首页 > 最新文献

IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications最新文献

英文 中文
Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks 多通道单无线传感器网络的近最优数据传播策略
D. Starobinski, Weiyao Xiao, Xiangping Qin, A. Trachtenberg
We analyze the performance limits of data dissemination with multi-channel, single radio sensors. We formulate the problem of minimizing the average delay of data dissemination as a stochastic shortest path problem and show that, for an arbitrary topology network, an optimal control policy can be found in a finite number of steps, using value iteration or Dijsktra's algorithm. However, the computational complexity of this solution is generally prohibitive. We thus focus on two special classes of network topologies of practical interest, namely single-hop clusters and multi-hop cluster trees. For these topologies, we derive the structure of policies that achieve an average delay within a factor 1 + e of the optimal average delay, in networks with large number of nodes. Through simulation, we show that these policies perform close to optimal even for networks with small and moderate numbers of nodes. Our analysis and simulations reveal that multichannel data dissemination policies lead to a drastic reduction in the average delay, up to a factor as large as the total number of channels available, even though each node can communicate over only one channel at any point of time. Finally, we present the foundations of a methodology, based on extreme value theory, allowing the implementation of our near-optimal dissemination policies with minimal overhead.
我们分析了多通道单无线电传感器数据传播的性能限制。我们将最小化数据传播平均延迟的问题表述为一个随机最短路径问题,并证明了对于任意拓扑网络,可以使用值迭代或Dijsktra算法在有限步数内找到最优控制策略。然而,这种解决方案的计算复杂性通常令人望而却步。因此,我们关注两类特殊的网络拓扑结构,即单跳簇和多跳簇树。对于这些拓扑,我们推导出在具有大量节点的网络中,在最优平均延迟的因子1 + e内实现平均延迟的策略结构。通过仿真,我们表明这些策略即使在节点数量较小和中等的网络中也接近最优。我们的分析和模拟表明,即使每个节点在任何时间点只能通过一个通道进行通信,多通道数据传播策略也会导致平均延迟的急剧减少,最多可达到与可用通道总数一样大的因素。最后,我们提出了一种基于极值理论的方法的基础,允许以最小的开销实现我们的近最佳传播策略。
{"title":"Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks","authors":"D. Starobinski, Weiyao Xiao, Xiangping Qin, A. Trachtenberg","doi":"10.1109/INFCOM.2007.116","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.116","url":null,"abstract":"We analyze the performance limits of data dissemination with multi-channel, single radio sensors. We formulate the problem of minimizing the average delay of data dissemination as a stochastic shortest path problem and show that, for an arbitrary topology network, an optimal control policy can be found in a finite number of steps, using value iteration or Dijsktra's algorithm. However, the computational complexity of this solution is generally prohibitive. We thus focus on two special classes of network topologies of practical interest, namely single-hop clusters and multi-hop cluster trees. For these topologies, we derive the structure of policies that achieve an average delay within a factor 1 + e of the optimal average delay, in networks with large number of nodes. Through simulation, we show that these policies perform close to optimal even for networks with small and moderate numbers of nodes. Our analysis and simulations reveal that multichannel data dissemination policies lead to a drastic reduction in the average delay, up to a factor as large as the total number of channels available, even though each node can communicate over only one channel at any point of time. Finally, we present the foundations of a methodology, based on extreme value theory, allowing the implementation of our near-optimal dissemination policies with minimal overhead.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115414798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Malicious Users in Unstructured Networks 非结构化网络中的恶意用户
George Theodorakopoulos, J. Baras
Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow the network protocol or not. While providing scalability benefits, this degrades the performance, which is compounded by the potential presence of Malicious Users. In general, these users are trying to disrupt the operation of the network, and prevent the legitimate users from achieving their objectives. More specifically, they could try to break the connectivity of the network, or waste the resources of the legitimate users. In this work we use game theory to examine the effect of malicious users. All users are modeled as payoff-maximizing strategic agents. A simple model, fictitious play, is used for the legitimate user behavior, but no limits are imposed on the Malicious Users strategies. We look for the worst case equilibrium: the one that gives Malicious Users the highest payoff. We identify the importance of the network topology.
非结构化网络(如ad-hoc或点对点网络)是对其操作没有集中控制的网络。用户自行决定是否遵循网络协议。虽然提供了可伸缩性方面的好处,但这会降低性能,并且可能存在恶意用户。一般来说,这些用户试图破坏网络的运行,并阻止合法用户达到他们的目的。更具体地说,他们可能试图破坏网络的连接,或者浪费合法用户的资源。在这项工作中,我们使用博弈论来检查恶意用户的影响。所有用户都被建模为收益最大化战略代理。一个简单的模型,虚拟游戏,用于合法用户的行为,但没有限制恶意用户的策略。我们寻找最坏情况的均衡:给恶意用户带来最高回报的均衡。我们认识到网络拓扑结构的重要性。
{"title":"Malicious Users in Unstructured Networks","authors":"George Theodorakopoulos, J. Baras","doi":"10.1109/INFCOM.2007.108","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.108","url":null,"abstract":"Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow the network protocol or not. While providing scalability benefits, this degrades the performance, which is compounded by the potential presence of Malicious Users. In general, these users are trying to disrupt the operation of the network, and prevent the legitimate users from achieving their objectives. More specifically, they could try to break the connectivity of the network, or waste the resources of the legitimate users. In this work we use game theory to examine the effect of malicious users. All users are modeled as payoff-maximizing strategic agents. A simple model, fictitious play, is used for the legitimate user behavior, but no limits are imposed on the Malicious Users strategies. We look for the worst case equilibrium: the one that gives Malicious Users the highest payoff. We identify the importance of the network topology.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Randomized k-Coverage Algorithms For Dense Sensor Networks 密集传感器网络的随机k-覆盖算法
M. Hefeeda, M. Bagheri
We propose new algorithms to achieve k-coverage in dense sensor networks. In such networks, covering sensor locations approximates covering the whole area. However, it has been shown before that selecting the minimum set of sensors to activate from an already deployed set of sensors is NP-hard. We propose an efficient approximation algorithm which achieves a solution of size within a logarithmic factor of the optimal. We prove that our algorithm is correct and analyze its complexity. We implement our algorithm and compare it against two others in the literature. Our results show that the logarithmic factor is only a worst-case upper bound and the solution size is close to the optimal in most cases. A key feature of our algorithm is that it can be implemented in a distributed manner with local information and low message complexity. We design and implement a fully distributed version of our algorithm. Our distributed algorithm does not require that sensors know their locations. Comparison with two other distributed algorithms in the literature indicates that our algorithm: (i) converges much faster than the others, (ii) activates near-optimal number of sensors, and (iii) significantly prolongs (almost doubles) the network lifetime because it consumes much less energy than the other algorithms.
我们提出了在密集传感器网络中实现k覆盖的新算法。在这种网络中,覆盖传感器位置相当于覆盖整个区域。然而,之前已经证明,从已经部署的传感器集中选择激活的最小传感器集是np困难的。我们提出了一种有效的近似算法,该算法在最优的对数因子范围内实现了大小的解。证明了算法的正确性,并分析了算法的复杂度。我们实现了我们的算法,并将其与文献中的其他两种算法进行比较。我们的结果表明,对数因子只是最坏情况的上界,在大多数情况下,解的大小接近最优。该算法的一个关键特点是它可以以分布式的方式实现,具有本地信息和低消息复杂性。我们设计并实现了我们算法的完全分布式版本。我们的分布式算法不需要传感器知道它们的位置。与文献中其他两种分布式算法的比较表明,我们的算法:(i)比其他算法收敛得快得多,(ii)激活接近最优数量的传感器,以及(iii)显著延长(几乎翻倍)网络生命周期,因为它消耗的能量比其他算法少得多。
{"title":"Randomized k-Coverage Algorithms For Dense Sensor Networks","authors":"M. Hefeeda, M. Bagheri","doi":"10.1109/INFCOM.2007.284","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.284","url":null,"abstract":"We propose new algorithms to achieve k-coverage in dense sensor networks. In such networks, covering sensor locations approximates covering the whole area. However, it has been shown before that selecting the minimum set of sensors to activate from an already deployed set of sensors is NP-hard. We propose an efficient approximation algorithm which achieves a solution of size within a logarithmic factor of the optimal. We prove that our algorithm is correct and analyze its complexity. We implement our algorithm and compare it against two others in the literature. Our results show that the logarithmic factor is only a worst-case upper bound and the solution size is close to the optimal in most cases. A key feature of our algorithm is that it can be implemented in a distributed manner with local information and low message complexity. We design and implement a fully distributed version of our algorithm. Our distributed algorithm does not require that sensors know their locations. Comparison with two other distributed algorithms in the literature indicates that our algorithm: (i) converges much faster than the others, (ii) activates near-optimal number of sensors, and (iii) significantly prolongs (almost doubles) the network lifetime because it consumes much less energy than the other algorithms.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Optimizing File Availability in Peer-to-Peer Content Distribution 优化点对点内容分发中的文件可用性
J. Kangasharju, K. Ross, David A. Turner
A fundamental paradigm in peer-to-peer (P2P) content distribution is that of a large community of intermittently-connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P community must replicate and replace files as a function of their popularity to achieve satisfactory performance. In this paper, we develop an analytical optimization theory for benchmarking the performance of replication/replacement algorithms, including algorithms that employ erasure codes. We also consider a content management algorithm, the Top-K Most Frequently Requested algorithm, and show that in most cases this algorithm converges to an optimal replica profile. Finally, we present two approaches for achieving an evenly balanced load over all the peers in the community.
点对点(P2P)内容分发的一个基本范例是一个由间歇性连接的节点组成的大型社区,这些节点合作共享文件。由于节点是间歇性连接的,P2P社区必须根据文件的流行程度复制和替换文件,以达到令人满意的性能。在本文中,我们开发了一个分析优化理论,用于基准测试复制/替换算法的性能,包括使用擦除码的算法。我们还考虑了一种内容管理算法,Top-K最常请求算法,并表明在大多数情况下,该算法收敛到最优副本配置文件。最后,我们提出了在社区中所有节点上实现均衡负载的两种方法。
{"title":"Optimizing File Availability in Peer-to-Peer Content Distribution","authors":"J. Kangasharju, K. Ross, David A. Turner","doi":"10.1109/INFCOM.2007.229","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.229","url":null,"abstract":"A fundamental paradigm in peer-to-peer (P2P) content distribution is that of a large community of intermittently-connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P community must replicate and replace files as a function of their popularity to achieve satisfactory performance. In this paper, we develop an analytical optimization theory for benchmarking the performance of replication/replacement algorithms, including algorithms that employ erasure codes. We also consider a content management algorithm, the Top-K Most Frequently Requested algorithm, and show that in most cases this algorithm converges to an optimal replica profile. Finally, we present two approaches for achieving an evenly balanced load over all the peers in the community.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Packet Loss Characterization in WiFi-Based Long Distance Networks 基于wifi的长距离网络丢包特性研究
Anmol Sheth, S. Nedevschi, Rabin K. Patra, S. Surana, E. Brewer, L. Subramanian
Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, we perform a systematic study to investigate the commonly cited sources of packet loss induced by the wireless channel and by the 802.11 MAC protocol. The channel induced losses that we study are external WiFi, non-WiFi and multipath interference. The protocol induced losses that we study are protocol timeouts and the breakdown of CSMA over WiLD links. Our results are based on measurements performed on two real-world WiLD deployments and a wireless channel emulator. The two deployments allow us to compare measurements across rural and urban settings. The channel emulator allows us to study each source of packet loss in isolation in a controlled environment. Based on our experiments we observe that the presence of external WiFi interference leads to significant amount of packet loss in WiLD links. In addition to identifying the sources of packet loss, we analyze the loss variability across time. We also explore the solution space and propose a range of MAC and network layer adaptation algorithms to mitigate the channel and protocol induced losses. The key lessons from this study were also used in the design of a TDMA based MAC protocol for high performance long distance multihop wireless networks [12].
尽管基于wi - fi的长距离(WiLD)网络部署越来越多,但人们对WiLD网络在实践中的表现缺乏了解。在本文中,我们进行了系统的研究,以调查由无线信道和802.11 MAC协议引起的数据包丢失的常见来源。我们研究的信道损耗包括外部WiFi、非WiFi和多径干扰。我们研究的协议引起的损失是协议超时和CSMA在WiLD链路上的崩溃。我们的结果基于在两个真实世界的WiLD部署和一个无线信道模拟器上执行的测量。这两种部署使我们能够比较农村和城市环境下的测量结果。通道仿真器允许我们在受控环境中隔离地研究每个丢包源。根据我们的实验,我们观察到外部WiFi干扰的存在导致WiLD链路中大量的数据包丢失。除了确定丢包的来源外,我们还分析了丢包随时间的变化。我们还探索了解决方案空间,并提出了一系列MAC和网络层自适应算法来减轻信道和协议引起的损失。本研究的关键经验教训也被用于高性能长距离多跳无线网络基于TDMA的MAC协议的设计[12]。
{"title":"Packet Loss Characterization in WiFi-Based Long Distance Networks","authors":"Anmol Sheth, S. Nedevschi, Rabin K. Patra, S. Surana, E. Brewer, L. Subramanian","doi":"10.1109/INFCOM.2007.44","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.44","url":null,"abstract":"Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, we perform a systematic study to investigate the commonly cited sources of packet loss induced by the wireless channel and by the 802.11 MAC protocol. The channel induced losses that we study are external WiFi, non-WiFi and multipath interference. The protocol induced losses that we study are protocol timeouts and the breakdown of CSMA over WiLD links. Our results are based on measurements performed on two real-world WiLD deployments and a wireless channel emulator. The two deployments allow us to compare measurements across rural and urban settings. The channel emulator allows us to study each source of packet loss in isolation in a controlled environment. Based on our experiments we observe that the presence of external WiFi interference leads to significant amount of packet loss in WiLD links. In addition to identifying the sources of packet loss, we analyze the loss variability across time. We also explore the solution space and propose a range of MAC and network layer adaptation algorithms to mitigate the channel and protocol induced losses. The key lessons from this study were also used in the design of a TDMA based MAC protocol for high performance long distance multihop wireless networks [12].","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
On Cooperation in Energy Limited Wireless Networks 关于能源有限公司无线网络的合作
L. Lai, H. E. Gamal
This paper considers wireless networks with energy limited nodes. In this scenario, multi-hop forwarding is needed to minimize the network energy consumption. In many practical scenarios, however, nodes' selfishness raises doubts on whether each node will be willing to forward packets in order to minimize the overall energy expenditure. To analyze this problem, a non-cooperative game theoretic approach is adopted in our work. Using this framework, the critical role of altruistic nodes in encouraging cooperation is established. More specifically, we show that it is sufficient to have a vanishingly small fraction of the nodes to be altruistic, i.e., relay nodes, in order to ensure full cooperation from all the nodes in the network. This result hinges on using the appropriate forwarding policies by the altruistic nodes, as detailed in the sequel. An important aspect of our work is that only reward/punishment policies that can be realized on the physical layer are used, and hence, our results establish the achievability of full cooperation without requiring additional incentive mechanisms at the higher layer.
本文研究具有能量限制节点的无线网络。在这种情况下,需要使用多跳转发来减少网络能耗。然而,在许多实际场景中,节点的自私自利使人们怀疑每个节点是否愿意为了最小化总体能量消耗而转发数据包。为了分析这一问题,本文采用了非合作博弈论的方法。利用这一框架,确定了利他节点在鼓励合作中的关键作用。更具体地说,我们表明,为了确保网络中所有节点的充分合作,只有很小一部分节点(即中继节点)是利他的就足够了。这一结果取决于利他节点使用适当的转发策略,详见后续文章。我们工作的一个重要方面是,只使用可以在物理层实现的奖惩政策,因此,我们的结果建立了完全合作的可实现性,而不需要在更高层额外的激励机制。
{"title":"On Cooperation in Energy Limited Wireless Networks","authors":"L. Lai, H. E. Gamal","doi":"10.1109/INFCOM.2007.66","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.66","url":null,"abstract":"This paper considers wireless networks with energy limited nodes. In this scenario, multi-hop forwarding is needed to minimize the network energy consumption. In many practical scenarios, however, nodes' selfishness raises doubts on whether each node will be willing to forward packets in order to minimize the overall energy expenditure. To analyze this problem, a non-cooperative game theoretic approach is adopted in our work. Using this framework, the critical role of altruistic nodes in encouraging cooperation is established. More specifically, we show that it is sufficient to have a vanishingly small fraction of the nodes to be altruistic, i.e., relay nodes, in order to ensure full cooperation from all the nodes in the network. This result hinges on using the appropriate forwarding policies by the altruistic nodes, as detailed in the sequel. An important aspect of our work is that only reward/punishment policies that can be realized on the physical layer are used, and hence, our results establish the achievability of full cooperation without requiring additional incentive mechanisms at the higher layer.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122938169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 无线传感器网络中最优干扰攻击与网络防御策略
Mingyan Li, I. Koutsopoulos, R. Poovendran
We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the network lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case.
我们考虑这样一个场景:一个复杂的干扰器阻塞了单通道无线传感器网络中的一个区域。干扰者控制干扰的概率和传输范围,使网络在损坏的通信链路方面受到最大的损害。当网络中的监控节点检测到干扰动作时,该干扰动作停止,并将通知消息传送出干扰区域。通过采用基于发生碰撞百分比的最佳检测测试,在监控节点上检测干扰器。另一方面,网络计算信道访问概率以尽量减少干扰检测和通知时间。为了使干扰器的效益最大化,需要知道监控节点的网络信道访问概率和邻居个数。因此,网络需要知道干扰机的干扰概率。我们研究了干扰者和网络对彼此的策略都有完美知识的理想情况,以及干扰者或网络缺乏这种知识的情况。后者是通过制定和解决优化问题来捕获的,这些优化问题的解决方案构成了攻击者或网络对彼此最坏情况策略的最佳响应。我们还考虑了干扰机和网络的势能约束。我们将问题扩展到多观测器和自适应干扰传输范围的情况,并针对这种情况提出了一种直观的启发式干扰策略。
{"title":"Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks","authors":"Mingyan Li, I. Koutsopoulos, R. Poovendran","doi":"10.1109/INFCOM.2007.155","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.155","url":null,"abstract":"We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the network lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 307
A Framework for Multi-Objective SLA Compliance Monitoring 多目标SLA遵从性监控框架
J. Sommers, P. Barford, N. Duffield, A. Ron
Service level agreements (SLAs) specify performance guarantees made by service providers, typically in terms of packet loss, delay, delay variation, and network availability. While many tools have been developed to measure individual aspects of network performance, there has been little work to directly address the issue of SLA compliance monitoring in an operational setting where accuracy, parsimony, and other related issues are of vital importance. This paper takes the following steps toward addressing this problem: (1) we introduce an architectural framework for integrating multiple discrete-time active measurement algorithms, an architecture that we call multi-objective monitoring; and (2) we introduce a new active measurement methodology to monitor the packet loss rate along a network path for determining compliance with specified performance targets which significantly improves accuracy over existing techniques. We present a prototype implementation of our monitoring framework, and demonstrate how a unified probe stream can consume lower overall bandwidth than if individual streams are used to measure different path properties. We demonstrate the accuracy and convergence properties of our new loss rate monitoring methodology in a controlled laboratory environment using a range of background traffic scenarios and examine its accuracy improvements over existing techniques.
服务水平协议(sla)指定了服务提供商提供的性能保证,通常是在数据包丢失、延迟、延迟变化和网络可用性方面。虽然已经开发了许多工具来测量网络性能的各个方面,但在操作设置中直接解决SLA遵从性监视问题的工作很少,在操作设置中,准确性、简洁性和其他相关问题至关重要。本文采取以下步骤来解决这个问题:(1)我们引入了一个集成多个离散时间主动测量算法的体系结构框架,我们称之为多目标监测体系结构;(2)我们引入了一种新的主动测量方法来监控网络路径上的丢包率,以确定是否符合指定的性能目标,这大大提高了现有技术的准确性。我们展示了监控框架的原型实现,并演示了统一探测流如何比使用单个流来测量不同的路径属性消耗更低的总带宽。我们在受控的实验室环境中使用一系列背景交通场景展示了我们的新损失率监测方法的准确性和收敛性,并检查了其相对于现有技术的准确性改进。
{"title":"A Framework for Multi-Objective SLA Compliance Monitoring","authors":"J. Sommers, P. Barford, N. Duffield, A. Ron","doi":"10.1109/INFCOM.2007.298","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.298","url":null,"abstract":"Service level agreements (SLAs) specify performance guarantees made by service providers, typically in terms of packet loss, delay, delay variation, and network availability. While many tools have been developed to measure individual aspects of network performance, there has been little work to directly address the issue of SLA compliance monitoring in an operational setting where accuracy, parsimony, and other related issues are of vital importance. This paper takes the following steps toward addressing this problem: (1) we introduce an architectural framework for integrating multiple discrete-time active measurement algorithms, an architecture that we call multi-objective monitoring; and (2) we introduce a new active measurement methodology to monitor the packet loss rate along a network path for determining compliance with specified performance targets which significantly improves accuracy over existing techniques. We present a prototype implementation of our monitoring framework, and demonstrate how a unified probe stream can consume lower overall bandwidth than if individual streams are used to measure different path properties. We demonstrate the accuracy and convergence properties of our new loss rate monitoring methodology in a controlled laboratory environment using a range of background traffic scenarios and examine its accuracy improvements over existing techniques.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure 一套无基础设施的用户级网络诊断方案
Yao Zhao, Yan Chen
It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their applications. However, existing tools are inaccurate to infer the link-level loss rates and have large diagnosis granularity (in terms of the number of hops). To address these problems, we propose a suite of user-level diagnosis approaches in two categories: (1) only need to be deployed at the source and (2) deployed at both source and destination. For the former, we propose two fragmentation aided diagnosis approaches (FAD), Algebraic FAD and Opportunistic FAD, which uses IP fragmentation to enable accurate link-level loss rate inference. For the latter category, we propose Striped Probe Analysis (SPA) which significantly improves the diagnosis granularity over those of the source-only approaches. Internet experiments are applied to evaluate each individual schemes (including an improved version of the state-of-the-art tool, Tulip [1]) and various hybrid approaches. The results indicate that our approaches dramatically outperform existing work (especially for diagnosis granularity) and provide not only the best performance but also smooth tradeoff among deployment requirement, diagnosis accuracy and granularity.
对于没有特殊权限的最终用户来说,识别和查明网络中降低其应用程序性能的故障是非常理想和重要的。然而,现有的工具在推断链路级损失率方面是不准确的,并且具有较大的诊断粒度(就跳数而言)。为了解决这些问题,我们提出了一套用户级诊断方法,分为两类:(1)只需要部署在源处,(2)部署在源和目标处。对于前者,我们提出了两种碎片辅助诊断方法(FAD),代数FAD和机会性FAD,它们利用IP碎片来实现准确的链路级损失率推断。对于后者,我们提出了条纹探针分析(SPA),它比仅源方法显著提高了诊断粒度。应用互联网实验来评估每个单独的方案(包括最先进工具的改进版本,Tulip[1])和各种混合方法。结果表明,我们的方法显著优于现有的方法(特别是在诊断粒度方面),不仅提供了最佳的性能,而且在部署需求、诊断准确性和粒度之间进行了平滑的权衡。
{"title":"A Suite of Schemes for User-Level Network Diagnosis without Infrastructure","authors":"Yao Zhao, Yan Chen","doi":"10.1109/INFCOM.2007.251","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.251","url":null,"abstract":"It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their applications. However, existing tools are inaccurate to infer the link-level loss rates and have large diagnosis granularity (in terms of the number of hops). To address these problems, we propose a suite of user-level diagnosis approaches in two categories: (1) only need to be deployed at the source and (2) deployed at both source and destination. For the former, we propose two fragmentation aided diagnosis approaches (FAD), Algebraic FAD and Opportunistic FAD, which uses IP fragmentation to enable accurate link-level loss rate inference. For the latter category, we propose Striped Probe Analysis (SPA) which significantly improves the diagnosis granularity over those of the source-only approaches. Internet experiments are applied to evaluate each individual schemes (including an improved version of the state-of-the-art tool, Tulip [1]) and various hybrid approaches. The results indicate that our approaches dramatically outperform existing work (especially for diagnosis granularity) and provide not only the best performance but also smooth tradeoff among deployment requirement, diagnosis accuracy and granularity.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
E-CSMA: Supporting Enhanced CSMA Performance in Experimental Sensor Networks Using Per-Neighbor Transmission Probability Thresholds E-CSMA:在实验传感器网络中使用单邻居传输概率阈值支持增强的CSMA性能
S. Eisenman, A. Campbell
A transmitter in a wireless network that uses CSMA, a simple carrier sensing-based MAC protocol, to determine the likelihood of successful packet reception at the intended receiver can easily be misled. At the same time, CSMA variants and hybrid MAC protocols based at least in part on carrier sensing have become the de facto standard in wireless sensor networks, underscoring a need to improve its performance. We propose to enhance the de facto state of carrier sensing-based MACs in wireless sensor networks by using low cost channel feedback combined with a learning approach to try to better predict the probability of a successful reception, on a per-receiver basis. We show results from an experimental wireless sensor network testbed, where our proposal E-CSMA (Enhanced CSMA) provides up to a 55% improvement in network performance.
使用CSMA(一种简单的基于载波感知的MAC协议)来确定目标接收器成功接收数据包的可能性的无线网络中的发送器很容易被误导。与此同时,至少部分基于载波传感的CSMA变体和混合MAC协议已经成为无线传感器网络的事实上的标准,这凸显了提高其性能的必要性。我们建议通过使用低成本信道反馈与学习方法相结合,在每个接收器的基础上更好地预测成功接收的概率,来增强无线传感器网络中基于载波传感的mac的实际状态。我们展示了实验性无线传感器网络测试平台的结果,其中我们的提议E-CSMA(增强型CSMA)提供了高达55%的网络性能改进。
{"title":"E-CSMA: Supporting Enhanced CSMA Performance in Experimental Sensor Networks Using Per-Neighbor Transmission Probability Thresholds","authors":"S. Eisenman, A. Campbell","doi":"10.1109/INFCOM.2007.144","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.144","url":null,"abstract":"A transmitter in a wireless network that uses CSMA, a simple carrier sensing-based MAC protocol, to determine the likelihood of successful packet reception at the intended receiver can easily be misled. At the same time, CSMA variants and hybrid MAC protocols based at least in part on carrier sensing have become the de facto standard in wireless sensor networks, underscoring a need to improve its performance. We propose to enhance the de facto state of carrier sensing-based MACs in wireless sensor networks by using low cost channel feedback combined with a learning approach to try to better predict the probability of a successful reception, on a per-receiver basis. We show results from an experimental wireless sensor network testbed, where our proposal E-CSMA (Enhanced CSMA) provides up to a 55% improvement in network performance.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1