to be aware of their operating environment in order to make an optimal joint action. This research aims to achieve context awareness and intelligence in DCRN using our novel Locally-Confined Payoff Propagation (LCPP), which is an important feature in Multi-Agent Reinforcement Learning (MARL). The LCPP mechanism is suitable to be applied in most applications in DCRN that require context awareness and intelligence such as scheduling, congestion control, as well as Dynamic Channel Selection (DCS), which is the focus of this paper. Simulation results show that the LCPP mechanism is a promising approach. The LCPP mechanism converges to an optimal joint action including networks with cyclic topology. Fast convergence is possible. The investigation in this paper serve as an important foundation for future work in this research field.
认知无线电(CR)是下一代无线通信系统,它利用未充分利用的许可频谱来优化整个无线电频谱的利用率。分布式认知无线网络(DCRN)是在没有固定网络基础设施的情况下,由多个CR主机建立的分布式无线网络。情境感知和智能是CR网络的关键特征,它使CR主机能够感知其运行环境,从而做出最佳的联合行动。本研究旨在使用我们新颖的局部受限支付传播(LCPP)来实现DCRN中的上下文感知和智能,这是多智能体强化学习(MARL)的一个重要特征。LCPP机制适用于DCRN中大多数需要上下文感知和智能的应用,如调度、拥塞控制以及动态信道选择(DCS),这是本文研究的重点。仿真结果表明,LCPP机制是一种很有前途的方法。LCPP机制收敛于包含循环拓扑网络的最优联合作用。快速收敛是可能的。本文的研究为今后该研究领域的工作奠定了重要的基础。
{"title":"Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach","authors":"K. Yau, P. Komisarczuk, Paul D. Teal","doi":"10.1109/WAINA.2011.47","DOIUrl":"https://doi.org/10.1109/WAINA.2011.47","url":null,"abstract":"Cognitive Radio (CR) is a next-generation wireless communication system that exploits underutilized licensed spectrum to optimize the utilization of the overall radio spectrum. A Distributed Cognitive Radio Network (DCRN) is a distributed wireless network established by a number of CR hosts in the absence of fixed network infrastructure. Context awareness and intelligence are key characteristics of CR networks that enable the CR hosts to be aware of their operating environment in order to make an optimal joint action. This research aims to achieve context awareness and intelligence in DCRN using our novel Locally-Confined Payoff Propagation (LCPP), which is an important feature in Multi-Agent Reinforcement Learning (MARL). The LCPP mechanism is suitable to be applied in most applications in DCRN that require context awareness and intelligence such as scheduling, congestion control, as well as Dynamic Channel Selection (DCS), which is the focus of this paper. Simulation results show that the LCPP mechanism is a promising approach. The LCPP mechanism converges to an optimal joint action including networks with cyclic topology. Fast convergence is possible. The investigation in this paper serve as an important foundation for future work in this research field.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131490404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Experimentations for QoS Evaluation of Publish/Subscribe Systems Deployed on Ad-hoc Network 基于Ad-hoc网络的发布/订阅系统QoS评价实验
Imene Lahyani, M. Jmaiel
Publish/subscribe (P/S) systems have been widely studied and applied in wired networks. However, their deployment on mobile ad hoc networks still presents a lot of challenges especially when there are quality of service (QoS) requirements. In this paper, we approach these challenges by looking first at network routing protocols. We present experimentations that allow to study the reaction of these protocols against QoS degradation that occur at the middleware layer. Based on an empirical study, we show that the routing layer is generally not aware about QoS degradations and so it does not react when they occur. Thus, a reaction in the middleware layer have to be developed in order to achieve a reasonable performance.
发布/订阅(P/S)系统在有线网络中得到了广泛的研究和应用。然而,它们在移动自组织网络上的部署仍然面临着许多挑战,特别是当存在服务质量(QoS)需求时。在本文中,我们通过首先查看网络路由协议来解决这些挑战。我们提出的实验允许研究这些协议对发生在中间件层的QoS降级的反应。基于一项实证研究,我们表明路由层通常不知道QoS降级,因此当它们发生时它不会做出反应。因此,为了实现合理的性能,必须开发中间件层中的响应。
{"title":"Experimentations for QoS Evaluation of Publish/Subscribe Systems Deployed on Ad-hoc Network","authors":"Imene Lahyani, M. Jmaiel","doi":"10.1109/WAINA.2011.139","DOIUrl":"https://doi.org/10.1109/WAINA.2011.139","url":null,"abstract":"Publish/subscribe (P/S) systems have been widely studied and applied in wired networks. However, their deployment on mobile ad hoc networks still presents a lot of challenges especially when there are quality of service (QoS) requirements. In this paper, we approach these challenges by looking first at network routing protocols. We present experimentations that allow to study the reaction of these protocols against QoS degradation that occur at the middleware layer. Based on an empirical study, we show that the routing layer is generally not aware about QoS degradations and so it does not react when they occur. Thus, a reaction in the middleware layer have to be developed in order to achieve a reasonable performance.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134460842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Random Boolean Networks and Attractors of their Intersecting Circuits 随机布尔网络及其相交回路的吸引子
J. Demongeot, Adrien Elena, Mathilde Noual, Sylvain Sené
The multi-scale strategy in studying biological regulatory networks analysis is based on two level of analysis. The first level is structural and consists in examining the architecture of the interaction graph underlying the network and the second level is functional and analyse the regulatory properties of the network. We apply this dual approach to the "immunetworks" involved in the control of the immune system. As a result, we show that the small number of attractors of these networks is due to the presence of intersecting circuits in their interaction graphs. We obtain an upper bound of the number of attractors of the whole network by multiplying the number of attractors of each of its strongly connected components. We detect first the strongly connected components in the architecture of the interaction digraph of the network. Secondly, we study the dynamical function of the attractors by looking further inside these components, notably when they form circuits (intersecting or not).
研究生物调控网络分析的多尺度策略是基于两个层次的分析。第一个层次是结构性的,包括检查网络底层交互图的体系结构,第二个层次是功能性的,并分析网络的调节特性。我们将这种双重方法应用于参与控制免疫系统的“免疫网络”。结果表明,这些网络的吸引子数量较少是由于它们的相互作用图中存在相交电路。通过将网络中每个强连通分量的吸引子数相乘,得到了整个网络吸引子数的上界。我们首先检测网络交互有向图体系结构中的强连接分量。其次,我们通过进一步研究这些分量的内部来研究吸引子的动态函数,特别是当它们形成电路(相交或不相交)时。
{"title":"Random Boolean Networks and Attractors of their Intersecting Circuits","authors":"J. Demongeot, Adrien Elena, Mathilde Noual, Sylvain Sené","doi":"10.1109/WAINA.2011.154","DOIUrl":"https://doi.org/10.1109/WAINA.2011.154","url":null,"abstract":"The multi-scale strategy in studying biological regulatory networks analysis is based on two level of analysis. The first level is structural and consists in examining the architecture of the interaction graph underlying the network and the second level is functional and analyse the regulatory properties of the network. We apply this dual approach to the \"immunetworks\" involved in the control of the immune system. As a result, we show that the small number of attractors of these networks is due to the presence of intersecting circuits in their interaction graphs. We obtain an upper bound of the number of attractors of the whole network by multiplying the number of attractors of each of its strongly connected components. We detect first the strongly connected components in the architecture of the interaction digraph of the network. Secondly, we study the dynamical function of the attractors by looking further inside these components, notably when they form circuits (intersecting or not).","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133132095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence 环境智能中安全多方策略协商的拍卖
J. Schütte, Stephan Heuser
The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security policies beforehand, without knowing the exact capabilities and requirements of the platforms which will be present at run time. Especially when peers need to adhere to an appropriate trade-off between security and performance, on-the-fly negotiation protocols are required to allow peers to autonomously agree on a common policy. In this paper we present a framework for secure multi-party decision protocols based on auctions. Besides the framework design, a prototype implementation will be described and results of practical experiments will be given.
分布式和ad-hoc连接系统的出现,例如在环境智能应用程序中,使开发人员面临如何预先指定QoS和安全策略的问题,而不知道平台在运行时的确切功能和需求。特别是当对等点需要在安全性和性能之间进行适当的权衡时,需要动态协商协议来允许对等点自主地就共同策略达成一致。本文提出了一个基于拍卖的安全多方决策协议框架。除了框架设计外,还将描述原型实现和实际实验结果。
{"title":"Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence","authors":"J. Schütte, Stephan Heuser","doi":"10.1109/WAINA.2011.98","DOIUrl":"https://doi.org/10.1109/WAINA.2011.98","url":null,"abstract":"The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security policies beforehand, without knowing the exact capabilities and requirements of the platforms which will be present at run time. Especially when peers need to adhere to an appropriate trade-off between security and performance, on-the-fly negotiation protocols are required to allow peers to autonomously agree on a common policy. In this paper we present a framework for secure multi-party decision protocols based on auctions. Besides the framework design, a prototype implementation will be described and results of practical experiments will be given.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132681693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring Multi-homing Issues in Heterogeneous Environments 探索异构环境中的多寻的问题
G. Mapp, Mahdi Aiash, H. Guardia, J. Crowcroft
Mobile devices with two network interfaces(WiFi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as Ultra wideband. Hence we must assume that such devices will be multi-homed by default. For various reasons, including network congestion, network resilience and increased endpoint bandwidth, there have been several attempts to address multi-homing. Heterogeneous environments with the need to support vertical handover introduce another set of issues which make the need to solve multi-homing problems more urgent. This paper outlines the issues, looks at past efforts and proposes a solution based on the Location Id/Node Id concept but also argues that additional support is needed to make such an approach efficient for heterogeneous environments.
具有两个网络接口(WiFi和3G)的移动设备已经商业化。点对点通信,如红外线和蓝牙也很容易使用。在不久的将来,移动电话将有几个接口,包括卫星和新技术,如超宽带。因此,我们必须假设这些设备在默认情况下是多宿主的。由于各种原因,包括网络拥塞、网络弹性和端点带宽增加,已经有几次尝试解决多宿主问题。需要支持垂直切换的异构环境引入了另一组问题,这使得解决多归巢问题的需求更加迫切。本文概述了这些问题,回顾了过去的努力,并提出了一个基于Location Id/Node Id概念的解决方案,但也认为需要额外的支持才能使这种方法在异构环境中有效。
{"title":"Exploring Multi-homing Issues in Heterogeneous Environments","authors":"G. Mapp, Mahdi Aiash, H. Guardia, J. Crowcroft","doi":"10.1109/WAINA.2011.140","DOIUrl":"https://doi.org/10.1109/WAINA.2011.140","url":null,"abstract":"Mobile devices with two network interfaces(WiFi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as Ultra wideband. Hence we must assume that such devices will be multi-homed by default. For various reasons, including network congestion, network resilience and increased endpoint bandwidth, there have been several attempts to address multi-homing. Heterogeneous environments with the need to support vertical handover introduce another set of issues which make the need to solve multi-homing problems more urgent. This paper outlines the issues, looks at past efforts and proposes a solution based on the Location Id/Node Id concept but also argues that additional support is needed to make such an approach efficient for heterogeneous environments.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks 移动自组织网络中的包传输时间算法
Adel Alshamrani
The wormhole attack is hard to detect and can be easily implemented. An attacker may receive packets from one location in the network and tunnel them to the other end point in a different location and re-inject them into the network. Attackers can tunnel the packets by one of the following methods: encapsulating the packets, using out-of-bound links or using high power. If there are two or more malicious nodes in the network involved in a wormhole attack, the attack becomes more powerful. There are two types of wormhole attacks: hidden mode, and exposed (participation) mode. In this paper, we present an algorithm for detecting wormhole attacks, whether in hidden or exposed mode in wireless multi-hop net-works without special hardware. Our algorithm is an improvement on another algorithm which is based on transmission time-based mechanism (TTM). Moreover, our algorithm introduces a new mechanism called Packet Travel Time (PTT). This mechanism allows each device to monitor its neighbours’ behaviour. Therefore, this mechanism can detect both hidden and exposed wormhole attacks, and can locate the wormhole in AODV, and DSR protocol.
虫洞攻击很难被检测到,而且很容易实现。攻击者可以从网络中的一个位置接收数据包,并将其隧道传输到不同位置的另一个端点,然后将其重新注入网络。攻击者可以采用以下三种方式对报文进行隧道化:封装报文、使用外链路或使用大功率。如果网络中有两个或两个以上的恶意节点参与虫洞攻击,则攻击会变得更加强大。虫洞攻击有两种类型:隐藏模式和暴露(参与)模式。本文提出了一种在无特殊硬件的无线多跳网络中检测隐藏或暴露模式虫洞攻击的算法。该算法是对另一种基于传输时间机制(TTM)的算法的改进。此外,我们的算法引入了一种新的机制,称为分组旅行时间(PTT)。这种机制允许每个设备监控其邻居的行为。因此,该机制既可以检测隐藏的虫洞攻击,也可以检测暴露的虫洞攻击,可以对AODV、DSR协议中的虫洞进行定位。
{"title":"PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks","authors":"Adel Alshamrani","doi":"10.1109/WAINA.2011.68","DOIUrl":"https://doi.org/10.1109/WAINA.2011.68","url":null,"abstract":"The wormhole attack is hard to detect and can be easily implemented. An attacker may receive packets from one location in the network and tunnel them to the other end point in a different location and re-inject them into the network. Attackers can tunnel the packets by one of the following methods: encapsulating the packets, using out-of-bound links or using high power. If there are two or more malicious nodes in the network involved in a wormhole attack, the attack becomes more powerful. There are two types of wormhole attacks: hidden mode, and exposed (participation) mode. In this paper, we present an algorithm for detecting wormhole attacks, whether in hidden or exposed mode in wireless multi-hop net-works without special hardware. Our algorithm is an improvement on another algorithm which is based on transmission time-based mechanism (TTM). Moreover, our algorithm introduces a new mechanism called Packet Travel Time (PTT). This mechanism allows each device to monitor its neighbours’ behaviour. Therefore, this mechanism can detect both hidden and exposed wormhole attacks, and can locate the wormhole in AODV, and DSR protocol.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Improvement and Evaluation of a Method to Manage Multiple Types of Logs 多类型日志管理方法的改进与评价
Akihiro Tomono, M. Uehara, Y. Shimada
In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for internal control is growing steadily. In particular, auditing logs are important for internal control, since internal control without audit evidence is incomplete. Moreover, logs are necessary not only as a defense mechanism, but also since they contain much information that can lead to improvements in the company. Consequently, the correct use of logs can be beneficial to a company. However, the cost of an information system is dependent on the amount of data, which in the case of log data can be very large. There are many different kinds of logs and storing them long term is necessary to realize an internal control system based on logs. Previously, we proposed a low cost system to store logs semi-permanently using a Virtual Large Scale Disk. However, this method has problems with cross-sectional searches of different formats and its overall effectiveness. Therefore, we proposed a log that can cope with changing schema on demand by integrating several kinds of logs into YAML format. We also proposed a log format able to search across several kinds of logs by consolidating the log format and combining the logs into a single file. However, this proposal is not usable in practice, instead an integrated log is needed. Thus, in this paper, we implement a method that ensures consistency when a log is converted into YAML format from a raw log and vice versa and a command to search the integrated log. We also present an evaluation of the proposed method.
近年来,不仅在美国,而且在日本,许多公司都出现了会计丑闻。对内部控制的需求正在稳步增长。审计日志对内部控制尤其重要,因为没有审计证据的内部控制是不完整的。此外,日志不仅作为一种防御机制是必要的,而且因为它们包含了许多可以导致公司改进的信息。因此,正确使用日志对公司是有益的。然而,信息系统的成本取决于数据量,对于日志数据来说,数据量可能非常大。日志的种类繁多,要实现基于日志的内部控制系统,必须对日志进行长期存储。以前,我们提出了一种低成本的系统,使用虚拟大规模磁盘来半永久地存储日志。然而,这种方法在不同格式的横断面搜索和整体有效性方面存在问题。因此,我们提出了一种日志,它可以通过将几种日志集成到YAML格式中来应对模式的随需变化。我们还提出了一种日志格式,可以通过整合日志格式并将日志合并到单个文件中来搜索多种日志。然而,这个建议在实践中是不可用的,而是需要一个集成的日志。因此,在本文中,我们实现了一种方法,以确保日志从原始日志转换为YAML格式时的一致性,反之亦然,并实现了搜索集成日志的命令。我们还对所提出的方法进行了评估。
{"title":"Improvement and Evaluation of a Method to Manage Multiple Types of Logs","authors":"Akihiro Tomono, M. Uehara, Y. Shimada","doi":"10.1109/WAINA.2011.51","DOIUrl":"https://doi.org/10.1109/WAINA.2011.51","url":null,"abstract":"In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for internal control is growing steadily. In particular, auditing logs are important for internal control, since internal control without audit evidence is incomplete. Moreover, logs are necessary not only as a defense mechanism, but also since they contain much information that can lead to improvements in the company. Consequently, the correct use of logs can be beneficial to a company. However, the cost of an information system is dependent on the amount of data, which in the case of log data can be very large. There are many different kinds of logs and storing them long term is necessary to realize an internal control system based on logs. Previously, we proposed a low cost system to store logs semi-permanently using a Virtual Large Scale Disk. However, this method has problems with cross-sectional searches of different formats and its overall effectiveness. Therefore, we proposed a log that can cope with changing schema on demand by integrating several kinds of logs into YAML format. We also proposed a log format able to search across several kinds of logs by consolidating the log format and combining the logs into a single file. However, this proposal is not usable in practice, instead an integrated log is needed. Thus, in this paper, we implement a method that ensures consistency when a log is converted into YAML format from a raw log and vice versa and a command to search the integrated log. We also present an evaluation of the proposed method.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SenseKey -- Simplifying the Selection of Key Management Schemes for Sensor Networks SenseKey——简化传感器网络密钥管理方案的选择
R. Román, Javier López, Cristina Alcaraz, Hsiao-Hwa Chen
Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There is a large number of available KMS protocols in the literature, but it is not clear what should network designers do to choose the most suitable protocol for the needs of their applications. In this paper, we consider that given a certain set of application requirements, the network designer can check which properties comply with those requirements and select the KMS protocols that contains those particular properties. Therefore, we study the relationship between requirements and properties, and we provide a web tool, the Sense Key tool, that can be used to automatically obtain an optimal set of KMS protocols.
密钥管理方案(KMS)是无线传感器网络(WSN)非常重要的安全机制,因为它们用于管理安全原语所需的凭据(即秘密密钥)。文献中有大量可用的KMS协议,但不清楚网络设计者应该做什么来选择最适合其应用程序需求的协议。在本文中,我们认为给定一组特定的应用程序需求,网络设计者可以检查哪些属性符合这些需求,并选择包含这些特定属性的KMS协议。因此,我们研究了需求和属性之间的关系,并提供了一个web工具,即Sense Key工具,可以用来自动获得一组最优的KMS协议。
{"title":"SenseKey -- Simplifying the Selection of Key Management Schemes for Sensor Networks","authors":"R. Román, Javier López, Cristina Alcaraz, Hsiao-Hwa Chen","doi":"10.1109/WAINA.2011.78","DOIUrl":"https://doi.org/10.1109/WAINA.2011.78","url":null,"abstract":"Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There is a large number of available KMS protocols in the literature, but it is not clear what should network designers do to choose the most suitable protocol for the needs of their applications. In this paper, we consider that given a certain set of application requirements, the network designer can check which properties comply with those requirements and select the KMS protocols that contains those particular properties. Therefore, we study the relationship between requirements and properties, and we provide a web tool, the Sense Key tool, that can be used to automatically obtain an optimal set of KMS protocols.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IPAS: Implicit Password Authentication System IPAS:隐式密码认证系统
Sadiq Almuairfi, P. Veeraraghavan, N. Chilamkurti
Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, viz. graphical scheme was introduced. But it also suffered due to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit Password Authentication System, which is immune to the common attacks suffered by other authentication schemes.
身份验证是防止危及机密性和完整性的第一道防线。虽然传统的基于登录/密码的方案很容易实现,但它们已经受到了几次攻击。作为替代方案,引入了基于令牌和生物识别的身份验证系统。然而,它们并没有显著改善,不足以证明投资是合理的。因此,引入了登录/密码方案的一种变体,即图形方案。但它也受到肩部冲浪和屏幕转储攻击的影响。在本文中,我们介绍了我们提出的隐式密码认证系统(IPAS)的框架,它不受其他认证方案所遭受的常见攻击。
{"title":"IPAS: Implicit Password Authentication System","authors":"Sadiq Almuairfi, P. Veeraraghavan, N. Chilamkurti","doi":"10.1109/WAINA.2011.36","DOIUrl":"https://doi.org/10.1109/WAINA.2011.36","url":null,"abstract":"Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, viz. graphical scheme was introduced. But it also suffered due to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit Password Authentication System, which is immune to the common attacks suffered by other authentication schemes.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration 基于策略的IP地址选择
Shin Maruyama, M. Kozuka, Y. Okabe, Motonori Nakamura
SCTP is a reliable transport protocol that supports redundant paths by multiaddressing. Dynamic reconfiguration of IP addresses of an existing association is also supported by an extension called the ADD-IP feature. SCTP tries to use of all available addresses on both end hosts, but among them, there are addresses that should preferably not be used by certain policies or that are known to be unusable beforehand. Trials to use such addresses might cause unexpected degradations of performance or undesired termination of associations by time out. In this study, we propose a new feature by which a user can specify his own address usage policy, per process, according to which a host can determine which address may be used and which should be ignored. If an application program with SCTP is written in the protocol independent programming style, improper addresses are transparently removed so that the application program might use all and only usable addresses.
SCTP是一种可靠的传输协议,通过多寻址支持冗余路径。一个名为ADD-IP特性的扩展也支持对现有关联的IP地址进行动态重新配置。SCTP试图使用两端主机上所有可用的地址,但其中有些地址最好不要被某些策略使用,或者事先就知道是不可用的。尝试使用这些地址可能会导致意外的性能下降或超时时不希望的关联终止。在这项研究中,我们提出了一个新功能,通过该功能,用户可以指定自己的地址使用策略,每个进程,根据该策略,主机可以确定哪些地址可以使用,哪些应该被忽略。如果使用SCTP的应用程序是以协议独立编程风格编写的,则会透明地删除不适当的地址,以便应用程序可以使用所有可用的地址。
{"title":"Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration","authors":"Shin Maruyama, M. Kozuka, Y. Okabe, Motonori Nakamura","doi":"10.1109/WAINA.2011.71","DOIUrl":"https://doi.org/10.1109/WAINA.2011.71","url":null,"abstract":"SCTP is a reliable transport protocol that supports redundant paths by multiaddressing. Dynamic reconfiguration of IP addresses of an existing association is also supported by an extension called the ADD-IP feature. SCTP tries to use of all available addresses on both end hosts, but among them, there are addresses that should preferably not be used by certain policies or that are known to be unusable beforehand. Trials to use such addresses might cause unexpected degradations of performance or undesired termination of associations by time out. In this study, we propose a new feature by which a user can specify his own address usage policy, per process, according to which a host can determine which address may be used and which should be ignored. If an application program with SCTP is written in the protocol independent programming style, improper addresses are transparently removed so that the application program might use all and only usable addresses.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1