首页 > 最新文献

Int. J. Grid Util. Comput.最新文献

英文 中文
A study on fog computing architectures and energy consumption approaches regarding QoS requirements 基于QoS要求的雾计算体系结构和能耗方法研究
Pub Date : 2020-04-24 DOI: 10.1504/ijguc.2020.10028886
A. Ksentini, Maha Jebalia, S. Tabbane
In the Internet of Things (IoT) paradigm, data is gathered for treatment from locals, machines, vehicles, etc. Cloud computing is providing suitable hardware and software for data processing. Thus, the integration of IoT with cloud capabilities offers several benefits for many applications. However, challenges persist for some use-cases like delay-sensitive services due to the huge amount of information collected by IoT devices and to be processed by cloud servers. Fog computing is expected to overcome several limits and challenges in cloud computing concerning the Quality of Service (QoS) requirements like latency, bandwidth and location awareness. Nevertheless, researchers still have to deal with several issues namely the architectural level and the energetic aspect. In this paper, we investigate fog system architectures and energy consumption in literature, while considering QoS requirements in the synthesis. A system model is then introduced with a potential solution for QoS management for fog computing environment.
在物联网(IoT)范例中,从当地人、机器、车辆等处收集数据进行处理。云计算为数据处理提供了合适的硬件和软件。因此,物联网与云功能的集成为许多应用程序提供了几个好处。然而,由于物联网设备收集大量信息并由云服务器处理,一些用例(如延迟敏感服务)仍然存在挑战。雾计算有望克服云计算中有关服务质量(QoS)需求(如延迟、带宽和位置感知)的几个限制和挑战。然而,研究人员还需要解决建筑层面和能量层面的几个问题。在本文中,我们研究了文献中的雾系统架构和能耗,同时在综合中考虑了QoS要求。然后介绍了一个系统模型,并提出了雾计算环境下QoS管理的潜在解决方案。
{"title":"A study on fog computing architectures and energy consumption approaches regarding QoS requirements","authors":"A. Ksentini, Maha Jebalia, S. Tabbane","doi":"10.1504/ijguc.2020.10028886","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10028886","url":null,"abstract":"In the Internet of Things (IoT) paradigm, data is gathered for treatment from locals, machines, vehicles, etc. Cloud computing is providing suitable hardware and software for data processing. Thus, the integration of IoT with cloud capabilities offers several benefits for many applications. However, challenges persist for some use-cases like delay-sensitive services due to the huge amount of information collected by IoT devices and to be processed by cloud servers. Fog computing is expected to overcome several limits and challenges in cloud computing concerning the Quality of Service (QoS) requirements like latency, bandwidth and location awareness. Nevertheless, researchers still have to deal with several issues namely the architectural level and the energetic aspect. In this paper, we investigate fog system architectures and energy consumption in literature, while considering QoS requirements in the synthesis. A system model is then introduced with a potential solution for QoS management for fog computing environment.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing the software defined management framework 实现软件定义的管理框架
Pub Date : 2020-04-24 DOI: 10.1504/ijguc.2020.10028895
M. Monteiro, R. Villaça, K. Simonassi, R. Tavares, C. Reginato
Software Defined Infrastructure (SDI) has become a relevant topic for computing and communication industry. Despite this huge technological movement, Network and Systems Management has been disregarded as one of the main themes in this ecosystem, and Software Defined Infrastructure has been managed by semi-software-defined management solutions. In order to reduce this gap, this paper presents SDMan, a Software Defined Management framework. The SDMan's proof of concept uses the OpenStack cloud platform and aims to demonstrate the feasibility of the proposed solution.
软件定义基础设施(SDI)已经成为计算和通信行业的一个相关话题。尽管这一巨大的技术运动,网络和系统管理已经被忽视为这个生态系统的主要主题之一,软件定义的基础设施已经被半软件定义的管理解决方案所管理。为了缩小这一差距,本文提出了软件定义管理框架SDMan。SDMan的概念验证使用OpenStack云平台,旨在证明所提出解决方案的可行性。
{"title":"Implementing the software defined management framework","authors":"M. Monteiro, R. Villaça, K. Simonassi, R. Tavares, C. Reginato","doi":"10.1504/ijguc.2020.10028895","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10028895","url":null,"abstract":"Software Defined Infrastructure (SDI) has become a relevant topic for computing and communication industry. Despite this huge technological movement, Network and Systems Management has been disregarded as one of the main themes in this ecosystem, and Software Defined Infrastructure has been managed by semi-software-defined management solutions. In order to reduce this gap, this paper presents SDMan, a Software Defined Management framework. The SDMan's proof of concept uses the OpenStack cloud platform and aims to demonstrate the feasibility of the proposed solution.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Success factor analysis for cloud services: a comparative study on software as a service 云服务的成功因素分析:软件即服务的比较研究
Pub Date : 2020-04-24 DOI: 10.1504/ijguc.2020.10028887
D. Nedbal, Mark Stieninger
The emergence of cloud computing has been triggering fundamental changes in the information technology landscape for years. The proliferation of cloud services gave rise to novel types of business models, the complexity of which results from numerous different factors critical to a successful adoption. However, when it comes to improvement activities by cloud service providers, due to their multifacetedness, the challenge lies in figuring out where to start. Furthermore, the acuteness of actions to be taken varies among different settings. Thus, we propose the success factor analysis as an approach to prioritise improvement activities according to their acuteness, which is thereby indicated by the gap between the priority and the actual performance of a particular factor. Results show that the factors with the overall highest gap are security & safety, trust, and costs. Overall, the strengths of cloud services are seen in technical features leading to a good ease of use, a positively perceived usefulness, and a broad availability.
多年来,云计算的出现引发了信息技术领域的根本性变化。云服务的激增产生了新型的业务模式,其复杂性源于对成功采用至关重要的许多不同因素。然而,当涉及到云服务提供商的改进活动时,由于它们的多面性,挑战在于弄清楚从哪里开始。此外,要采取的行动的尖锐程度在不同的环境中有所不同。因此,我们提出成功因素分析作为一种方法,根据改进活动的尖锐程度来确定其优先级,从而通过优先级与特定因素的实际表现之间的差距来表明。结果显示,整体差距最大的因素是安全与安全、信任和成本。总的来说,云服务的优势体现在技术特性上,这些特性带来了良好的易用性、良好的可用性和广泛的可用性。
{"title":"Success factor analysis for cloud services: a comparative study on software as a service","authors":"D. Nedbal, Mark Stieninger","doi":"10.1504/ijguc.2020.10028887","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10028887","url":null,"abstract":"The emergence of cloud computing has been triggering fundamental changes in the information technology landscape for years. The proliferation of cloud services gave rise to novel types of business models, the complexity of which results from numerous different factors critical to a successful adoption. However, when it comes to improvement activities by cloud service providers, due to their multifacetedness, the challenge lies in figuring out where to start. Furthermore, the acuteness of actions to be taken varies among different settings. Thus, we propose the success factor analysis as an approach to prioritise improvement activities according to their acuteness, which is thereby indicated by the gap between the priority and the actual performance of a particular factor. Results show that the factors with the overall highest gap are security & safety, trust, and costs. Overall, the strengths of cloud services are seen in technical features leading to a good ease of use, a positively perceived usefulness, and a broad availability.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture for diversity in the implementation of dependable and secure services using the state machine replication approach 使用状态机复制方法实现可靠和安全服务的多样性的体系结构
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026551
Caio Yuri da Silva Costa, E. Alchieri
The dependability and security properties of a system could be impaired by a failure or by an opponent that exploits its vulnerabilities. State Machine Replication (SMR) is a technique widely used to implement fault-tolerant systems, mitigating these risks. Unfortunately, the proposed SMR solutions do not implement diversity and all replicas execute the same software. Consequently, the same attack or software bug could compromise the whole system. This work proposes an architecture to allow diversity in the implementation of dependable and secure services using the SMR approach. The goal is not to implement different versions of a SMR library, but to use an underlying SMR library and provide means to implement and execute service replicas (the application code) in different programming languages. The main problems addressed are twofold: communication among different languages; and data representation. The proposed architecture was integrated in BFT-SMaRt and a set of experiments showed its practical feasibility.
系统的可靠性和安全性可能会因故障或利用其漏洞的对手而受到损害。状态机复制(SMR)是一种广泛用于实现容错系统的技术,可以减轻这些风险。不幸的是,建议的SMR解决方案没有实现多样性,并且所有副本都执行相同的软件。因此,同样的攻击或软件漏洞可能危及整个系统。这项工作提出了一种架构,允许使用SMR方法实现可靠和安全服务的多样性。我们的目标不是实现SMR库的不同版本,而是使用底层SMR库,并提供以不同编程语言实现和执行服务副本(应用程序代码)的方法。解决的主要问题有两个方面:不同语言之间的交流;数据表示。将该架构集成到BFT-SMaRt中,并通过一系列实验验证了该架构的实际可行性。
{"title":"Architecture for diversity in the implementation of dependable and secure services using the state machine replication approach","authors":"Caio Yuri da Silva Costa, E. Alchieri","doi":"10.1504/ijguc.2020.10026551","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026551","url":null,"abstract":"The dependability and security properties of a system could be impaired by a failure or by an opponent that exploits its vulnerabilities. State Machine Replication (SMR) is a technique widely used to implement fault-tolerant systems, mitigating these risks. Unfortunately, the proposed SMR solutions do not implement diversity and all replicas execute the same software. Consequently, the same attack or software bug could compromise the whole system. This work proposes an architecture to allow diversity in the implementation of dependable and secure services using the SMR approach. The goal is not to implement different versions of a SMR library, but to use an underlying SMR library and provide means to implement and execute service replicas (the application code) in different programming languages. The main problems addressed are twofold: communication among different languages; and data representation. The proposed architecture was integrated in BFT-SMaRt and a set of experiments showed its practical feasibility.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the design and development of emulation platforms for NFV-based infrastructures nfv基础设施仿真平台的设计与开发
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026553
Vinicius Fulber Garcia, G. Souza, E. P. Duarte, Thales Nicolai Tavares, L. D. C. Marcuzzo, C. R. P. D. Santos, M. Franco, Lucas Bondan, L. Granville, A. E. S. Filho, F. Turck
Network Functions Virtualisation (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialised hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commodity hardware, employing Software Defined Networking (SDN) technologies (e.g., OpenFlow, P4). Although platforms for prototyping NFV environments have emerged in recent years, they still present limitations that hinder the evaluation of NFV scenarios such as fog computing and heterogeneous networks. In this work, we present NIEP: a platform for designing and testing NFV-based infrastructures and VNFs. NIEP consists of a network emulator and a platform for Click-based VNFs development. NIEP provides a complete NFV emulation environment, allowing network operators to test their solutions in a controlled scenario prior to deployment in production networks.
与传统网络架构相比,网络功能虚拟化(NFV)具有多种优势,如灵活性、安全性和降低CAPEX/OPEX。在传统的中间件中,网络功能通常在专门的硬件上执行(例如,防火墙、DPI)。另一方面,虚拟网络功能(VNFs)在商品硬件上执行,采用软件定义网络(SDN)技术(例如OpenFlow, P4)。尽管近年来出现了用于NFV环境原型的平台,但它们仍然存在局限性,阻碍了对NFV场景(如雾计算和异构网络)的评估。在这项工作中,我们提出了NIEP:一个设计和测试基于nfv的基础设施和VNFs的平台。NIEP由一个网络模拟器和一个用于基于点击的VNFs开发的平台组成。NIEP提供了一个完整的NFV仿真环境,允许网络运营商在部署到生产网络之前在一个受控的场景中测试他们的解决方案。
{"title":"On the design and development of emulation platforms for NFV-based infrastructures","authors":"Vinicius Fulber Garcia, G. Souza, E. P. Duarte, Thales Nicolai Tavares, L. D. C. Marcuzzo, C. R. P. D. Santos, M. Franco, Lucas Bondan, L. Granville, A. E. S. Filho, F. Turck","doi":"10.1504/ijguc.2020.10026553","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026553","url":null,"abstract":"Network Functions Virtualisation (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialised hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commodity hardware, employing Software Defined Networking (SDN) technologies (e.g., OpenFlow, P4). Although platforms for prototyping NFV environments have emerged in recent years, they still present limitations that hinder the evaluation of NFV scenarios such as fog computing and heterogeneous networks. In this work, we present NIEP: a platform for designing and testing NFV-based infrastructures and VNFs. NIEP consists of a network emulator and a platform for Click-based VNFs development. NIEP provides a complete NFV emulation environment, allowing network operators to test their solutions in a controlled scenario prior to deployment in production networks.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithmic node classification in AND/OR mobile workflow graph 与/或移动工作流图节点分类算法
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10024769
Ihtisham Ali, S. Bagchi
The data-intensive applications employ complex workflow graph models in dynamic networks having heterogeneity and mobility of nodes, which result in enhanced end-to-end delay in executions. The current workflow models lack structural stability for visualising a complex workflow graph. This paper proposes a hybrid AND/OR mobile workflow graph (MWG) model to visualise a fully conditioned complex workflow graph containing mobile nodes. This paper proposes nodes validity detection (NVD) algorithm for classifying the total number of nodes in the AND/OR MWG. Furthermore, nodes criticality detection (NCD) algorithm is also proposed to identify the set of critical nodes in the AND/OR MWG aiming to enable efficient analysing, mapping and scheduling of complex workflow graphs in a dynamic network environment. The algorithms are implemented and evaluated on Java platform and, the regression analysis is performed to project the algorithmic performances. A detailed comparative analysis with other works is presented in this paper.
数据密集型应用程序在具有节点异构性和移动性的动态网络中采用复杂的工作流图模型,从而导致端到端执行延迟增强。当前的工作流模型缺乏结构稳定性,无法可视化复杂的工作流图。针对包含移动节点的全条件复杂工作流图,提出了一种混合与或移动工作流图(MWG)模型。提出了一种节点有效性检测(NVD)算法,用于对AND/OR MWG中节点总数进行分类。在此基础上,提出了节点临界检测(NCD)算法,用于识别与/或工作流中关键节点的集合,从而实现动态网络环境下复杂工作流图的高效分析、映射和调度。在Java平台上对算法进行了实现和评估,并进行了回归分析来预测算法的性能。并与其他著作作了详细的比较分析。
{"title":"Algorithmic node classification in AND/OR mobile workflow graph","authors":"Ihtisham Ali, S. Bagchi","doi":"10.1504/ijguc.2020.10024769","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10024769","url":null,"abstract":"The data-intensive applications employ complex workflow graph models in dynamic networks having heterogeneity and mobility of nodes, which result in enhanced end-to-end delay in executions. The current workflow models lack structural stability for visualising a complex workflow graph. This paper proposes a hybrid AND/OR mobile workflow graph (MWG) model to visualise a fully conditioned complex workflow graph containing mobile nodes. This paper proposes nodes validity detection (NVD) algorithm for classifying the total number of nodes in the AND/OR MWG. Furthermore, nodes criticality detection (NCD) algorithm is also proposed to identify the set of critical nodes in the AND/OR MWG aiming to enable efficient analysing, mapping and scheduling of complex workflow graphs in a dynamic network environment. The algorithms are implemented and evaluated on Java platform and, the regression analysis is performed to project the algorithmic performances. A detailed comparative analysis with other works is presented in this paper.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126205430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A methodology for automated penetration testing of cloud applications 一种用于云应用程序自动渗透测试的方法
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026556
V. Casola, Alessandra De Benedictis, M. Rak, Umberto Villano
Security assessment is a very time- and money-consuming activity. It needs specialised security skills and, furthermore, it is not fully integrated into the software development life-cycle. One of the best solutions for the security testing of an application relies on the use of penetration testing techniques. Unfortunately, penetration testing is a typically human-driven procedure that requires a deep knowledge of the possible attacks to carry out and of the hacking tools that can be used to launch the tests. In this paper, we present a methodology that enables the automation of penetration testing techniques based on both application-level models, used to represent the application architecture and its security properties in terms of applicable threats, vulnerabilities and weaknesses, and on system-level models, adopted to automatically generate and execute the penetration testing activities. The proposed methodology can be easily integrated into a continuous integration development process and aid software developers in evaluating security.
安全评估是一项既费时又费钱的工作。它需要专门的安全技能,而且,它没有完全集成到软件开发生命周期中。应用程序安全测试的最佳解决方案之一依赖于渗透测试技术的使用。不幸的是,渗透测试是一个典型的人为驱动的过程,需要对可能的攻击和可用于启动测试的黑客工具有深入的了解。在本文中,我们提出了一种方法,该方法能够基于应用程序级模型和系统级模型实现渗透测试技术的自动化,应用程序级模型用于表示应用程序体系结构及其在可应用的威胁、漏洞和弱点方面的安全属性,系统级模型用于自动生成和执行渗透测试活动。所提出的方法可以很容易地集成到持续集成开发过程中,并帮助软件开发人员评估安全性。
{"title":"A methodology for automated penetration testing of cloud applications","authors":"V. Casola, Alessandra De Benedictis, M. Rak, Umberto Villano","doi":"10.1504/ijguc.2020.10026556","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026556","url":null,"abstract":"Security assessment is a very time- and money-consuming activity. It needs specialised security skills and, furthermore, it is not fully integrated into the software development life-cycle. One of the best solutions for the security testing of an application relies on the use of penetration testing techniques. Unfortunately, penetration testing is a typically human-driven procedure that requires a deep knowledge of the possible attacks to carry out and of the hacking tools that can be used to launch the tests. In this paper, we present a methodology that enables the automation of penetration testing techniques based on both application-level models, used to represent the application architecture and its security properties in terms of applicable threats, vulnerabilities and weaknesses, and on system-level models, adopted to automatically generate and execute the penetration testing activities. The proposed methodology can be easily integrated into a continuous integration development process and aid software developers in evaluating security.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET 基于激励和信任的自组织MANET多路径距离矢量路由最优路径识别
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026547
A. Alkhamisi, S. Buhari, Georgios Tsaramirsis, Mohammed Basheri
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance the security of the network, this paper extends an Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol, named as an Integrated Incentive and Trust-based optimal path identification in AOMDV (IIT-AOMDV) for MANET. The proposed IIT-AOMDV routing protocol integrates an Intrusion Detection System (IDS) with the Bayesian Network (BN) based trust and payment model. The IDS utilises the empirical first-and second-hand trust information of BN, and it underpins the cuckoo search algorithm to map the QoS and trust value into a single fitness metric, tuned according to the presence of malicious nodes. The simulation results show that the IIT-AOMDV improves the detection accuracy and throughput by 20% and 16.6%, respectively, more than that of existing AOMDV integrated with the IDS (AID).
一个移动自组网(MANET)只有在各移动节点在分组路由中表现出良好的协作才能正常工作。为了减少恶意节点的危害,增强网络的安全性,本文扩展了一种自组织的按需多路径距离矢量(AOMDV)路由协议,并将其命名为基于综合激励和信任的AOMDV最优路径识别(IIT-AOMDV)。提出的IIT-AOMDV路由协议将入侵检测系统(IDS)与基于贝叶斯网络(BN)的信任和支付模型集成在一起。IDS利用BN的经验第一手和二手信任信息,并支持布谷鸟搜索算法,将QoS和信任值映射到单个适应度度量,并根据恶意节点的存在进行调整。仿真结果表明,与集成IDS (AID)的现有AOMDV相比,IIT-AOMDV的检测精度和吞吐量分别提高了20%和16.6%。
{"title":"An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET","authors":"A. Alkhamisi, S. Buhari, Georgios Tsaramirsis, Mohammed Basheri","doi":"10.1504/ijguc.2020.10026547","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026547","url":null,"abstract":"A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance the security of the network, this paper extends an Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol, named as an Integrated Incentive and Trust-based optimal path identification in AOMDV (IIT-AOMDV) for MANET. The proposed IIT-AOMDV routing protocol integrates an Intrusion Detection System (IDS) with the Bayesian Network (BN) based trust and payment model. The IDS utilises the empirical first-and second-hand trust information of BN, and it underpins the cuckoo search algorithm to map the QoS and trust value into a single fitness metric, tuned according to the presence of malicious nodes. The simulation results show that the IIT-AOMDV improves the detection accuracy and throughput by 20% and 16.6%, respectively, more than that of existing AOMDV integrated with the IDS (AID).","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133816276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Target exploration by Nomadic Lévy walk on unit disk graphs 在单位磁盘图上用Nomadic lsamvy walk进行目标探测
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026552
K. Sugihara, Naohiro Hayashibara
Levy walk has attracted attention for its search efficiency. Homesick Levy walk is a family of random walks whose encounter probability of one another is similar to the one of human behaviour. However, its homing behaviour limits the search area of each agent. In this paper, we propose a variant of Homesick Levy walk called Nomadic Levy walk and analyse the behaviour of the algorithm regarding the cover ratio on unit disk graphs. We also show the comparison of Nomadic Levy walk and Homesick Levy walk regarding the target search problem. Our simulation results indicate that the proposed algorithm is significantly efficient for sparse target detection on unit disk graphs compared to Homesick Levy walk, and it also improves the cover ratio. Moreover, we analyse the impact of the movement of the sink (home position) on the efficiency of the target exploration.
Levy walk因其搜索效率而备受关注。想家的利维漫步是一个随机漫步的家族,它们彼此相遇的概率与人类的行为相似。然而,它的归巢行为限制了每个agent的搜索区域。在本文中,我们提出了一种叫做游牧式列维行走的思乡式列维行走的变体,并分析了该算法在单位磁盘图上的覆盖率方面的行为。在目标搜索问题上,我们还比较了Nomadic Levy walk和Homesick Levy walk。仿真结果表明,与Homesick Levy walk相比,该算法在单位磁盘图上的稀疏目标检测效率显著提高,并且提高了覆盖率。此外,还分析了储层的移动对靶区勘探效率的影响。
{"title":"Target exploration by Nomadic Lévy walk on unit disk graphs","authors":"K. Sugihara, Naohiro Hayashibara","doi":"10.1504/ijguc.2020.10026552","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026552","url":null,"abstract":"Levy walk has attracted attention for its search efficiency. Homesick Levy walk is a family of random walks whose encounter probability of one another is similar to the one of human behaviour. However, its homing behaviour limits the search area of each agent. In this paper, we propose a variant of Homesick Levy walk called Nomadic Levy walk and analyse the behaviour of the algorithm regarding the cover ratio on unit disk graphs. We also show the comparison of Nomadic Levy walk and Homesick Levy walk regarding the target search problem. Our simulation results indicate that the proposed algorithm is significantly efficient for sparse target detection on unit disk graphs compared to Homesick Levy walk, and it also improves the cover ratio. Moreover, we analyse the impact of the movement of the sink (home position) on the efficiency of the target exploration.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122159187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a secure and lightweight network function virtualisation environment 迈向安全、轻量级的网络功能虚拟化环境
Pub Date : 2020-02-03 DOI: 10.1504/ijguc.2020.10026554
Marco de Benedictis, A. Lioy, Paolo Smiraglia
Cloud computing has deeply affected the structure of modern ICT infrastructures. It represents an enabling technology for novel paradigms such as Network Function Virtualisation (NFV), which proposes the virtualisation of network functions to enhance the flexibility of networks and to reduce the costs of infrastructure management. Besides potential benefits, NFV inherits the limitations of traditional virtualisation where the isolation of resources comes at the cost of a performance overhead. Lightweight forms of virtualisation, like containers, aim to mitigate this limitation. Furthermore, they allow the agile composition of complex services. These characteristics make containers a suitable technology for NFV environment. A major concern towards the exploitation of containers is security. Since containers provide less isolation than virtual machines, they can expose the whole host to vulnerabilities. In this work, we investigate container-related threats and propose a secure design for a Virtual Network Function deployed in a lightweight NFV environment.
云计算深刻影响了现代信息通信技术基础设施的结构。它代表了网络功能虚拟化(NFV)等新范式的使能技术,NFV提出了网络功能的虚拟化,以增强网络的灵活性并降低基础设施管理的成本。除了潜在的好处之外,NFV还继承了传统虚拟化的局限性,即资源的隔离是以性能开销为代价的。轻量级的虚拟化形式,如容器,旨在减轻这种限制。此外,它们还允许对复杂服务进行敏捷组合。这些特点使容器成为NFV环境的合适技术。利用容器的一个主要问题是安全性。由于容器提供的隔离性不如虚拟机,因此它们可能使整个主机暴露于漏洞之下。在这项工作中,我们研究了容器相关的威胁,并提出了一种在轻量级NFV环境中部署的虚拟网络功能的安全设计。
{"title":"Towards a secure and lightweight network function virtualisation environment","authors":"Marco de Benedictis, A. Lioy, Paolo Smiraglia","doi":"10.1504/ijguc.2020.10026554","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10026554","url":null,"abstract":"Cloud computing has deeply affected the structure of modern ICT infrastructures. It represents an enabling technology for novel paradigms such as Network Function Virtualisation (NFV), which proposes the virtualisation of network functions to enhance the flexibility of networks and to reduce the costs of infrastructure management. Besides potential benefits, NFV inherits the limitations of traditional virtualisation where the isolation of resources comes at the cost of a performance overhead. Lightweight forms of virtualisation, like containers, aim to mitigate this limitation. Furthermore, they allow the agile composition of complex services. These characteristics make containers a suitable technology for NFV environment. A major concern towards the exploitation of containers is security. Since containers provide less isolation than virtual machines, they can expose the whole host to vulnerabilities. In this work, we investigate container-related threats and propose a secure design for a Virtual Network Function deployed in a lightweight NFV environment.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Grid Util. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1