首页 > 最新文献

2016 19th International Conference on Network-Based Information Systems (NBiS)最新文献

英文 中文
Evaluation of Different DTN Routing Protocols in an Opportunistic Network Considering Many-to-One Communication Scenario 考虑多对一通信场景的机会网络中不同DTN路由协议的评估
Evjola Spaho, Kevin Bylykbashi, L. Barolli, Vladi Koliçi, Algenti Lala
In this paper, we evaluate and compare the performance of four different routing protocols in a many-to-one communication opportunistic network. Seven groups with three stationary sensor nodes sense the temperature, humidity and wind speed and send these data to a stationary destination node that collect them for statistical and data analysis purposes. Vehicles moving in Tirana city roads during the opportunistic contacts will exchange the sensed data to destination node. The simulations are conducted with the Opportunistic Network Environment (ONE) simulator. For the simulations we considered two different scenarios where the distance of the source nodes from the destination is short and long. The performance is analyzed using delivery probability, overhead ratio, average latency, average number of hops and average buffer time metrics. For both scenarios the effect of increasing ttl is evaluated. The simulation results show that the increase of ttl from 15 min to 60 min slightly effects the performance of all protocols. By increasing the distance between source nodes and destination node, delivery probability is decreased almost10% for all protocols, the overhead for spray and wait does not change, but for other protocols is slightly increased and theaverage number of hops and average latency is increased.
在本文中,我们评估和比较了四种不同路由协议在多对一通信机会网络中的性能。七个组有三个固定的传感器节点,感知温度、湿度和风速,并将这些数据发送到一个固定的目标节点,该节点收集这些数据用于统计和数据分析。在机会接触期间,在地拉那城市道路上行驶的车辆将把感知到的数据交换到目的地节点。在机会网络环境(ONE)模拟器上进行了仿真。对于模拟,我们考虑了两种不同的场景,其中源节点到目的地的距离是短的和长的。性能分析使用传递概率、开销比、平均延迟、平均跳数和平均缓冲时间指标。对于这两种情况,都评估了增加ttl的效果。仿真结果表明,将ttl从15 min增加到60 min对所有协议的性能影响较小。通过增加源节点和目的节点之间的距离,所有协议的发送概率都降低了近10%,喷雾和等待的开销没有变化,但其他协议的开销略有增加,平均跳数和平均延迟增加。
{"title":"Evaluation of Different DTN Routing Protocols in an Opportunistic Network Considering Many-to-One Communication Scenario","authors":"Evjola Spaho, Kevin Bylykbashi, L. Barolli, Vladi Koliçi, Algenti Lala","doi":"10.1109/NBiS.2016.84","DOIUrl":"https://doi.org/10.1109/NBiS.2016.84","url":null,"abstract":"In this paper, we evaluate and compare the performance of four different routing protocols in a many-to-one communication opportunistic network. Seven groups with three stationary sensor nodes sense the temperature, humidity and wind speed and send these data to a stationary destination node that collect them for statistical and data analysis purposes. Vehicles moving in Tirana city roads during the opportunistic contacts will exchange the sensed data to destination node. The simulations are conducted with the Opportunistic Network Environment (ONE) simulator. For the simulations we considered two different scenarios where the distance of the source nodes from the destination is short and long. The performance is analyzed using delivery probability, overhead ratio, average latency, average number of hops and average buffer time metrics. For both scenarios the effect of increasing ttl is evaluated. The simulation results show that the increase of ttl from 15 min to 60 min slightly effects the performance of all protocols. By increasing the distance between source nodes and destination node, delivery probability is decreased almost10% for all protocols, the overhead for spray and wait does not change, but for other protocols is slightly increased and theaverage number of hops and average latency is increased.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122294204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Topic-Based Causally Ordered Delivery of Event Messages in a Peer-to-Peer (P2P) Model of Publish/Subscribe Systems 发布/订阅系统的点对点(P2P)模型中基于主题的事件消息因果顺序传递
Hiroki Nakayama, Shigenari Nakamura, T. Enokido, M. Takizawa
An event-driven publish/subscribe (PS) model of a distributed system is used in various applications. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based PS system (P2PPS model) where each peer process (peer) can both subscribe interesting topics and publish event messages with topics. In our previous studies, we propose the TBC (topicbased causally delivery) protocol an homogeneous networks where maximum delay time between every pair of peers is same. Here, a pair of event messages are checked if the event messages are related in the topic vector and are causally delivered by taking advantage of physical time and linear time. In this paper, we consider a system where peers are interconnected in heterogeneous networks. Here, maximum delay time between every pair of peers is not same. We propose a heterogeneous TBC (HTBC) protocol where event messages are TBC-causally delivered to target peers in heterogeneous network. We evaluate the HTBC protocol and show the number of pair of event messages unnecessarily ordered is reduced in the HTBC protocol.
在各种应用程序中使用分布式系统的事件驱动发布/订阅(PS)模型。本文讨论了基于主题的PS系统的点对点(P2P)模型(P2PPS模型),其中每个对等进程(peer)既可以订阅感兴趣的主题,也可以发布带有主题的事件消息。在我们之前的研究中,我们提出了基于主题的因果传递(TBC)协议,其中每对对等体之间的最大延迟时间相同。在这里,检查一对事件消息是否在主题向量中相关,是否通过利用物理时间和线性时间进行因果传递。在本文中,我们考虑了一个异构网络中节点互连的系统。这里,每对对等体之间的最大延迟时间是不相同的。我们提出了一种异构TBC (HTBC)协议,其中事件消息以TBC因果方式传递给异构网络中的目标对等点。我们评估了HTBC协议,并显示了在HTBC协议中减少了不必要排序的事件消息对的数量。
{"title":"Topic-Based Causally Ordered Delivery of Event Messages in a Peer-to-Peer (P2P) Model of Publish/Subscribe Systems","authors":"Hiroki Nakayama, Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2016.89","DOIUrl":"https://doi.org/10.1109/NBiS.2016.89","url":null,"abstract":"An event-driven publish/subscribe (PS) model of a distributed system is used in various applications. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based PS system (P2PPS model) where each peer process (peer) can both subscribe interesting topics and publish event messages with topics. In our previous studies, we propose the TBC (topicbased causally delivery) protocol an homogeneous networks where maximum delay time between every pair of peers is same. Here, a pair of event messages are checked if the event messages are related in the topic vector and are causally delivered by taking advantage of physical time and linear time. In this paper, we consider a system where peers are interconnected in heterogeneous networks. Here, maximum delay time between every pair of peers is not same. We propose a heterogeneous TBC (HTBC) protocol where event messages are TBC-causally delivered to target peers in heterogeneous network. We evaluate the HTBC protocol and show the number of pair of event messages unnecessarily ordered is reduced in the HTBC protocol.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116856591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Localization in Wireless Sensor Networks Based on RSS Rank Vectors 基于RSS秩向量的无线传感器网络定位
Zengfeng Wang, H. Zhang, Tingting Lv
Localization has been a fundermental and crucial issue for wireless sensor networks (WSNs). In this paper, we propose a distributed range-free localization scheme based on RSS rank vectors (RRV). In RRV, each normal node is first localized in an estimative rectangle based on the connectivity constraints. Then the estimative rectangle of the normal node is refined with the RSS rank vector. At last, the centroid of the estimated residence area is calculated as the location of the normal node. The performance of the proposed methods is validated through simulations. Results confirm that RRV outperforms competing localization approaches.
定位一直是无线传感器网络的基础和关键问题。提出了一种基于RSS秩向量(RRV)的分布式无距离定位方案。在RRV中,首先根据连通性约束将每个法向节点定位到一个估计矩形中。然后用RSS秩向量对正态节点的估计矩形进行细化。最后,计算估计的居住区域的质心作为法向节点的位置。通过仿真验证了所提方法的有效性。结果证实,RRV优于竞争的定位方法。
{"title":"Localization in Wireless Sensor Networks Based on RSS Rank Vectors","authors":"Zengfeng Wang, H. Zhang, Tingting Lv","doi":"10.1109/NBiS.2016.6","DOIUrl":"https://doi.org/10.1109/NBiS.2016.6","url":null,"abstract":"Localization has been a fundermental and crucial issue for wireless sensor networks (WSNs). In this paper, we propose a distributed range-free localization scheme based on RSS rank vectors (RRV). In RRV, each normal node is first localized in an estimative rectangle based on the connectivity constraints. Then the estimative rectangle of the normal node is refined with the RSS rank vector. At last, the centroid of the estimated residence area is calculated as the location of the normal node. The performance of the proposed methods is validated through simulations. Results confirm that RRV outperforms competing localization approaches.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123455532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Realistic Home Energy Management System Using Exogenous Grid Signals 使用外源网格信号的现实家庭能源管理系统
Adnan Ahmad, N. Javaid, Saeed Ahmad, S. Saud, U. Qasim, Z. Khan
One of the most promising concepts which make smart grid (SG) superior over the traditional grid is demand side management (DSM). However, most of the recent DSM techniques are centralized by nature and primarily focus on industrial consumers. In contrast, this paper proposes a realistic home energy management system (RHEMS) which incorporate the residential sector into DSM activities and facilitate the integration of renewable energy sources (RESs). Our proposed RHEMS handle the problem of cost minimization as an optimization problem, and household appliances along with RES are scheduled in response to the real-time pricing of the electricity market. First, the constrained optimization problem is mathematically formulated and then solved by using the genetic algorithm. Simulation results show that the proposed scheme significantly reduce the energy expenses of the consumer i.e. by 35.53%.
使智能电网优于传统电网的最有前途的概念之一是需求侧管理(DSM)。然而,大多数最近的DSM技术本质上是集中的,主要关注工业消费者。相比之下,本文提出了一个现实的家庭能源管理系统(RHEMS),将住宅部门纳入DSM活动,并促进可再生能源(RESs)的整合。我们提出的rems将成本最小化问题作为优化问题来处理,并根据电力市场的实时定价对家用电器和可再生能源进行调度。首先对约束优化问题进行数学表述,然后利用遗传算法进行求解。仿真结果表明,该方案显著降低了用户的能源支出,即降低了35.53%。
{"title":"Realistic Home Energy Management System Using Exogenous Grid Signals","authors":"Adnan Ahmad, N. Javaid, Saeed Ahmad, S. Saud, U. Qasim, Z. Khan","doi":"10.1109/NBiS.2016.78","DOIUrl":"https://doi.org/10.1109/NBiS.2016.78","url":null,"abstract":"One of the most promising concepts which make smart grid (SG) superior over the traditional grid is demand side management (DSM). However, most of the recent DSM techniques are centralized by nature and primarily focus on industrial consumers. In contrast, this paper proposes a realistic home energy management system (RHEMS) which incorporate the residential sector into DSM activities and facilitate the integration of renewable energy sources (RESs). Our proposed RHEMS handle the problem of cost minimization as an optimization problem, and household appliances along with RES are scheduled in response to the real-time pricing of the electricity market. First, the constrained optimization problem is mathematically formulated and then solved by using the genetic algorithm. Simulation results show that the proposed scheme significantly reduce the energy expenses of the consumer i.e. by 35.53%.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"94 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Centroid Localization for Wireless Sensor Networks Using Received Signal Strength 基于接收信号强度的无线传感器网络两阶段质心定位
Zengfeng Wang, Yujuan Sun, H. Zhang, Tingting Lv
A two-stage centroid localization algorithm for wireless networks (WSNs) based on received signal strength (RSS) is proposed. In the first stage, the unknown node performs symmetric lens presence tests to construct a virtual neighboring anchor list. By using the locations of two neighboring anchors and the RSS relationships, a symmetric lens presence test determines a residence area of the unknown node which is geometrically shaped as a half-symmetric lens. The centroid of the estimated residence area is then defined as a virtual neighboring anchor. In the second stage, the location of the unknown node is estimated based on the virtual neighboring anchor locations, using the centroid formula. Simulation results show that the proposed method has better performance compared to other two typical range-free localization methods.
提出了一种基于接收信号强度的两阶段无线网络质心定位算法。在第一阶段,未知节点执行对称透镜存在测试,以构建虚拟相邻锚表。通过使用两个相邻锚点的位置和RSS关系,对称透镜存在测试确定未知节点的驻留区域,该节点的几何形状为半对称透镜。然后将估计的居住区域的质心定义为虚拟的相邻锚点。第二阶段,基于虚拟相邻锚点位置,利用质心公式估计未知节点的位置。仿真结果表明,与其他两种典型的无距离定位方法相比,该方法具有更好的性能。
{"title":"Two-Stage Centroid Localization for Wireless Sensor Networks Using Received Signal Strength","authors":"Zengfeng Wang, Yujuan Sun, H. Zhang, Tingting Lv","doi":"10.1109/NBiS.2016.7","DOIUrl":"https://doi.org/10.1109/NBiS.2016.7","url":null,"abstract":"A two-stage centroid localization algorithm for wireless networks (WSNs) based on received signal strength (RSS) is proposed. In the first stage, the unknown node performs symmetric lens presence tests to construct a virtual neighboring anchor list. By using the locations of two neighboring anchors and the RSS relationships, a symmetric lens presence test determines a residence area of the unknown node which is geometrically shaped as a half-symmetric lens. The centroid of the estimated residence area is then defined as a virtual neighboring anchor. In the second stage, the location of the unknown node is estimated based on the virtual neighboring anchor locations, using the centroid formula. Simulation results show that the proposed method has better performance compared to other two typical range-free localization methods.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Broadcasting System for Webcast 用于网络广播的混合广播系统
T. Ozaki, Y. Gotoh
Due to the recent popularization of hybrid Webcast environments, streaming delivery using broadcast and telecommunication is attracting great attention. In streaming delivery on the hybrid broadcasting environment, clients concurrently receive streaming data such as music or movies from both broadcasting and telecommunication systems. Although these systems compensate for the demerits of each other, the waiting time is lengthened if the system does not deliver the data efficiently. To reduce this waiting time, many researches have been proposed scheduling methods. However, since most scheduling methods use a computer simulation, they do not show clearly the effectiveness. In this paper, we implement a hybrid broadcasting system to solve the problem in the conventional methods. In our proposed system, we evaluate the effectiveness for reducing the waiting time using scheduling methods.
由于近年来混合网络广播环境的普及,使用广播和电信的流媒体传输引起了人们的极大关注。在混合广播环境的流传输中,客户端同时从广播和电信系统接收流数据,如音乐或电影。虽然这些系统相互弥补了缺点,但如果系统不能有效地传递数据,则等待时间会延长。为了减少这种等待时间,许多研究提出了调度方法。然而,由于大多数调度方法使用计算机模拟,它们不能清楚地显示有效性。为了解决传统方法中存在的问题,本文实现了一种混合广播系统。在我们提出的系统中,我们评估了使用调度方法减少等待时间的有效性。
{"title":"Hybrid Broadcasting System for Webcast","authors":"T. Ozaki, Y. Gotoh","doi":"10.1109/NBiS.2016.45","DOIUrl":"https://doi.org/10.1109/NBiS.2016.45","url":null,"abstract":"Due to the recent popularization of hybrid Webcast environments, streaming delivery using broadcast and telecommunication is attracting great attention. In streaming delivery on the hybrid broadcasting environment, clients concurrently receive streaming data such as music or movies from both broadcasting and telecommunication systems. Although these systems compensate for the demerits of each other, the waiting time is lengthened if the system does not deliver the data efficiently. To reduce this waiting time, many researches have been proposed scheduling methods. However, since most scheduling methods use a computer simulation, they do not show clearly the effectiveness. In this paper, we implement a hybrid broadcasting system to solve the problem in the conventional methods. In our proposed system, we evaluate the effectiveness for reducing the waiting time using scheduling methods.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121821454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prediction-Based Smart Meter Data Generator 基于预测的智能电表数据生成器
N. Iftikhar, Xiufeng Liu, F. Nordbjerg, Sergiu Danalachi
With the prevalence of cloud computing and Internet of Things (IoT), smart meters have become one of the main components of smart city strategies. Smart meters generate large amounts of fine-grained data that is used to provide useful information to consumers and utility companies for decision making. Now-a-days, smart meter analytics systems consist of analytical algorithms that process massive amounts of data. These analytics algorithms require ample amounts of realistic data for testing and verification purposes. However, it is usually difficult to obtain adequate amounts of realistic data, mainly due to privacy issues. This paper proposes a smart meter data generator that can generate realistic energy consumption data by making use of a small real-world data set as seed. The generator generates data using a prediction-based method that depends on historical energy consumption patterns along with Gaussian white noise. In this paper, we comprehensively evaluate the efficiency and effectiveness of the proposed method based on a real-world energy data set.
随着云计算和物联网的普及,智能电表已成为智慧城市战略的主要组成部分之一。智能电表生成大量细粒度数据,用于为消费者和公用事业公司提供有用的决策信息。如今,智能电表分析系统由处理大量数据的分析算法组成。这些分析算法需要大量的实际数据进行测试和验证。然而,通常很难获得足够数量的实际数据,主要是由于隐私问题。本文提出了一种智能电表数据生成器,它可以利用一个小的真实数据集作为种子,生成真实的能源消耗数据。生成器使用基于预测的方法生成数据,该方法依赖于历史能耗模式以及高斯白噪声。在本文中,我们基于一个真实的能源数据集对所提出的方法的效率和有效性进行了综合评价。
{"title":"A Prediction-Based Smart Meter Data Generator","authors":"N. Iftikhar, Xiufeng Liu, F. Nordbjerg, Sergiu Danalachi","doi":"10.1109/NBiS.2016.15","DOIUrl":"https://doi.org/10.1109/NBiS.2016.15","url":null,"abstract":"With the prevalence of cloud computing and Internet of Things (IoT), smart meters have become one of the main components of smart city strategies. Smart meters generate large amounts of fine-grained data that is used to provide useful information to consumers and utility companies for decision making. Now-a-days, smart meter analytics systems consist of analytical algorithms that process massive amounts of data. These analytics algorithms require ample amounts of realistic data for testing and verification purposes. However, it is usually difficult to obtain adequate amounts of realistic data, mainly due to privacy issues. This paper proposes a smart meter data generator that can generate realistic energy consumption data by making use of a small real-world data set as seed. The generator generates data using a prediction-based method that depends on historical energy consumption patterns along with Gaussian white noise. In this paper, we comprehensively evaluate the efficiency and effectiveness of the proposed method based on a real-world energy data set.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt 一种考虑人体微小模式的微生物特征认证机制:一个建议和第一次尝试
Masahiro Fujita, Yuto Mano, Takuya Kaneko, Kenta Takahashi, M. Nishigaki
We propose a new biometric authentication mechanism called "micro biometric authentication". This mechanism uses minute patterns of human body parts as biometric information. Minimization of the biometric information used for the authentication enables the mechanism to satisfy the following three requirements needed for biometric authentication systems: (i) higher tolerance against a masquerade attack, (ii) consideration of the issue of traceability, and (iii) higher authentication accuracy. As a first attempt, we developed a micro biometric authentication system that uses minute patterns of human skin texture. Experimental results showed that the system can achieve an EER of about 0.5% and that the mechanism satisfies all three requirements.
我们提出了一种新的生物特征认证机制,称为“微生物特征认证”。这种机制使用人体部位的微小模式作为生物特征信息。将用于认证的生物特征信息最小化,使该机制能够满足生物特征认证系统所需的以下三个要求:(i)对伪装攻击的更高容忍度,(ii)考虑可追溯性问题,以及(iii)更高的认证准确性。作为第一次尝试,我们开发了一种微型生物识别认证系统,该系统使用人体皮肤纹理的微小图案。实验结果表明,该系统能达到0.5%左右的EER,满足上述三个要求。
{"title":"A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt","authors":"Masahiro Fujita, Yuto Mano, Takuya Kaneko, Kenta Takahashi, M. Nishigaki","doi":"10.1109/NBiS.2016.13","DOIUrl":"https://doi.org/10.1109/NBiS.2016.13","url":null,"abstract":"We propose a new biometric authentication mechanism called \"micro biometric authentication\". This mechanism uses minute patterns of human body parts as biometric information. Minimization of the biometric information used for the authentication enables the mechanism to satisfy the following three requirements needed for biometric authentication systems: (i) higher tolerance against a masquerade attack, (ii) consideration of the issue of traceability, and (iii) higher authentication accuracy. As a first attempt, we developed a micro biometric authentication system that uses minute patterns of human skin texture. Experimental results showed that the system can achieve an EER of about 0.5% and that the mechanism satisfies all three requirements.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128574606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Eco Model of Process Migration with Virtual Machines 基于虚拟机的进程迁移生态模型
Ryoma Watanabe, Dilawaer Duolikun, T. Enokido, M. Takizawa
It is critical to reduce the electric energy consumed by servers in clusters. In cloud computing systems, computation resources like CPU, memory, and storages are virtualized so that applications can use the resources without being conscious of which physical servers supports which service. Virtual machine technologies are now used to support applications with virtual computation service. Virtual machines are used to perform application processes issued by clients. More importantly, virtual machines can migrate from a host server to a guest server while processes are being performed on the virtual machines. In this paper, we take advantage of migration technologies of virtual machines to reduce the electric energy consumed by servers in a cluster. By using the virtual machines, we propose an energyaware migration model of processes to decide to which virtual machine a process issued by a client is allocated and which virtual machine migrates to another energy-efficient server in order to reduce the electric energy consumption.
减少集群中服务器消耗的电能是至关重要的。在云计算系统中,CPU、内存和存储等计算资源是虚拟化的,因此应用程序可以使用这些资源,而不需要知道哪个物理服务器支持哪个服务。虚拟机技术现在用于支持具有虚拟计算服务的应用程序。虚拟机用于执行客户端发出的应用程序进程。更重要的是,当虚拟机上正在执行进程时,虚拟机可以从主机服务器迁移到客户服务器。在本文中,我们利用虚拟机的迁移技术来减少集群中服务器的电能消耗。通过使用虚拟机,我们提出了一个进程的能量感知迁移模型,以决定客户端发出的进程分配到哪个虚拟机,哪些虚拟机迁移到另一个节能的服务器上,以减少电能消耗。
{"title":"An Eco Model of Process Migration with Virtual Machines","authors":"Ryoma Watanabe, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2016.72","DOIUrl":"https://doi.org/10.1109/NBiS.2016.72","url":null,"abstract":"It is critical to reduce the electric energy consumed by servers in clusters. In cloud computing systems, computation resources like CPU, memory, and storages are virtualized so that applications can use the resources without being conscious of which physical servers supports which service. Virtual machine technologies are now used to support applications with virtual computation service. Virtual machines are used to perform application processes issued by clients. More importantly, virtual machines can migrate from a host server to a guest server while processes are being performed on the virtual machines. In this paper, we take advantage of migration technologies of virtual machines to reduce the electric energy consumed by servers in a cluster. By using the virtual machines, we propose an energyaware migration model of processes to decide to which virtual machine a process issued by a client is allocated and which virtual machine migrates to another energy-efficient server in order to reduce the electric energy consumption.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Survey of Prevention/Mitigation against Memory Corruption Attacks 对内存损坏攻击的预防/缓解调查
Takamichi Saito, Ryohei Watanabe, Shuta Kondo, S. Sugawara, Masahiro Yokoyama
Memory corruption vulnerability is prevalent in software that are written using languages that lack memory safety features, e.g., C and C++. This has become a serious problem because the number of the attacks that exploit this vulnerability has increased. More specifically, this vulnerability allows control-flow-hijacking, a memory corruption attack that involves a well-known dangerous program stack. Several countermeasures have been proposed both in academia and the information technology industry to thwart such attacks. Some of these countermeasures have been implemented and used in practice. However, memory corruption attacks continue to be a serious problem because even these countermeasures are simply bypassed by new attacks. In this paper, we survey and classify protection and mitigation technologies that are especially pervasive in operating systems and compilers. This study aims to organize the pervasive countermeasures against these attacks. We present the existing countermeasures to address the current serious problem and propose modifications to these countermeasures that can be implemented in the future.
内存损坏漏洞在使用缺乏内存安全特性的语言编写的软件中很普遍,例如C和c++。这已经成为一个严重的问题,因为利用此漏洞的攻击数量有所增加。更具体地说,这个漏洞允许控制流劫持,这是一种涉及众所周知的危险程序堆栈的内存破坏攻击。学术界和信息技术行业都提出了一些应对措施来阻止此类攻击。其中一些对策已在实践中得到实施和应用。然而,内存损坏攻击仍然是一个严重的问题,因为即使这些对策也会被新的攻击绕过。在本文中,我们调查并分类了在操作系统和编译器中特别普遍的保护和缓解技术。本研究旨在组织针对这些攻击的普遍对策。我们提出了解决当前严重问题的现有对策,并对这些对策提出了可以在未来实施的修改。
{"title":"A Survey of Prevention/Mitigation against Memory Corruption Attacks","authors":"Takamichi Saito, Ryohei Watanabe, Shuta Kondo, S. Sugawara, Masahiro Yokoyama","doi":"10.1109/NBiS.2016.11","DOIUrl":"https://doi.org/10.1109/NBiS.2016.11","url":null,"abstract":"Memory corruption vulnerability is prevalent in software that are written using languages that lack memory safety features, e.g., C and C++. This has become a serious problem because the number of the attacks that exploit this vulnerability has increased. More specifically, this vulnerability allows control-flow-hijacking, a memory corruption attack that involves a well-known dangerous program stack. Several countermeasures have been proposed both in academia and the information technology industry to thwart such attacks. Some of these countermeasures have been implemented and used in practice. However, memory corruption attacks continue to be a serious problem because even these countermeasures are simply bypassed by new attacks. In this paper, we survey and classify protection and mitigation technologies that are especially pervasive in operating systems and compilers. This study aims to organize the pervasive countermeasures against these attacks. We present the existing countermeasures to address the current serious problem and propose modifications to these countermeasures that can be implemented in the future.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2016 19th International Conference on Network-Based Information Systems (NBiS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1