首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Object Placement for Fully Associative Cache 完全关联缓存的对象放置
Chun-Chieh Lin, Chuen-Liang Chen
This paper models the properties of the data object placement problem for fully associative cache. A fine placement can help to reduce cache misses. The discussed placement approach includes discovering temporal relationship in the data access trace, and packing data objects to memory blocks. The difficulty is the packing process must consider both the cache organization and irregular object sizes. Therefore, we create the graphic model of the fully associative cache. Our study finds the placement optimization problem for one-page cache is equivalent to the graph partition problem, which is a well-known NP-hard problem. It also shows there is no single universal optimal placement for all numbers of cache pages. This finding helps to derive heuristics for arranging quality data object placements that cause less cache misses for the fully associative cache. The experiment demonstrates the proposed heuristics efficiently reduce cache misses, even better than triple the cache memory size. Therefore, it helps embedded system to reduce the demand of cache memory.
本文对全关联缓存中数据对象放置问题的性质进行了建模。一个好的位置可以帮助减少缓存丢失。所讨论的放置方法包括发现数据访问跟踪中的时间关系,以及将数据对象打包到内存块中。难点在于打包过程必须同时考虑缓存组织和不规则对象大小。因此,我们创建了全关联缓存的图形模型。我们的研究发现,单页缓存的放置优化问题相当于图分区问题,这是一个众所周知的np困难问题。它还表明,对于所有数量的缓存页面,没有一个通用的最优位置。这一发现有助于导出启发式方法,以安排高质量的数据对象放置,从而减少完全关联缓存的缓存丢失。实验表明,所提出的启发式算法有效地减少了缓存缺失,甚至比缓存内存大小增加三倍还好。因此,它有助于嵌入式系统减少对高速缓存的需求。
{"title":"Object Placement for Fully Associative Cache","authors":"Chun-Chieh Lin, Chuen-Liang Chen","doi":"10.1109/EUC.2008.77","DOIUrl":"https://doi.org/10.1109/EUC.2008.77","url":null,"abstract":"This paper models the properties of the data object placement problem for fully associative cache. A fine placement can help to reduce cache misses. The discussed placement approach includes discovering temporal relationship in the data access trace, and packing data objects to memory blocks. The difficulty is the packing process must consider both the cache organization and irregular object sizes. Therefore, we create the graphic model of the fully associative cache. Our study finds the placement optimization problem for one-page cache is equivalent to the graph partition problem, which is a well-known NP-hard problem. It also shows there is no single universal optimal placement for all numbers of cache pages. This finding helps to derive heuristics for arranging quality data object placements that cause less cache misses for the fully associative cache. The experiment demonstrates the proposed heuristics efficiently reduce cache misses, even better than triple the cache memory size. Therefore, it helps embedded system to reduce the demand of cache memory.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122263693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme Li等人基于身份的门限签名加密方案的密码分析
S. S. D. Selvi, S. Vivek, C. Rangan, Neha Jain
Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu. They have proved the confidentiality of their scheme and have also claimed the unforgeability without providing satisfactory proof. In this paper, we show that in their signcryption scheme the secret key of the sender is exposed (total break) to the clerk during signcryption and hence insecure in the presence of malicious clerks. Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.
签名加密是一种加密原语,旨在同时提供机密性和身份验证。最近在2008年5月,Fagen Li和Yong Yu提出了一种基于身份的门限签名方案。他们已经证明了他们的计划的保密性,并且在没有提供令人满意的证据的情况下声称其不可伪造性。在本文中,我们证明了在他们的签名加密方案中,发送方的秘密密钥在签名加密期间暴露给了职员,因此在恶意职员存在时是不安全的。在此基础上,提出了该方案的修正版本,并在现有的签名加密安全模型下正式证明了其安全性。
{"title":"Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme","authors":"S. S. D. Selvi, S. Vivek, C. Rangan, Neha Jain","doi":"10.1109/EUC.2008.187","DOIUrl":"https://doi.org/10.1109/EUC.2008.187","url":null,"abstract":"Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu. They have proved the confidentiality of their scheme and have also claimed the unforgeability without providing satisfactory proof. In this paper, we show that in their signcryption scheme the secret key of the sender is exposed (total break) to the clerk during signcryption and hence insecure in the presence of malicious clerks. Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications 一种改进的基于密码的普适应用认证密钥协议方案
M. Tsaur, W. Ku, Hao-Rung Chung
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission between the communicants, an authenticated shared key should be established between the communicants as the encryption key or the MAC key. Recently, Chang, Yang, and Hwang presented a password-based authenticated key agreement scheme that was claimed to be superior to similar schemes with respect to security and efficiency. In this paper, we show that their scheme is vulnerable to a denial-of-service attack. In addition, we demonstrate that their protected password change mechanism fails to provide backward secrecy. Finally, we propose an improved password-based authenticated key agreement scheme that can resist our described denial-of-service attack and can provide backward secrecy.
密码身份验证由于其简单和方便,是普适计算环境中用于用户身份验证的一种流行方法。为了保证通信方之间的传输安全,需要在通信方之间建立一个经过认证的共享密钥作为加密密钥或MAC密钥。最近,Chang, Yang和Hwang提出了一个基于密码的认证密钥协议方案,该方案在安全性和效率方面优于类似方案。在本文中,我们证明了他们的方案容易受到拒绝服务攻击。此外,我们还证明了其受保护的密码更改机制无法提供向后保密。最后,我们提出了一种改进的基于密码的认证密钥协议方案,该方案可以抵抗我们所描述的拒绝服务攻击,并可以提供向后保密。
{"title":"An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications","authors":"M. Tsaur, W. Ku, Hao-Rung Chung","doi":"10.1109/EUC.2008.17","DOIUrl":"https://doi.org/10.1109/EUC.2008.17","url":null,"abstract":"Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission between the communicants, an authenticated shared key should be established between the communicants as the encryption key or the MAC key. Recently, Chang, Yang, and Hwang presented a password-based authenticated key agreement scheme that was claimed to be superior to similar schemes with respect to security and efficiency. In this paper, we show that their scheme is vulnerable to a denial-of-service attack. In addition, we demonstrate that their protected password change mechanism fails to provide backward secrecy. Finally, we propose an improved password-based authenticated key agreement scheme that can resist our described denial-of-service attack and can provide backward secrecy.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121089038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving BitTorrent Network's Performance via Deploying Helpers 通过部署助手提高BitTorrent网络的性能
Ke Xu, Yahui Yang, Tao Chen
This paper presents a study on how to increase the BitTorrent Networkpsilas performance via deploying Helpers by modeling, simulating and analyzing. We first define some high-bandwidth, high-connection and controllable super nodes as Helpers, and then try to find the best way to deploy them. Unlike other researchers, we focus on combining the advantages of both multi-server systems and BitTorrent Systems. Our main findings includes: (1) Deploying Helpers into BitTorrent Systems can distinctly enhance the system performance until the overall uploading bandwidth is no longer the constraint condition. (2) After deploying Helpers, the system can present resistance against selfish peers. (3) We can dynamically change the content of Helpers to serve the ever-changing hot torrents and make it only serve charged peers or local peers from economic angle.
本文通过建模、仿真和分析,研究了如何通过部署helper来提高BitTorrent网络的性能。我们首先定义一些高带宽、高连接、可控的超级节点作为helper,然后尝试找到最好的部署方式。与其他研究人员不同,我们专注于结合多服务器系统和BitTorrent系统的优势。我们的主要发现包括:(1)在BitTorrent系统中部署helper可以显著提高系统性能,直到整体上传带宽不再是约束条件。(2)部署helper后,系统可以对自私的对等体进行抵抗。(3)我们可以动态改变助手的内容,服务于不断变化的热点,从经济角度使其只服务收费同行或本地同行。
{"title":"Improving BitTorrent Network's Performance via Deploying Helpers","authors":"Ke Xu, Yahui Yang, Tao Chen","doi":"10.1109/EUC.2008.96","DOIUrl":"https://doi.org/10.1109/EUC.2008.96","url":null,"abstract":"This paper presents a study on how to increase the BitTorrent Networkpsilas performance via deploying Helpers by modeling, simulating and analyzing. We first define some high-bandwidth, high-connection and controllable super nodes as Helpers, and then try to find the best way to deploy them. Unlike other researchers, we focus on combining the advantages of both multi-server systems and BitTorrent Systems. Our main findings includes: (1) Deploying Helpers into BitTorrent Systems can distinctly enhance the system performance until the overall uploading bandwidth is no longer the constraint condition. (2) After deploying Helpers, the system can present resistance against selfish peers. (3) We can dynamically change the content of Helpers to serve the ever-changing hot torrents and make it only serve charged peers or local peers from economic angle.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124991607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing 进程间通信效率对高性能分布式科学计算的影响评价
Ehsan Mousavi Khaneghah, S. L. Mirtaheri, M. Sharifi
Scientific applications like weather forecasting require high performance and fast response time. But this ideal requirement has always been constrained by peculiarities of underlying platforms specially distributed platforms. One such constraint is the efficiency of communication between geographically dispersed and physically distributed processes running these applications, that is the efficiency of inter process communication (IPC) mechanisms. This paper provides hard evidence that an operating system kernel-level implementation of IPC on multi-computers reduces the execution time of a weather forecasting model by nearly half on average compared to when the IPC mechanism is implemented at library level. A well known non-hydrostatic version of the Penn state/NCAR mesoscale model, called MM5, is executed on a networked cluster. The performance of MM5 is measured with two distributed implementations of IPC, a kernel-level implementation called DIPC2006 and a renowned library level implementation called MPI. It is both shown how and argued why the performance of MM5 on a DIPC2006 configured cluster is by far better than its performance on an MPI configured similar cluster. Even ignoring the favorable points of kernel-level implementations, like safety, privilege, reliability, and primitiveness, the insight is twofold. Scientist may look for more efficient distributed implementations of IPC to run their simulations faster, and computer engineers may try harder to develop more efficient distributed implementations of IPC for scientists.
像天气预报这样的科学应用需要高性能和快速响应时间。但是这种理想的需求总是受到底层平台(特别是分布式平台)特性的限制。其中一个约束是运行这些应用程序的地理上分散的进程和物理上分布的进程之间的通信效率,即进程间通信(IPC)机制的效率。本文提供了确凿的证据表明,与在库级别实现IPC机制相比,在多台计算机上实现操作系统内核级别的IPC机制可将天气预报模型的执行时间平均减少近一半。宾夕法尼亚州立大学/NCAR中尺度模型的一个著名的非流体静力版本,称为MM5,在一个网络集群上执行。MM5的性能是用两个分布式IPC实现来衡量的,一个是称为DIPC2006的内核级实现,另一个是称为MPI的著名库级实现。本文展示了MM5在配置了DIPC2006的集群上的性能如何远远好于其在配置了MPI的类似集群上的性能,并对此进行了论证。即使忽略内核级实现的优点,如安全性、特权、可靠性和原语性,这种见解也是双重的。科学家可能会寻找更有效的IPC分布式实现来更快地运行他们的模拟,计算机工程师可能会更努力地为科学家开发更有效的IPC分布式实现。
{"title":"Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing","authors":"Ehsan Mousavi Khaneghah, S. L. Mirtaheri, M. Sharifi","doi":"10.1109/EUC.2008.11","DOIUrl":"https://doi.org/10.1109/EUC.2008.11","url":null,"abstract":"Scientific applications like weather forecasting require high performance and fast response time. But this ideal requirement has always been constrained by peculiarities of underlying platforms specially distributed platforms. One such constraint is the efficiency of communication between geographically dispersed and physically distributed processes running these applications, that is the efficiency of inter process communication (IPC) mechanisms. This paper provides hard evidence that an operating system kernel-level implementation of IPC on multi-computers reduces the execution time of a weather forecasting model by nearly half on average compared to when the IPC mechanism is implemented at library level. A well known non-hydrostatic version of the Penn state/NCAR mesoscale model, called MM5, is executed on a networked cluster. The performance of MM5 is measured with two distributed implementations of IPC, a kernel-level implementation called DIPC2006 and a renowned library level implementation called MPI. It is both shown how and argued why the performance of MM5 on a DIPC2006 configured cluster is by far better than its performance on an MPI configured similar cluster. Even ignoring the favorable points of kernel-level implementations, like safety, privilege, reliability, and primitiveness, the insight is twofold. Scientist may look for more efficient distributed implementations of IPC to run their simulations faster, and computer engineers may try harder to develop more efficient distributed implementations of IPC for scientists.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN 多用途异步WSN的加密数据访问控制研究
Qian Sun, Shanqing Guo, Qiuliang Xu
The data storaged in multi-purpose asynchronous wireless sensor network should be encrypted to protect against physical attacks. Meanwhile,in multi-purpose wireless sensor network,an access control mechanism is needed to differentiate the encrypted data which belong to different applications. However, as the author knows, by far, no secure scheme solving this problem has been proposed. In this paper, we introduce an attribute-based encryption scheme to address the encrypted data storage and access control issues, through experiment and analysis we prove that the ABE scheme could be applied to multi-purpose asynchronous WSN.
多用途异步无线传感器网络中存储的数据需要进行加密,以防止物理攻击。同时,在多用途无线传感器网络中,需要一种访问控制机制来区分属于不同应用的加密数据。然而,据笔者所知,到目前为止,还没有一个安全的方案可以解决这个问题。本文提出了一种基于属性的加密方案来解决加密数据的存储和访问控制问题,并通过实验和分析证明了ABE方案可以应用于多用途异步WSN。
{"title":"Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN","authors":"Qian Sun, Shanqing Guo, Qiuliang Xu","doi":"10.1109/EUC.2008.37","DOIUrl":"https://doi.org/10.1109/EUC.2008.37","url":null,"abstract":"The data storaged in multi-purpose asynchronous wireless sensor network should be encrypted to protect against physical attacks. Meanwhile,in multi-purpose wireless sensor network,an access control mechanism is needed to differentiate the encrypted data which belong to different applications. However, as the author knows, by far, no secure scheme solving this problem has been proposed. In this paper, we introduce an attribute-based encryption scheme to address the encrypted data storage and access control issues, through experiment and analysis we prove that the ABE scheme could be applied to multi-purpose asynchronous WSN.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133473554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Management for Context-Aware Computing 上下文感知计算的数据管理
Wenwei Xue, H. Pung, W. Ng, T. Gu
We envisage future context-aware applications will dynamically adapt their behaviors to various context data from sources in wide-area networks, such as the Internet. Facing the changing context and the sheer number of context sources, a data management system that supports effective source organization and efficient data lookup becomes crucial to the easy development of context-aware applications. In this paper, we propose the design of a new context data management system that is equipped with query processing capabilities. We encapsulate the context sources into physical spaces belonging to different context spaces and organize them as peers in semantic overlay networks. Initial evaluation results of an experimental system prototype demonstrate the effectiveness of our design.
我们设想未来的上下文感知应用程序将动态地调整其行为以适应来自广域网(如互联网)的各种上下文数据。面对不断变化的上下文和大量上下文源,支持有效的源组织和高效的数据查找的数据管理系统对于轻松开发上下文感知应用程序至关重要。本文提出了一种具有查询处理能力的新型上下文数据管理系统的设计。我们将上下文源封装到属于不同上下文空间的物理空间中,并将它们组织为语义覆盖网络中的对等体。实验系统原型的初步评估结果证明了我们设计的有效性。
{"title":"Data Management for Context-Aware Computing","authors":"Wenwei Xue, H. Pung, W. Ng, T. Gu","doi":"10.1109/EUC.2008.27","DOIUrl":"https://doi.org/10.1109/EUC.2008.27","url":null,"abstract":"We envisage future context-aware applications will dynamically adapt their behaviors to various context data from sources in wide-area networks, such as the Internet. Facing the changing context and the sheer number of context sources, a data management system that supports effective source organization and efficient data lookup becomes crucial to the easy development of context-aware applications. In this paper, we propose the design of a new context data management system that is equipped with query processing capabilities. We encapsulate the context sources into physical spaces belonging to different context spaces and organize them as peers in semantic overlay networks. Initial evaluation results of an experimental system prototype demonstrate the effectiveness of our design.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133378292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks 结构化P2P网络中路由负载分散对拥塞控制的影响
Guowei Huang, Zhi Chen, Ying Wu, G. Wu
In structured P2P networks, the heterogeneity of node capacity, the skewness in query pattern and the greedy routing strategy could result in the load imbalance problem. However, existing load balancing algorithms for structured P2P networks mainly focused on handling the heterogeneity among nodes and the skewed workload. To deal with the load imbalance issue caused by the greedy routing strategy, we propose a routing load dispersion (RLD) mechanism for structured P2P networks in this paper. The mechanism manages to disperse the routing load of queries among nodes so that more nodes have a chance to dedicate their capacities for routing. By dispersing the routing load, the RLD mechanism is able to make use of the free capacity in the network and avoid the congestion effectively. We also evaluate the RLD mechanism by extensive simulations and the simulation results demonstrate the effectiveness of RLD mechanism on congestion control under different workload and churn levels.
在结构化P2P网络中,节点容量的异构性、查询模式的偏性和贪心路由策略会导致负载不均衡问题。然而,现有的结构化P2P网络负载均衡算法主要侧重于处理节点间的异构性和负载的倾斜。为了解决贪心路由策略导致的负载不均衡问题,提出了一种结构化P2P网络的路由负载分散机制。该机制设法在节点之间分散查询的路由负载,以便更多节点有机会将它们的容量用于路由。RLD机制通过分散路由负载,有效地利用了网络的空闲容量,避免了网络拥塞。我们还通过大量的仿真对RLD机制进行了评估,仿真结果证明了RLD机制在不同工作负载和用户流失水平下对拥塞控制的有效性。
{"title":"The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks","authors":"Guowei Huang, Zhi Chen, Ying Wu, G. Wu","doi":"10.1109/EUC.2008.131","DOIUrl":"https://doi.org/10.1109/EUC.2008.131","url":null,"abstract":"In structured P2P networks, the heterogeneity of node capacity, the skewness in query pattern and the greedy routing strategy could result in the load imbalance problem. However, existing load balancing algorithms for structured P2P networks mainly focused on handling the heterogeneity among nodes and the skewed workload. To deal with the load imbalance issue caused by the greedy routing strategy, we propose a routing load dispersion (RLD) mechanism for structured P2P networks in this paper. The mechanism manages to disperse the routing load of queries among nodes so that more nodes have a chance to dedicate their capacities for routing. By dispersing the routing load, the RLD mechanism is able to make use of the free capacity in the network and avoid the congestion effectively. We also evaluate the RLD mechanism by extensive simulations and the simulation results demonstrate the effectiveness of RLD mechanism on congestion control under different workload and churn levels.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114803816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Key Management Scheme for Cluster Based Wireless Sensor Networks 一种基于集群的无线传感器网络密钥管理方案
R. Azarderakhsh, A. Reyhani-Masoleh, Zine-Eddine Abid
Key management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same capability. The recent research has shown that the survivability of the network can be improved if sensor nodes are grouped in clusters in which a powerful cluster head assigned. However, to gain advantages of clustering in order to find an efficient key management scheme needs more research. In this paper, we investigate the key management in cluster-based wireless sensor networks using both private and public key cryptography. Our goal is to introduce a platform in which public key cryptography is used to establish a secure link between sensor nodes and gateways. Instead of pre-loading a large number of keys into the sensor nodes, each node requests a session key from the gateway to establish a secure link with its neighbors after clustering phase. The security analysis and performance evaluation show that the proposed scheme has significant saving in storage space, transmission overhead, and perfect resilience against node capture.
密钥管理是实现无线传感器网络安全的主要挑战。在现有的无线传感器网络密钥管理方案中,大多数都假设传感器节点具有相同的能力。最近的研究表明,如果将传感器节点分组到集群中,并在集群中分配一个强大的簇头,则可以提高网络的生存能力。然而,为了充分利用集群的优势,找到一种有效的密钥管理方案还需要进一步的研究。本文研究了基于簇的无线传感器网络中使用私钥和公钥加密的密钥管理问题。我们的目标是引入一个平台,其中使用公钥加密技术在传感器节点和网关之间建立安全链接。在集群阶段结束后,每个节点向网关请求一个会话密钥,从而与其邻居建立安全链路,而不是将大量密钥预加载到传感器节点中。安全性分析和性能评估表明,该方案在存储空间和传输开销方面具有显著的节省,并且具有良好的抗节点捕获能力。
{"title":"A Key Management Scheme for Cluster Based Wireless Sensor Networks","authors":"R. Azarderakhsh, A. Reyhani-Masoleh, Zine-Eddine Abid","doi":"10.1109/EUC.2008.176","DOIUrl":"https://doi.org/10.1109/EUC.2008.176","url":null,"abstract":"Key management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same capability. The recent research has shown that the survivability of the network can be improved if sensor nodes are grouped in clusters in which a powerful cluster head assigned. However, to gain advantages of clustering in order to find an efficient key management scheme needs more research. In this paper, we investigate the key management in cluster-based wireless sensor networks using both private and public key cryptography. Our goal is to introduce a platform in which public key cryptography is used to establish a secure link between sensor nodes and gateways. Instead of pre-loading a large number of keys into the sensor nodes, each node requests a session key from the gateway to establish a secure link with its neighbors after clustering phase. The security analysis and performance evaluation show that the proposed scheme has significant saving in storage space, transmission overhead, and perfect resilience against node capture.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Attacks on Improved Key Distribution Protocols with Perfect Reparability 具有完全可修复性的改进密钥分发协议的攻击
R. Phan, B. Goi
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.
本文介绍了针对ICON 2000会议上提出的两个具有完全可修复性的改进密钥分发协议的攻击。首先,我们证明了他们论文中描述的两种ldquoattacksrdquo是微不足道的,根本不能算作攻击,因为它们是适用于任何安全系统的众所周知的攻击。此外,我们描述了针对这两种改进协议的几种攻击,并表明非法攻击者可以很容易地冒充合法方,并使其他方认为他们正在与被冒充方共享密钥,而实际上该方根本不存在。
{"title":"Attacks on Improved Key Distribution Protocols with Perfect Reparability","authors":"R. Phan, B. Goi","doi":"10.1109/EUC.2008.161","DOIUrl":"https://doi.org/10.1109/EUC.2008.161","url":null,"abstract":"In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1