首页 > 最新文献

2007 IEEE International Performance, Computing, and Communications Conference最新文献

英文 中文
Profiling Database Application to Detect SQL Injection Attacks 分析数据库应用程序以检测SQL注入攻击
Pub Date : 2007-05-15 DOI: 10.1109/PCCC.2007.358926
E. Bertino, Ashish Kamra, James P. Early
Countering threats to an organization's internal databases from database applications is an important area of research. In this paper, we propose a novel framework based on anomaly detection techniques, to detect malicious behaviour of database application programs. Specifically, we create a fingerprint of an application program based on SQL queries submitted by it to a database. We then use association rule mining techniques on this fingerprint to extract useful rules. These rules succinctly represent the normal behaviour of the database application. We then apply an anomaly detection algorithm to detect queries that do not conform to these rules. We further demonstrate how this model can be used to detect SQL Injection attacks on databases. We show the validity and usefulness of our approach on synthetically generated datasets and SQL Injected queries. Experimental results show that our techniques are effective in addressing various types of SQL Injection threat scenarios.
应对数据库应用程序对组织内部数据库的威胁是一个重要的研究领域。本文提出了一种基于异常检测技术的框架来检测数据库应用程序的恶意行为。具体来说,我们根据应用程序向数据库提交的SQL查询创建应用程序的指纹。然后,我们对该指纹使用关联规则挖掘技术提取有用的规则。这些规则简洁地表示了数据库应用程序的正常行为。然后我们应用异常检测算法来检测不符合这些规则的查询。我们将进一步演示如何使用该模型检测数据库上的SQL注入攻击。我们展示了我们的方法在合成生成的数据集和SQL注入查询上的有效性和有用性。实验结果表明,我们的技术可以有效地解决各种类型的SQL注入威胁场景。
{"title":"Profiling Database Application to Detect SQL Injection Attacks","authors":"E. Bertino, Ashish Kamra, James P. Early","doi":"10.1109/PCCC.2007.358926","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358926","url":null,"abstract":"Countering threats to an organization's internal databases from database applications is an important area of research. In this paper, we propose a novel framework based on anomaly detection techniques, to detect malicious behaviour of database application programs. Specifically, we create a fingerprint of an application program based on SQL queries submitted by it to a database. We then use association rule mining techniques on this fingerprint to extract useful rules. These rules succinctly represent the normal behaviour of the database application. We then apply an anomaly detection algorithm to detect queries that do not conform to these rules. We further demonstrate how this model can be used to detect SQL Injection attacks on databases. We show the validity and usefulness of our approach on synthetically generated datasets and SQL Injected queries. Experimental results show that our techniques are effective in addressing various types of SQL Injection threat scenarios.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols 高能效Ad Hoc路由协议的性能评估
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358908
Lijuan Cao, T. Dahlberg, Yang Wang
Energy aware routing protocols are consistently cited as efficient solutions for ad hoc and sensor networks routing and data management. However, there is not a consistent approach to define the energy related cost metrics that are used to guide the routing protocol performance. This paper provides a survey and analysis of energy related metrics used for ad hoc routing. First, the most common energy efficient routing protocols are classified into four categories based on the energy cost metrics employed. Then, the results of our simulation-based analysis are presented. We conducted a complete set of simulations to compare and contrast the performance of various energy-related metrics. Our analysis provides a comparison of the performance of energy cost metrics used within AODV-based ad hoc routing protocols.
能源感知路由协议一直被认为是自组织和传感器网络路由和数据管理的有效解决方案。然而,没有一致的方法来定义用于指导路由协议性能的与能源相关的成本度量。本文对用于自组织路由的能源相关度量进行了调查和分析。首先,根据所采用的能源成本指标,将最常见的节能路由协议分为四类。然后,给出了基于仿真的分析结果。我们进行了一套完整的模拟来比较和对比各种能源相关指标的性能。我们的分析提供了基于aodv的自组织路由协议中使用的能源成本指标的性能比较。
{"title":"Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols","authors":"Lijuan Cao, T. Dahlberg, Yang Wang","doi":"10.1109/PCCC.2007.358908","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358908","url":null,"abstract":"Energy aware routing protocols are consistently cited as efficient solutions for ad hoc and sensor networks routing and data management. However, there is not a consistent approach to define the energy related cost metrics that are used to guide the routing protocol performance. This paper provides a survey and analysis of energy related metrics used for ad hoc routing. First, the most common energy efficient routing protocols are classified into four categories based on the energy cost metrics employed. Then, the results of our simulation-based analysis are presented. We conducted a complete set of simulations to compare and contrast the performance of various energy-related metrics. Our analysis provides a comparison of the performance of energy cost metrics used within AODV-based ad hoc routing protocols.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Scheduling Divisible Loads on Bus Networks with Arbitrary Processor Release Time and Start-Up Costs: XRMI 具有任意处理器释放时间和启动成本的总线网络上可分负载的调度:XRMI
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358914
Jie Hu, R. Klefstad
We present a novel algorithm to schedule divisible loads using multi-round installment load distribution. This algorithm considers additional real-world factors, such as task initialization overhead and arbitrary processor release times. We analyze this algorithm's properties and demonstrate its behaviors through multiple illustrative examples. The analysis provides both a deeper understanding of the divisible load scheduling difficulties when considering more real-world factors and allows us to design more efficient algorithms. We show that this algorithm generate better solutions for practical applications.
提出了一种基于多轮负荷分配的可分负荷调度算法。该算法考虑了其他现实世界的因素,如任务初始化开销和任意处理器释放时间。我们分析了该算法的性质,并通过多个实例说明了它的行为。在考虑更多现实因素时,分析提供了对可分负载调度困难的更深入理解,并允许我们设计更有效的算法。结果表明,该算法在实际应用中产生了更好的解。
{"title":"Scheduling Divisible Loads on Bus Networks with Arbitrary Processor Release Time and Start-Up Costs: XRMI","authors":"Jie Hu, R. Klefstad","doi":"10.1109/PCCC.2007.358914","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358914","url":null,"abstract":"We present a novel algorithm to schedule divisible loads using multi-round installment load distribution. This algorithm considers additional real-world factors, such as task initialization overhead and arbitrary processor release times. We analyze this algorithm's properties and demonstrate its behaviors through multiple illustrative examples. The analysis provides both a deeper understanding of the divisible load scheduling difficulties when considering more real-world factors and allows us to design more efficient algorithms. We show that this algorithm generate better solutions for practical applications.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Traffic Chaos Reduction Approach for Emergency Scenarios 紧急情况下减少交通混乱的方法
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358943
S. Rizvi, S. Olariu, M. Rizvi, Michele C. Weigle
This paper proposes an efficient chaos-reducing information dissemination approach for spatiotemporal traffic information related to first responders and planned evacuation scenarios using vehicular ad hoc networks (VANETs). VANETs have recently been proposed as one of the promising ad-hoc networking techniques that can be used to provide a safe and enjoyable driving experience. In our approach, we provide an emergency vehicle path clearing technique, and real-time resource (e.g. shelter) availability information. Therefore, traffic confusion and chaos is lowered on evacuation and emergency vehicle routes. Simulation results show that our approach works efficiently without fully relying on any message relaying infrastructure.
本文提出了一种基于车辆自组织网络(VANETs)的有效减少混沌的时空交通信息传播方法,该方法与第一响应者和计划疏散场景有关。VANETs最近被提出作为一种有前途的自组织网络技术,可用于提供安全和愉快的驾驶体验。在我们的方法中,我们提供了一种紧急车辆路径清理技术,以及实时资源(例如庇护所)可用性信息。因此,减少了疏散和应急车辆路线上的交通混乱和混乱。仿真结果表明,该方法在不完全依赖于任何消息中继基础设施的情况下有效地工作。
{"title":"A Traffic Chaos Reduction Approach for Emergency Scenarios","authors":"S. Rizvi, S. Olariu, M. Rizvi, Michele C. Weigle","doi":"10.1109/PCCC.2007.358943","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358943","url":null,"abstract":"This paper proposes an efficient chaos-reducing information dissemination approach for spatiotemporal traffic information related to first responders and planned evacuation scenarios using vehicular ad hoc networks (VANETs). VANETs have recently been proposed as one of the promising ad-hoc networking techniques that can be used to provide a safe and enjoyable driving experience. In our approach, we provide an emergency vehicle path clearing technique, and real-time resource (e.g. shelter) availability information. Therefore, traffic confusion and chaos is lowered on evacuation and emergency vehicle routes. Simulation results show that our approach works efficiently without fully relying on any message relaying infrastructure.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intelligent Highway Infrastructure for Planned Evacuations 计划疏散的智能公路基础设施
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358947
Michele C. Weigle, S. Olariu
Disasters, natural and man-made alike, pose a serious threat to the nation by taking a heavy toll in human lives, destroying the public infrastructure and production capacity, interrupting supply lines, and stalling economic activity. One of the time-honored strategies for dealing with predictable natural disasters is a planned evacuation of the population from the afflicted area. Thus, evacuation strategies and supporting infrastructure are of the highest importance for mitigating the effects of such events. The main contribution of this work is to propose an intelligent highway infrastructure in support of planned evacuations. Specifically, we show that the recently-proposed architecture for the notification of traffic incidents and congestion (NOTICE) can be enhanced to support the needs of large-scale evacuations.
自然灾害和人为灾害都对国家构成严重威胁,造成大量人员伤亡,破坏公共基础设施和生产能力,中断供应线,并使经济活动停滞。应对可预见的自然灾害的一个历史悠久的策略是有计划地从受灾地区疏散人口。因此,疏散战略和配套基础设施对于减轻此类事件的影响至关重要。这项工作的主要贡献是提出了一个智能公路基础设施,以支持计划疏散。具体来说,我们表明,最近提出的交通事故和拥堵通知(NOTICE)架构可以得到增强,以支持大规模疏散的需求。
{"title":"Intelligent Highway Infrastructure for Planned Evacuations","authors":"Michele C. Weigle, S. Olariu","doi":"10.1109/PCCC.2007.358947","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358947","url":null,"abstract":"Disasters, natural and man-made alike, pose a serious threat to the nation by taking a heavy toll in human lives, destroying the public infrastructure and production capacity, interrupting supply lines, and stalling economic activity. One of the time-honored strategies for dealing with predictable natural disasters is a planned evacuation of the population from the afflicted area. Thus, evacuation strategies and supporting infrastructure are of the highest importance for mitigating the effects of such events. The main contribution of this work is to propose an intelligent highway infrastructure in support of planned evacuations. Specifically, we show that the recently-proposed architecture for the notification of traffic incidents and congestion (NOTICE) can be enhanced to support the needs of large-scale evacuations.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On Frugality of Control Packets in Multi-Hop Wireless Networks 多跳无线网络中控制数据包的节约问题
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358907
Noun Choi, Subbarayan Venkatesan
Carrier sense multiple access (CSMA) is a media access scheme used in multi-hop wireless networks. Because a node is unable to detect a collision while it transmits signals, reducing the collision rate is important to increase the network performance. Since the advent of MACA, it has been believed that RTS/CTS exchange in multi-hop wireless networks prevents collisions caused by hidden terminals in most situations. Recently, several research papers presented cases where the RTS/CTS exchange fails to prevent collisions caused by hidden terminals. In this paper, we show by simulations that RTS/CTS exchange under contemporary physical layer technologies actually has limited effect on fast collision inference and on resolving the hidden terminal problem. We also present a situation where an ACK packet causes a collision and show that this type of collisions has a significant effect on the performance of multi-hop wireless networks. We also present a modified media access scheme that reduces the number of collisions caused by ACK and compare the proposed scheme with basic access mode and RTS/CTS exchange mode of IEEE 802.11.
载波感知多址(CSMA)是一种用于多跳无线网络的媒体接入方案。由于节点在传输信号时无法检测到碰撞,因此降低碰撞率对于提高网络性能非常重要。自MACA出现以来,人们一直认为多跳无线网络中的RTS/CTS交换在大多数情况下可以防止隐藏终端造成的碰撞。最近,一些研究论文介绍了RTS/CTS交换无法防止隐藏终端引起的碰撞的情况。在本文中,我们通过仿真表明,在当代物理层技术下的RTS/CTS交换在快速碰撞推理和解决隐藏终端问题方面实际上效果有限。我们还介绍了ACK数据包导致碰撞的情况,并表明这种类型的碰撞对多跳无线网络的性能有重大影响。我们还提出了一种改进的媒体访问方案,减少了ACK引起的冲突次数,并将该方案与IEEE 802.11的基本访问模式和RTS/CTS交换模式进行了比较。
{"title":"On Frugality of Control Packets in Multi-Hop Wireless Networks","authors":"Noun Choi, Subbarayan Venkatesan","doi":"10.1109/PCCC.2007.358907","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358907","url":null,"abstract":"Carrier sense multiple access (CSMA) is a media access scheme used in multi-hop wireless networks. Because a node is unable to detect a collision while it transmits signals, reducing the collision rate is important to increase the network performance. Since the advent of MACA, it has been believed that RTS/CTS exchange in multi-hop wireless networks prevents collisions caused by hidden terminals in most situations. Recently, several research papers presented cases where the RTS/CTS exchange fails to prevent collisions caused by hidden terminals. In this paper, we show by simulations that RTS/CTS exchange under contemporary physical layer technologies actually has limited effect on fast collision inference and on resolving the hidden terminal problem. We also present a situation where an ACK packet causes a collision and show that this type of collisions has a significant effect on the performance of multi-hop wireless networks. We also present a modified media access scheme that reduces the number of collisions caused by ACK and compare the proposed scheme with basic access mode and RTS/CTS exchange mode of IEEE 802.11.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring Performance in Activity-Based File Relocation 确保基于活动的文件重定位的性能
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358881
Joel C. Wu, Bo Hong, S. Brandt
Dynamic storage tiering (DST) is the concept of grouping storage devices into tiers based on their characteristics, and relocating files dynamically to leverage on the heterogeneity of the underlying devices. An important usage of DST is activity-based file relocation, where less active files can be stored on less expensive devices without affecting the overall perceived quality of the storage system. In activity-based file relocation, improper choices on how much activity a file should have before it is relocated introduce the potential for overcommitting the performance capability of the preferred tier. We present an approach to prevent performance degradation caused by excessive skewing of loads. Our approach enables the delineation of periods when performance requirements are different. We consider the load pattern of files and limit the total amount of loads to be placed on the preferred tier during the periods when fast response time is desirable, and increase the load limit in other periods when throughput is more important. Considering the variation of performance requirements in time enables the finer attainment of QoS goals.
动态存储分级(DST)是一种概念,它将存储设备根据其特征分组为不同的层,并动态地重新定位文件,以利用底层设备的异构性。DST的一个重要用途是基于活动的文件重定位,其中活动较少的文件可以存储在较便宜的设备上,而不会影响存储系统的整体感知质量。在基于活动的文件重定位中,对文件在重定位之前应该具有多少活动的不正确选择可能会导致首选层的性能能力被过度使用。我们提出了一种防止负载过度倾斜引起的性能下降的方法。我们的方法能够描述性能需求不同的时期。我们考虑文件的负载模式,并限制在需要快速响应时间的时间段内放置在首选层上的负载总量,并在吞吐量更重要的其他时间段增加负载限制。及时考虑性能需求的变化可以更好地实现QoS目标。
{"title":"Ensuring Performance in Activity-Based File Relocation","authors":"Joel C. Wu, Bo Hong, S. Brandt","doi":"10.1109/PCCC.2007.358881","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358881","url":null,"abstract":"Dynamic storage tiering (DST) is the concept of grouping storage devices into tiers based on their characteristics, and relocating files dynamically to leverage on the heterogeneity of the underlying devices. An important usage of DST is activity-based file relocation, where less active files can be stored on less expensive devices without affecting the overall perceived quality of the storage system. In activity-based file relocation, improper choices on how much activity a file should have before it is relocated introduce the potential for overcommitting the performance capability of the preferred tier. We present an approach to prevent performance degradation caused by excessive skewing of loads. Our approach enables the delineation of periods when performance requirements are different. We consider the load pattern of files and limit the total amount of loads to be placed on the preferred tier during the periods when fast response time is desirable, and increase the load limit in other periods when throughput is more important. Considering the variation of performance requirements in time enables the finer attainment of QoS goals.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Cluster Head Selection in the LEACH Architecture LEACH体系结构中的最优簇头选择
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358883
Haiming Yang, B. Sikdar
LEACH (low energy adaptive clustering hierarchy) (W. Heinzelman et al., 2000) is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA based MAC protocol, and in order to maintain a balanced energy consumption, suggests that each node probabilistically become a cluster head. To reduce the energy consumption and to avoid the strict synchronization requirements of TDMA, we first apply a sleep-wakeup based decentralized MAC protocol to LEACH, then we present an analytic framework for obtaining the optimal probability with which a node becomes a cluster head in order to minimize the network's energy consumption. The analysis is first presented for small networks, under the assumption of identical expected distance of all cluster heads from the sink. Then the analysis is extended for large networks to consider the case when the distances of various sections of the network from the sink may be different, since nodes further away have to spend greater energy in order to reach the sink. Our simulation results show that using this optimal probability results in much more efficient energy consumption and compared with the current LEACH, our proposal consumes significantly less power.
LEACH (low energy adaptive clustering hierarchy,低能量自适应聚类结构)(W. Heinzelman et al., 2000)是一种流行的基于聚类的结构,在无线传感器网络中被广泛提出。LEACH使用基于TDMA的MAC协议,为了保持均衡的能量消耗,建议每个节点概率地成为簇头。为了降低能耗和避免TDMA严格的同步要求,我们首先将一个基于睡眠-唤醒的去中心化MAC协议应用到LEACH中,然后我们提出了一个分析框架来获得节点成为簇头的最佳概率,以最小化网络的能耗。首先对小型网络进行了分析,假设所有簇头到汇聚点的期望距离相同。然后将分析扩展到大型网络,以考虑网络的各个部分与接收器的距离可能不同的情况,因为更远的节点必须花费更多的能量才能到达接收器。我们的仿真结果表明,使用此最优概率可以获得更有效的能源消耗,并且与当前的LEACH相比,我们的建议消耗的功率显着降低。
{"title":"Optimal Cluster Head Selection in the LEACH Architecture","authors":"Haiming Yang, B. Sikdar","doi":"10.1109/PCCC.2007.358883","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358883","url":null,"abstract":"LEACH (low energy adaptive clustering hierarchy) (W. Heinzelman et al., 2000) is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA based MAC protocol, and in order to maintain a balanced energy consumption, suggests that each node probabilistically become a cluster head. To reduce the energy consumption and to avoid the strict synchronization requirements of TDMA, we first apply a sleep-wakeup based decentralized MAC protocol to LEACH, then we present an analytic framework for obtaining the optimal probability with which a node becomes a cluster head in order to minimize the network's energy consumption. The analysis is first presented for small networks, under the assumption of identical expected distance of all cluster heads from the sink. Then the analysis is extended for large networks to consider the case when the distances of various sections of the network from the sink may be different, since nodes further away have to spend greater energy in order to reach the sink. Our simulation results show that using this optimal probability results in much more efficient energy consumption and compared with the current LEACH, our proposal consumes significantly less power.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127989402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
ACM: A Transmission Mechanism for Urgent Sensor Information 一种紧急传感器信息的传输机制
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358941
T. Kawai, N. Wakamiya, M. Murata
The wireless sensor network (WSN) is one of the most promising technologies which helps making our society safe, secure, and comfortable. A WSN as a social infrastructure must transmit critical information faster and more reliable than other information. In this paper, we propose an autonomous and distributed mechanism, called an "assured corridor" mechanism (ACM), for fast and reliable transmission for urgent information in WSNs. In ACM, a self-organizing corridor consists of nodes surrounding the path from the source node to the base station and nodes in the path. The former refrains from transmitting non-urgent information to avoid collisions with emergency packets, and the latter suspends their sleep schedule and keeps awake to avoid delay caused by sleeping. We conducted simulation experiments with a tree-based and broadcast-based network. It was shown that ACM improved the delivery ratio and the delay of emergency packets.
无线传感器网络(WSN)是最有前途的技术之一,它有助于我们的社会安全、可靠和舒适。无线传感器网络作为一种社会基础设施,必须比其他信息更快、更可靠地传输关键信息。在本文中,我们提出了一种自治和分布式的机制,称为“保证走廊”机制(ACM),用于快速可靠地传输WSNs中的紧急信息。在ACM中,自组织走廊由从源节点到基站的路径周围的节点和路径中的节点组成。前者不发送非紧急信息,避免与紧急数据包发生冲突;后者暂停自己的睡眠计划,保持清醒,避免睡眠造成的延迟。我们对基于树和基于广播的网络进行了模拟实验。结果表明,ACM提高了紧急分组的投递率和延迟。
{"title":"ACM: A Transmission Mechanism for Urgent Sensor Information","authors":"T. Kawai, N. Wakamiya, M. Murata","doi":"10.1109/PCCC.2007.358941","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358941","url":null,"abstract":"The wireless sensor network (WSN) is one of the most promising technologies which helps making our society safe, secure, and comfortable. A WSN as a social infrastructure must transmit critical information faster and more reliable than other information. In this paper, we propose an autonomous and distributed mechanism, called an \"assured corridor\" mechanism (ACM), for fast and reliable transmission for urgent information in WSNs. In ACM, a self-organizing corridor consists of nodes surrounding the path from the source node to the base station and nodes in the path. The former refrains from transmitting non-urgent information to avoid collisions with emergency packets, and the latter suspends their sleep schedule and keeps awake to avoid delay caused by sleeping. We conducted simulation experiments with a tree-based and broadcast-based network. It was shown that ACM improved the delivery ratio and the delay of emergency packets.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115957896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Stochastic Fair Traffic Management for Efficient and Robust IP Networking 高效鲁棒IP网络的随机公平流量管理
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358878
J. Chung, M. Claypool, R. Kinicki
As use of non-TCP applications such as streaming media and network games increases, the potential for unfair, misbehaving flows and the threat of congestion collapse also increases. This paper introduces a statistical traffic filtering technique, stochastic fairness guardian (SFG), that effectively regulates misbehaving flows with minimal traffic state information. SFG can be used in conjunction with an active queue management (AQM) mechanism to improve both network protection and efficiency. Simulations are used to evaluated SFG and the integration of SFG with a proportional-integral (PI) controller in comparison with other similar statistical flow management mechanisms including RED-PD, SFB and CHOKe. The SFG-PI combination outperforms other mechanisms in terms of fairness, queuing delay, stability and TCP performance over a wide range of realistic traffic loads and conditions.
随着非tcp应用程序(如流媒体和网络游戏)的使用增加,不公平、行为不端的流和拥塞崩溃的威胁的可能性也在增加。本文介绍了一种统计流量过滤技术——随机公平监护人(SFG),它能在最小的流量状态信息下有效地调节不正常流量。SFG可以与主动队列管理(AQM)机制结合使用,以提高网络保护和效率。仿真用于评估SFG以及SFG与比例积分(PI)控制器的集成,并与其他类似的统计流量管理机制(包括RED-PD, SFB和CHOKe)进行比较。在广泛的实际流量负载和条件下,SFG-PI组合在公平性、排队延迟、稳定性和TCP性能方面优于其他机制。
{"title":"Stochastic Fair Traffic Management for Efficient and Robust IP Networking","authors":"J. Chung, M. Claypool, R. Kinicki","doi":"10.1109/PCCC.2007.358878","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358878","url":null,"abstract":"As use of non-TCP applications such as streaming media and network games increases, the potential for unfair, misbehaving flows and the threat of congestion collapse also increases. This paper introduces a statistical traffic filtering technique, stochastic fairness guardian (SFG), that effectively regulates misbehaving flows with minimal traffic state information. SFG can be used in conjunction with an active queue management (AQM) mechanism to improve both network protection and efficiency. Simulations are used to evaluated SFG and the integration of SFG with a proportional-integral (PI) controller in comparison with other similar statistical flow management mechanisms including RED-PD, SFB and CHOKe. The SFG-PI combination outperforms other mechanisms in terms of fairness, queuing delay, stability and TCP performance over a wide range of realistic traffic loads and conditions.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2007 IEEE International Performance, Computing, and Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1