首页 > 最新文献

2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Energy-efficient data preservation in intermittently connected sensor networks 间歇连接传感器网络中的节能数据保存
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928882
M. Takahashi, Bin Tang, Neeraj Jaggi
We study data preservation in intermittently connected sensor networks, wherein the sensor nodes do not always have connected paths to the base station. In such networks, the generated data is first stored inside the network before being uploaded to the base station when uploading opportunity arises. How to preserve the data inside the network is therefore an important problem. The problem becomes more challenging when sensor nodes have finite and unreplenishable battery energy. In this paper, we identify, formulate and study the data preservation problem in the intermittently connected sensor networks under energy constraints at sensor nodes. The problem aims to preserve the data inside the network for maximum possible time, by distributing the data items from low energy nodes to high energy nodes. We first show that this problem is NP-hard. We then design a centralized greedy heuristic and a distributed data distribution algorithm, and compare their performances using simulations.
我们研究了间歇性连接的传感器网络中的数据保存,其中传感器节点并不总是有连接到基站的路径。在这种网络中,所产生的数据首先存储在网络内,然后在上传机会出现时上传到基站。因此,如何保存网络内部的数据是一个重要的问题。当传感器节点的电池能量有限且无法补充时,这个问题变得更具挑战性。本文对传感器节点能量约束下的间歇连接传感器网络中的数据保存问题进行了识别、制定和研究。该问题旨在通过将数据项从低能节点分配到高能节点来尽可能长时间地保存网络中的数据。我们首先证明这个问题是np困难的。然后,我们设计了一种中心化贪婪启发式算法和一种分布式数据分布算法,并通过仿真比较了它们的性能。
{"title":"Energy-efficient data preservation in intermittently connected sensor networks","authors":"M. Takahashi, Bin Tang, Neeraj Jaggi","doi":"10.1109/INFCOMW.2011.5928882","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928882","url":null,"abstract":"We study data preservation in intermittently connected sensor networks, wherein the sensor nodes do not always have connected paths to the base station. In such networks, the generated data is first stored inside the network before being uploaded to the base station when uploading opportunity arises. How to preserve the data inside the network is therefore an important problem. The problem becomes more challenging when sensor nodes have finite and unreplenishable battery energy. In this paper, we identify, formulate and study the data preservation problem in the intermittently connected sensor networks under energy constraints at sensor nodes. The problem aims to preserve the data inside the network for maximum possible time, by distributing the data items from low energy nodes to high energy nodes. We first show that this problem is NP-hard. We then design a centralized greedy heuristic and a distributed data distribution algorithm, and compare their performances using simulations.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127972510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Low-rate, flow-level periodicity detection 低速率,流量级周期性检测
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928922
G. Bartlett, J. Heidemann, C. Papadopoulos
As desktops and servers become more complicated, they employ an increasing amount of automatic, non-user initiated communication. Such communication can be good (OS updates, RSS feed readers, and mail polling), bad (keyloggers, spyware, and botnet command-and-control), or ugly (adware or unauthorized peer-to-peer applications). Communication in these applications is often regular, but with very long periods, ranging from minutes to hours. This infrequent communication and the complexity of today's systems makes these applications difficult for users to detect and diagnose. In this paper we present a new approach to identify low-rate periodic network traffic and changes in such regular communication. We employ signal-processing techniques, using discrete wavelets implemented as a fully decomposed, iterated filter bank. This approach not only detects low-rate periodicities, but also identifies approximate times when traffic changed. We implement a self-surveillance application that externally identifies changes to a user's machine, such as interruption of periodic software updates, or an installation of a keylogger.
随着桌面和服务器变得越来越复杂,它们使用越来越多的自动、非用户发起的通信。这种通信可以是好的(操作系统更新、RSS提要阅读器和邮件轮询),也可以是坏的(键盘记录程序、间谍软件和僵尸网络的命令和控制),也可以是难看的(广告软件或未经授权的点对点应用程序)。这些应用程序中的通信通常是有规律的,但周期很长,从几分钟到几小时不等。这种不频繁的通信和当今系统的复杂性使得用户难以检测和诊断这些应用程序。在本文中,我们提出了一种新的方法来识别低速率的周期性网络流量和这种定期通信的变化。我们采用信号处理技术,将离散小波实现为完全分解的迭代滤波器组。这种方法不仅可以检测到低频率的周期性,还可以识别流量变化的近似时间。我们实现了一个自我监视应用程序,该应用程序从外部识别对用户计算机的更改,例如定期软件更新的中断,或键盘记录器的安装。
{"title":"Low-rate, flow-level periodicity detection","authors":"G. Bartlett, J. Heidemann, C. Papadopoulos","doi":"10.1109/INFCOMW.2011.5928922","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928922","url":null,"abstract":"As desktops and servers become more complicated, they employ an increasing amount of automatic, non-user initiated communication. Such communication can be good (OS updates, RSS feed readers, and mail polling), bad (keyloggers, spyware, and botnet command-and-control), or ugly (adware or unauthorized peer-to-peer applications). Communication in these applications is often regular, but with very long periods, ranging from minutes to hours. This infrequent communication and the complexity of today's systems makes these applications difficult for users to detect and diagnose. In this paper we present a new approach to identify low-rate periodic network traffic and changes in such regular communication. We employ signal-processing techniques, using discrete wavelets implemented as a fully decomposed, iterated filter bank. This approach not only detects low-rate periodicities, but also identifies approximate times when traffic changed. We implement a self-surveillance application that externally identifies changes to a user's machine, such as interruption of periodic software updates, or an installation of a keylogger.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Stir: Spontaneous social peer-to-peer streaming 轰动:自发的社交点对点流媒体
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928925
A. Nguyen, Baochun Li, M. Welzl, F. Eliassen
Dealing with a high churn rate is very challenging in live peer-to-peer streaming. State-of-the-art studies try to mitigate the problem by exploiting peer dynamic models, analyzing traces from real world systems, or using enhanced coding techniques, e.g., network coding. Applications of social networking in peer-to-peer systems, especially on file sharing, have recently received research attention. In such systems, the establishment of connections among peers is based on social relationships among users, which are, however, not formed in the context of a peer-to-peer session but, e.g., imported from other social networks. Since friends in such a separate social network do not always have similar interests, they may not necessarily join or stay long in the same peer-to-peer session. We believe that a tight integration between the high level social network of users and the low level overlay of peers would bring significant benefits in dealing with high churn rates and providing personalized streaming services. This paper presents Stir, the first attempt towards an integrated social peer-to-peer streaming system. The key feature of Stir is that social relationships among users are spontaneously formed in a streaming session, and can be exploited directly by the underlying streaming protocol. Stir users, who join the same session, can make friends by means of spontaneous communication, e.g., instant messaging. Such social network formation provides a reliable indication to deal with high churn rate. Our simulations with real social data and peer dynamic traces have demonstrated the benefits of Stir and shed light on building such a system in practice.
处理高流失率在实时点对点流媒体中是非常具有挑战性的。最先进的研究试图通过利用对等动态模型、分析来自现实世界系统的痕迹或使用增强的编码技术(例如网络编码)来缓解这个问题。社交网络在点对点系统中的应用,特别是在文件共享方面的应用,近年来受到了研究的关注。在这样的系统中,对等体之间的连接建立基于用户之间的社会关系,然而,这种关系不是在点对点会话的上下文中形成的,而是,例如,从其他社会网络导入的。由于在这样一个独立的社交网络中的朋友并不总是有相似的兴趣,他们可能不一定会加入或在同一个点对点会话中呆很长时间。我们相信,在高层次的用户社交网络和低层次的用户社交网络之间的紧密整合,将为处理高流失率和提供个性化的流媒体服务带来显著的好处。本文提出了Stir,这是一个集成的社会点对点流媒体系统的第一次尝试。Stir的主要特点是用户之间的社交关系是在流媒体会话中自发形成的,并且可以被底层流媒体协议直接利用。加入同一会话的Stir用户可以通过即时通讯等自发交流方式结交朋友。这种社交网络的形成为处理高流失率提供了可靠的指示。我们对真实社会数据和同伴动态轨迹的模拟已经证明了Stir的好处,并为在实践中构建这样一个系统提供了启示。
{"title":"Stir: Spontaneous social peer-to-peer streaming","authors":"A. Nguyen, Baochun Li, M. Welzl, F. Eliassen","doi":"10.1109/INFCOMW.2011.5928925","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928925","url":null,"abstract":"Dealing with a high churn rate is very challenging in live peer-to-peer streaming. State-of-the-art studies try to mitigate the problem by exploiting peer dynamic models, analyzing traces from real world systems, or using enhanced coding techniques, e.g., network coding. Applications of social networking in peer-to-peer systems, especially on file sharing, have recently received research attention. In such systems, the establishment of connections among peers is based on social relationships among users, which are, however, not formed in the context of a peer-to-peer session but, e.g., imported from other social networks. Since friends in such a separate social network do not always have similar interests, they may not necessarily join or stay long in the same peer-to-peer session. We believe that a tight integration between the high level social network of users and the low level overlay of peers would bring significant benefits in dealing with high churn rates and providing personalized streaming services. This paper presents Stir, the first attempt towards an integrated social peer-to-peer streaming system. The key feature of Stir is that social relationships among users are spontaneously formed in a streaming session, and can be exploited directly by the underlying streaming protocol. Stir users, who join the same session, can make friends by means of spontaneous communication, e.g., instant messaging. Such social network formation provides a reliable indication to deal with high churn rate. Our simulations with real social data and peer dynamic traces have demonstrated the benefits of Stir and shed light on building such a system in practice.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132388444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On allocating interconnecting links against cascading failures in cyber-physical networks 网络物理网络中针对级联故障的互连链路分配研究
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928946
Osman Yağan, Dajun Qian, Junshan Zhang, D. Cochran
We consider a cyber-physical system consisting of two interacting networks, i.e., a cyber-network overlaying a physical-network. In the event of attacks, due to the interdependence between the networks, node failures in one network may result in a cascade of failures affecting both networks - potentially leading to the collapse of the entire infrastructure. Robustness against such catastrophic failure hinges heavily on the allocation of the interconnecting links that connect nodes in one network to nodes in the other network for proper functioning. Assuming that no information about the degree distribution within each of the two constituent networks, we develop a “uniform” allocation strategy that allots inter-network links equally across all nodes. Our findings indicate that, from a network resilience perspective, uniform allocation of internetwork edges yields a significant gain compared to random allocation.
我们考虑一个由两个相互作用的网络组成的网络物理系统,即,一个网络网络覆盖一个物理网络。在发生攻击时,由于网络之间的相互依赖性,一个网络中的节点故障可能导致影响两个网络的级联故障-可能导致整个基础设施的崩溃。对这种灾难性故障的鲁棒性在很大程度上取决于将一个网络中的节点连接到另一个网络中的节点以实现正常功能的互连链路的分配。假设没有关于两个组成网络中每个网络的度分布的信息,我们开发了一个“统一”的分配策略,在所有节点上平等地分配网络间链路。我们的研究结果表明,从网络弹性的角度来看,与随机分配相比,网络边缘的均匀分配产生了显著的收益。
{"title":"On allocating interconnecting links against cascading failures in cyber-physical networks","authors":"Osman Yağan, Dajun Qian, Junshan Zhang, D. Cochran","doi":"10.1109/INFCOMW.2011.5928946","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928946","url":null,"abstract":"We consider a cyber-physical system consisting of two interacting networks, i.e., a cyber-network overlaying a physical-network. In the event of attacks, due to the interdependence between the networks, node failures in one network may result in a cascade of failures affecting both networks - potentially leading to the collapse of the entire infrastructure. Robustness against such catastrophic failure hinges heavily on the allocation of the interconnecting links that connect nodes in one network to nodes in the other network for proper functioning. Assuming that no information about the degree distribution within each of the two constituent networks, we develop a “uniform” allocation strategy that allots inter-network links equally across all nodes. Our findings indicate that, from a network resilience perspective, uniform allocation of internetwork edges yields a significant gain compared to random allocation.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132433115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Rendezvous based trust propagation to enhance distributed network security 基于集合的信任传播增强分布式网络的安全性
Pub Date : 2011-04-10 DOI: 10.1504/IJSN.2011.043670
Ningning Cheng, K. Govindan, P. Mohapatra
Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are based on flooding trust information, which puts a heavy burden on wireless communication, especially in ad hoc network and sensor network. In this paper, we propose a rendezvous based trust propagation scheme. Trust requester and trust provider send out trust-request and computed-trust tickets respectively, which will meet in some common rendezvous node with certain probability. Computed-trust will then be propagated to the requester. We carry out detailed performance evaluations of our scheme. The results show that our method achieves up to 66% overhead reduction in trust propagation compared to flood based methods.
建立与节点之间的信任值相连接的节点网络,并将这些信任值传播到遥远的节点,是现代可信网络的基本操作。利用信任可以减轻无线网络中的安全威胁。现有的信任传播方法大多是基于泛洪信任信息,这给无线通信带来了沉重的负担,特别是在自组网和传感器网络中。本文提出了一种基于集合的信任传播方案。信任请求者和信任提供者分别发出信任请求票和计算信任票,它们将以一定的概率在某个共同的交会节点相遇。然后将计算信任传播给请求者。我们对我们的方案进行了详细的绩效评估。结果表明,与基于洪水的方法相比,我们的方法在信任传播方面减少了66%的开销。
{"title":"Rendezvous based trust propagation to enhance distributed network security","authors":"Ningning Cheng, K. Govindan, P. Mohapatra","doi":"10.1504/IJSN.2011.043670","DOIUrl":"https://doi.org/10.1504/IJSN.2011.043670","url":null,"abstract":"Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are based on flooding trust information, which puts a heavy burden on wireless communication, especially in ad hoc network and sensor network. In this paper, we propose a rendezvous based trust propagation scheme. Trust requester and trust provider send out trust-request and computed-trust tickets respectively, which will meet in some common rendezvous node with certain probability. Computed-trust will then be propagated to the requester. We carry out detailed performance evaluations of our scheme. The results show that our method achieves up to 66% overhead reduction in trust propagation compared to flood based methods.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128383700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A novel approach to optically switching inter-pod traffic in datacenters 一种数据中心光交换舱间流量的新方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928884
Limei Peng, C. Qiao, Wan Tang, Chan-Hyun Youn, Xinwan Li, Guiling Wu, Jianping Chen, Ting Wang
In this paper, we propose and evaluate a novel approach to switching traffic between the pods (or containers) of servers all optically. We show that the proposed approach, called Labeled Optical Burst Switching with Home Circuit (or LOBS-HC) requires a fewer wavelengths (and transceivers) than existing approaches based on wavelength routing or optical circuit switching (OCS). In addition, it is also more suitable than optical burst switching (OBS) and electronic switching. Simulation results from OPNET confirm that LOBS-HC achieves good performance for dynamic inter-pod traffic that is common in a datacenter.
在本文中,我们提出并评估了一种在服务器的pod(或容器)之间光交换流量的新方法。我们表明,与基于波长路由或光电路交换(OCS)的现有方法相比,所提出的方法称为带有家庭电路的标记光突发交换(或LOBS-HC),需要更少的波长(和收发器)。此外,它也比光突发交换(OBS)和电子交换更适用。OPNET的仿真结果证实,LOBS-HC对于数据中心中常见的动态pod间流量具有良好的性能。
{"title":"A novel approach to optically switching inter-pod traffic in datacenters","authors":"Limei Peng, C. Qiao, Wan Tang, Chan-Hyun Youn, Xinwan Li, Guiling Wu, Jianping Chen, Ting Wang","doi":"10.1109/INFCOMW.2011.5928884","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928884","url":null,"abstract":"In this paper, we propose and evaluate a novel approach to switching traffic between the pods (or containers) of servers all optically. We show that the proposed approach, called Labeled Optical Burst Switching with Home Circuit (or LOBS-HC) requires a fewer wavelengths (and transceivers) than existing approaches based on wavelength routing or optical circuit switching (OCS). In addition, it is also more suitable than optical burst switching (OBS) and electronic switching. Simulation results from OPNET confirm that LOBS-HC achieves good performance for dynamic inter-pod traffic that is common in a datacenter.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed rate and admission control in home M2M networks: A non-cooperative game approach 家庭M2M网络中的分布式速率和准入控制:一种非合作博弈方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928807
Rong Yu, Yan Zhang, Yanrong Chen, Chujia Huang, Yang Xiao, M. Guizani
It is envisioned that home networks will shift from the current machine-to-human communications to the machine-to-machine (M2M) paradigm with the rapid penetration of embedded devices in home surroundings. In this paper, we first proposed an architecture of home M2M networks that is decomposed into three sub-areas depending on the radio service ranges and potential applications. We then concentrate on the Quality-of-Service (QoS) management in home M2M networks. Although generic QoS architectures for home M2M networks have been proposed in existing standards, the concrete QoS schemes and algorithms are still missing. Based on the proposed architecture, a cross-layer design of distributed admission and rate control is put forwarded. This proposed scheme, named DRAC, is integrated with a game theory analysis module to model the competition of radio bandwidth among M2M home devices, and embrace the distributed operations of QoS-aware and fair sharing in transmission opportunities. Simulation results indicate that the proposed DRAC scheme allows the M2M home devices to intelligently share the radio bandwidth based on QoS demands in resource-constrained home M2M networks.
可以预见,随着嵌入式设备在家庭环境中的快速渗透,家庭网络将从目前的机器对人通信转变为机器对机器(M2M)范式。在本文中,我们首先提出了一种家庭M2M网络架构,根据无线电服务范围和潜在应用将其分解为三个子区域。然后,我们重点研究了家庭M2M网络中的服务质量(QoS)管理。虽然现有的标准中已经提出了家庭M2M网络的通用QoS架构,但具体的QoS方案和算法仍然缺失。在此基础上,提出了分布式准入和速率控制的跨层设计。该方案集成了博弈论分析模块,以模拟M2M家庭设备之间的无线电带宽竞争,并包含qos感知和传输机会公平共享的分布式操作。仿真结果表明,在资源受限的家庭M2M网络中,所提出的DRAC方案允许M2M家庭设备根据QoS需求智能地共享无线电带宽。
{"title":"Distributed rate and admission control in home M2M networks: A non-cooperative game approach","authors":"Rong Yu, Yan Zhang, Yanrong Chen, Chujia Huang, Yang Xiao, M. Guizani","doi":"10.1109/INFCOMW.2011.5928807","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928807","url":null,"abstract":"It is envisioned that home networks will shift from the current machine-to-human communications to the machine-to-machine (M2M) paradigm with the rapid penetration of embedded devices in home surroundings. In this paper, we first proposed an architecture of home M2M networks that is decomposed into three sub-areas depending on the radio service ranges and potential applications. We then concentrate on the Quality-of-Service (QoS) management in home M2M networks. Although generic QoS architectures for home M2M networks have been proposed in existing standards, the concrete QoS schemes and algorithms are still missing. Based on the proposed architecture, a cross-layer design of distributed admission and rate control is put forwarded. This proposed scheme, named DRAC, is integrated with a game theory analysis module to model the competition of radio bandwidth among M2M home devices, and embrace the distributed operations of QoS-aware and fair sharing in transmission opportunities. Simulation results indicate that the proposed DRAC scheme allows the M2M home devices to intelligently share the radio bandwidth based on QoS demands in resource-constrained home M2M networks.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124157305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Discriminating DDoS attack traffic from flash crowd through packet arrival patterns 通过报文到达模式识别flash人群中的DDoS攻击流量
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928950
Theerasak Thapngam, Shui Yu, Wanlei Zhou, G. Beliakov
Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission strategies and various forms of attack packets to beat defense systems. These problems lead to defense systems requiring various detection methods in order to identify attacks. Moreover, DDoS attacks can mix their traffics during flash crowds. By doing this, the complex defense system cannot detect the attack traffic in time. In this paper, we propose a behavior based detection that can discriminate DDoS attack traffic from traffic generated by real users. By using Pearson's correlation coefficient, our comparable detection methods can extract the repeatable features of the packet arrivals. The extensive simulations were tested for the accuracy of detection. We then performed experiments with several datasets and our results affirm that the proposed method can differentiate traffic of an attack source from legitimate traffic with a quick response. We also discuss approaches to improve our proposed methods at the conclusion of this paper.
目前的DDoS攻击主要是通过攻击工具、蠕虫和僵尸网络,利用不同的报文传输策略和各种形式的攻击报文来攻击防御系统。这些问题导致防御系统需要各种检测方法来识别攻击。此外,DDoS攻击可以在闪电人群期间混合流量。这样会导致复杂防御系统无法及时检测到攻击流量。在本文中,我们提出了一种基于行为的检测方法,可以区分DDoS攻击流量和真实用户产生的流量。通过使用Pearson相关系数,我们的比较检测方法可以提取数据包到达的可重复特征。广泛的模拟测试了检测的准确性。然后,我们对几个数据集进行了实验,结果证实了所提出的方法可以快速响应区分攻击源流量和合法流量。在本文的结论中,我们还讨论了改进我们提出的方法的方法。
{"title":"Discriminating DDoS attack traffic from flash crowd through packet arrival patterns","authors":"Theerasak Thapngam, Shui Yu, Wanlei Zhou, G. Beliakov","doi":"10.1109/INFCOMW.2011.5928950","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928950","url":null,"abstract":"Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission strategies and various forms of attack packets to beat defense systems. These problems lead to defense systems requiring various detection methods in order to identify attacks. Moreover, DDoS attacks can mix their traffics during flash crowds. By doing this, the complex defense system cannot detect the attack traffic in time. In this paper, we propose a behavior based detection that can discriminate DDoS attack traffic from traffic generated by real users. By using Pearson's correlation coefficient, our comparable detection methods can extract the repeatable features of the packet arrivals. The extensive simulations were tested for the accuracy of detection. We then performed experiments with several datasets and our results affirm that the proposed method can differentiate traffic of an attack source from legitimate traffic with a quick response. We also discuss approaches to improve our proposed methods at the conclusion of this paper.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Enhancing the performance of LEACH protocol in wireless sensor networks 提高无线传感器网络中LEACH协议的性能
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928813
Yun Li, Nan Yu, Weiyi Zhang, Weiliang Zhao, X. You, M. Daneshmand
LEACH protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of lifetime and throughput related to the time length of each round are deduced. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
LEACH协议是无线传感器网络中的一种聚类路由协议。LEACH的优点是每个节点成为簇头的概率相等,这使得每个节点的能量消耗相对平衡。在LEACH协议中,时间被分成许多轮,在每一轮中,所有节点根据预定义的标准竞争簇头。本文主要研究如何设置每轮的时间长度,从而延长网络的生命周期,提高吞吐量,以发送到汇聚节点的数据包数量表示。推导出了生命周期和吞吐量与每轮时间长度的关系函数。这些功能可用于增强基于集群的无线传感器网络在生命周期和吞吐量方面的性能。
{"title":"Enhancing the performance of LEACH protocol in wireless sensor networks","authors":"Yun Li, Nan Yu, Weiyi Zhang, Weiliang Zhao, X. You, M. Daneshmand","doi":"10.1109/INFCOMW.2011.5928813","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928813","url":null,"abstract":"LEACH protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of lifetime and throughput related to the time length of each round are deduced. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Battle event detection using sensor networks and distributed query processing 基于传感器网络的战斗事件检测和分布式查询处理
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928912
Mira Yun, Danielle Bragg, Amrinder Arora, Hyeong-Ah Choi
We consider the problem of identifying battlefield events using sensors deployed in the area. The goal is to alert centralized headquarters about the occurrence of significant events so that it can respond appropriately to the events. We propose a mechanism using which the sensors can exchange information using signatures of events instead of data to save on transmission costs. Further, we propose an algorithm that dynamically generates phases of information exchange based on the cost and selectivity of each filter.We present simulation results that compare the proposed algorithm to other alternatives. Our results show that the proposed algorithm detects events while minimizing the transmission and processing costs at sensors.
我们考虑使用部署在该地区的传感器识别战场事件的问题。其目标是提醒中央总部有关重大事件的发生,以便它能够对事件作出适当的反应。我们提出了一种机制,利用该机制,传感器可以使用事件签名而不是数据交换信息,以节省传输成本。此外,我们还提出了一种基于每个滤波器的代价和选择性动态生成信息交换阶段的算法。我们给出了仿真结果,将所提出的算法与其他替代算法进行比较。我们的结果表明,该算法在检测事件的同时最小化了传感器的传输和处理成本。
{"title":"Battle event detection using sensor networks and distributed query processing","authors":"Mira Yun, Danielle Bragg, Amrinder Arora, Hyeong-Ah Choi","doi":"10.1109/INFCOMW.2011.5928912","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928912","url":null,"abstract":"We consider the problem of identifying battlefield events using sensors deployed in the area. The goal is to alert centralized headquarters about the occurrence of significant events so that it can respond appropriately to the events. We propose a mechanism using which the sensors can exchange information using signatures of events instead of data to save on transmission costs. Further, we propose an algorithm that dynamically generates phases of information exchange based on the cost and selectivity of each filter.We present simulation results that compare the proposed algorithm to other alternatives. Our results show that the proposed algorithm detects events while minimizing the transmission and processing costs at sensors.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116729429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1