首页 > 最新文献

2008 New Technologies, Mobility and Security最新文献

英文 中文
Connectivity Aware Instrumental Approach for Measuring Vocal Transmission Quality Over a Wireless Ad-Hoc Network 在无线自组织网络上测量语音传输质量的连接感知仪器方法
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.32
Sofiene Jelassi, H. Youssef
This paper describes an on-line, end-to-end and non- intrusive approach to estimate the vocal transmission quality over wireless ad-hoc networks. The proposed assessment algorithm, denoted PEVOM (perceptual evaluation of voice over MANETs), is based on the fact that the observed quality of packet based voice conversations is time varying and that mobile users may tolerate degradation of perceptual quality and even the interruption of service. The evaluation of transmission quality adopted by PEVOM is relying on e-model paradigm. PEVOM includes an original extension to e-model to adequately rate the distortion effect due to the intermittent nature of established connection incurred by mobile users over a MANET. Specifically, PEVOM checks passively the connectivity between communicating parties by monitoring periodically the ratio of active to total time. When mobile users are connected, PEVOM calculates the perceptual quality using the conventional e-model. However, when mobile nodes are disconnected, PEVOM calculates the perceptual quality according to an expected recency effect. At the end of each connected/disconnected period, PEVOM estimates the perceptual quality of each interval using a weighted average over time. At the end of a vocal session, PEVOM rates the overall conversational quality using a weighted average over time of the produced rating factor of each connected/disconnected interval. The rating behavior of PEVOM is verified through a study of the vocal transmission quality over an intermittent multi-hop wireless connection.
本文描述了一种在线、端到端、非侵入式的无线自组织网络语音传输质量评估方法。所提出的评估算法,称为PEVOM(感知评价的语音在manet),是基于这样一个事实,即观察到的基于分组的语音会话的质量是时变的,移动用户可以容忍感知质量的下降,甚至服务的中断。PEVOM采用的传输质量评价依赖于e-model范式。PEVOM包括对e-model的原始扩展,以充分评估由于移动用户在MANET上产生的已建立连接的间歇性而导致的失真效应。具体来说,PEVOM通过定期监视活动时间与总时间的比率,被动地检查通信各方之间的连通性。当移动用户连接时,PEVOM使用传统的e-model计算感知质量。然而,当移动节点断开连接时,PEVOM根据预期的近因效应计算感知质量。在每个连接/断开时间段结束时,PEVOM使用随时间的加权平均值估计每个区间的感知质量。在语音会话结束时,PEVOM使用每个连接/断开间隔产生的评分因子随时间的加权平均值对整体会话质量进行评分。通过对间歇多跳无线连接的语音传输质量的研究,验证了PEVOM的评级行为。
{"title":"Connectivity Aware Instrumental Approach for Measuring Vocal Transmission Quality Over a Wireless Ad-Hoc Network","authors":"Sofiene Jelassi, H. Youssef","doi":"10.1109/NTMS.2008.ECP.32","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.32","url":null,"abstract":"This paper describes an on-line, end-to-end and non- intrusive approach to estimate the vocal transmission quality over wireless ad-hoc networks. The proposed assessment algorithm, denoted PEVOM (perceptual evaluation of voice over MANETs), is based on the fact that the observed quality of packet based voice conversations is time varying and that mobile users may tolerate degradation of perceptual quality and even the interruption of service. The evaluation of transmission quality adopted by PEVOM is relying on e-model paradigm. PEVOM includes an original extension to e-model to adequately rate the distortion effect due to the intermittent nature of established connection incurred by mobile users over a MANET. Specifically, PEVOM checks passively the connectivity between communicating parties by monitoring periodically the ratio of active to total time. When mobile users are connected, PEVOM calculates the perceptual quality using the conventional e-model. However, when mobile nodes are disconnected, PEVOM calculates the perceptual quality according to an expected recency effect. At the end of each connected/disconnected period, PEVOM estimates the perceptual quality of each interval using a weighted average over time. At the end of a vocal session, PEVOM rates the overall conversational quality using a weighted average over time of the produced rating factor of each connected/disconnected interval. The rating behavior of PEVOM is verified through a study of the vocal transmission quality over an intermittent multi-hop wireless connection.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque Values SIP的相互认证:SIP不透明值的语义含义
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.69
Thomas Guillet, A. Serhrouchni, M. Badra
The session initiation protocol (SIP) is rapidly becoming the dominant signalling protocol for calls over the Internet. It has quickly made large inroads into the voice over IP (VoIP) market. SIP is an application-layer control operating on top of a transport protocol and allows to create, modify, and terminate sessions with one or more participants. With security considerations, these operations require authentication from participating end-points, confidentiality, data integrity, and protection against internal and external attacks. For authentication, SIP relies on HTTP Digest by default; the client is authenticated to the SIP proxy server. In order to have mutual authentication between client and server, SIP could be implemented over TLS (transport layer security) when TCP is supported by SIP architecture network. In this paper, we propose a mutual authentication mechanism within HTTP Digest since this later is implemented by default in all SIP environments. It consists in providing meaning and semantic to some of the parameters' values generated by the participating end-points during SIP session establishment, especially to the "nonce" values. Our solution is backward-compatible with today implementations. Without being in opposition to security protocols like TLS, this approach helps in reducing DoS (denial of service) attacks, detects server identity spoofing and ensures basic mutual authentication with comparison to HTTP digest.
会话发起协议(SIP)正迅速成为互联网呼叫的主要信令协议。它迅速大举进军IP语音(VoIP)市场。SIP是运行在传输协议之上的应用层控制,允许创建、修改和终止与一个或多个参与者的会话。考虑到安全性,这些操作需要来自参与端点的身份验证、机密性、数据完整性以及对内部和外部攻击的保护。对于身份验证,SIP默认依赖于HTTP摘要;客户端向SIP代理服务器认证。为了实现客户端和服务器之间的相互认证,在SIP架构网络支持TCP协议的情况下,可以在TLS(传输层安全协议)上实现SIP协议。在本文中,我们在HTTP摘要中提出了一种相互身份验证机制,因为这在所有SIP环境中都是默认实现的。它包括为参与的端点在SIP会话建立期间生成的一些参数值提供含义和语义,特别是为“nonce”值提供含义和语义。我们的解决方案向后兼容当前的实现。在不与TLS等安全协议对立的情况下,这种方法有助于减少DoS(拒绝服务)攻击,检测服务器身份欺骗,并确保与HTTP摘要相比的基本相互身份验证。
{"title":"Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque Values","authors":"Thomas Guillet, A. Serhrouchni, M. Badra","doi":"10.1109/NTMS.2008.ECP.69","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.69","url":null,"abstract":"The session initiation protocol (SIP) is rapidly becoming the dominant signalling protocol for calls over the Internet. It has quickly made large inroads into the voice over IP (VoIP) market. SIP is an application-layer control operating on top of a transport protocol and allows to create, modify, and terminate sessions with one or more participants. With security considerations, these operations require authentication from participating end-points, confidentiality, data integrity, and protection against internal and external attacks. For authentication, SIP relies on HTTP Digest by default; the client is authenticated to the SIP proxy server. In order to have mutual authentication between client and server, SIP could be implemented over TLS (transport layer security) when TCP is supported by SIP architecture network. In this paper, we propose a mutual authentication mechanism within HTTP Digest since this later is implemented by default in all SIP environments. It consists in providing meaning and semantic to some of the parameters' values generated by the participating end-points during SIP session establishment, especially to the \"nonce\" values. Our solution is backward-compatible with today implementations. Without being in opposition to security protocols like TLS, this approach helps in reducing DoS (denial of service) attacks, detects server identity spoofing and ensures basic mutual authentication with comparison to HTTP digest.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Employing Clustering Techniques in Mobile Network Planning 应用聚类技术进行移动网络规划
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.42
L. F. Ibrahim, M. A. Harbi
Network planning is of key importance during the construction of new communities and cities, in which telephone and data services have to be introduced as a component of the overall master plan of the city. With the rapid development in mobile network we need effective network planning tool to satisfy the need of customers. However, deciding upon the optimum placement for the base stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper addresses antenna placement problem or the cell planning problem, involves locating and configuring infrastructure for mobile networks by modified the original partitioning around medoids PAM algorithm. The PAM original algorithm has been modified and a new algorithm M- PAM (modified-partitioning around medoids) has been proposed by the authors in a recent work (L.F Ibrahin and M.H. Al Harbi, 2008). This paper presents CWN-PAM (clustering with weighted node-partitioning around medoids) algorithm and compare it with M-PAM algorithm. Implementation of this algorithm to a real case study is presented. Results demonstrate the effectiveness and flexibility of the modifying algorithm in tackling the important problem of mobile network planning.
网络规划在建设新社区和新城市期间具有关键的重要性,其中电话和数据服务必须作为城市总体总体规划的一个组成部分加以引进。随着移动网络的快速发展,需要有效的网络规划工具来满足用户的需求。然而,决定基站的最佳位置以实现最佳服务,同时降低成本是一项复杂的任务,需要大量的计算资源。本文通过改进原有的围绕媒质的PAM算法进行划分,解决了天线放置问题或小区规划问题,涉及到移动网络基础设施的定位和配置。作者在最近的工作(L.F ibrahim and M.H. Al Harbi, 2008)中对PAM原始算法进行了改进,提出了一种新的算法M- PAM (modified-partitioning around mediids)。提出了CWN-PAM算法,并与M-PAM算法进行了比较。最后给出了该算法在实际应用中的具体实现。结果表明,该修正算法在解决移动网络规划这一重要问题上具有有效性和灵活性。
{"title":"Employing Clustering Techniques in Mobile Network Planning","authors":"L. F. Ibrahim, M. A. Harbi","doi":"10.1109/NTMS.2008.ECP.42","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.42","url":null,"abstract":"Network planning is of key importance during the construction of new communities and cities, in which telephone and data services have to be introduced as a component of the overall master plan of the city. With the rapid development in mobile network we need effective network planning tool to satisfy the need of customers. However, deciding upon the optimum placement for the base stations (BS's) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper addresses antenna placement problem or the cell planning problem, involves locating and configuring infrastructure for mobile networks by modified the original partitioning around medoids PAM algorithm. The PAM original algorithm has been modified and a new algorithm M- PAM (modified-partitioning around medoids) has been proposed by the authors in a recent work (L.F Ibrahin and M.H. Al Harbi, 2008). This paper presents CWN-PAM (clustering with weighted node-partitioning around medoids) algorithm and compare it with M-PAM algorithm. Implementation of this algorithm to a real case study is presented. Results demonstrate the effectiveness and flexibility of the modifying algorithm in tackling the important problem of mobile network planning.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Threat Modeling in Pervasive Computing Paradigm 普适计算范式中的威胁建模
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.97
N. Malik, M. Javed, U. Mahmud
This paper presents the threat modeling approach for pervasive environment's security. In pervasive computing, a user might be part of various security domains at any particular instant of time having various authentication mechanisms and different privileges in different security domains. A number of threat modeling approaches and methods have been defined in literature and are in use. However, because of the nature of the pervasive computing and ubiquitous networks, these approaches do not handle the inherent security problems and perspective of pervasive computing. The paper examines in detail the threat modeling and analysis approaches being developed at Microsoft and other methods used for threat modeling. The paper present a novel approach for addressing the threat modeling in pervasive computing and presents the model for threat modeling and risk analysis in pervasive environment.
提出了面向普适环境安全的威胁建模方法。在普适计算中,用户可能在任何特定时刻属于不同的安全域,在不同的安全域中具有不同的身份验证机制和不同的特权。许多威胁建模方法和方法已经在文献中定义并正在使用。然而,由于普适计算和无处不在网络的性质,这些方法不能处理普适计算固有的安全问题和观点。本文详细介绍了微软正在开发的威胁建模和分析方法以及用于威胁建模的其他方法。本文提出了一种解决普适计算中威胁建模的新方法,并给出了普适环境下的威胁建模和风险分析模型。
{"title":"Threat Modeling in Pervasive Computing Paradigm","authors":"N. Malik, M. Javed, U. Mahmud","doi":"10.1109/NTMS.2008.ECP.97","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.97","url":null,"abstract":"This paper presents the threat modeling approach for pervasive environment's security. In pervasive computing, a user might be part of various security domains at any particular instant of time having various authentication mechanisms and different privileges in different security domains. A number of threat modeling approaches and methods have been defined in literature and are in use. However, because of the nature of the pervasive computing and ubiquitous networks, these approaches do not handle the inherent security problems and perspective of pervasive computing. The paper examines in detail the threat modeling and analysis approaches being developed at Microsoft and other methods used for threat modeling. The paper present a novel approach for addressing the threat modeling in pervasive computing and presents the model for threat modeling and risk analysis in pervasive environment.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129596257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multipath Routing Scheme in Solar Powered Wireless Sensor Networks 太阳能无线传感器网络中的多路径路由方案
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.67
Thirumal Kandasamy, Jaya Kumar Krishnan
Constant growth in the wireless sensor network (WSN) needs routing protocol which can cater for renewable energy sources as compared to conventionally used nonrenewable energy sources in sensor nodes. In this paper, adaptive topological knowledge (ATK) algorithm is used to periodically and locally determine the topological knowledge range (KR) of each solar-powered node, based on an estimated energy budget for the following period. Energy budget includes current energy, the predicted energy consumption and the energy expected from the solar cell. Multipath routing scheme (MRS) is used for route selection based on round-robin model. Thus energy optimization is attained during real-time route discovery and packet forwarding by reducing congestion in the network.
随着无线传感器网络(WSN)的不断发展,与传统的传感器节点中使用的不可再生能源相比,需要能够满足可再生能源需求的路由协议。本文采用自适应拓扑知识(ATK)算法,根据下一阶段的能量预算,周期性地局部确定每个太阳能供电节点的拓扑知识范围(KR)。能源预算包括当前的能源,预计的能源消耗和预计从太阳能电池的能源。基于轮循模型的路由选择采用多路径路由方案(MRS)。通过减少网络拥塞,实现了实时路由发现和报文转发过程中的能量优化。
{"title":"Multipath Routing Scheme in Solar Powered Wireless Sensor Networks","authors":"Thirumal Kandasamy, Jaya Kumar Krishnan","doi":"10.1109/NTMS.2008.ECP.67","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.67","url":null,"abstract":"Constant growth in the wireless sensor network (WSN) needs routing protocol which can cater for renewable energy sources as compared to conventionally used nonrenewable energy sources in sensor nodes. In this paper, adaptive topological knowledge (ATK) algorithm is used to periodically and locally determine the topological knowledge range (KR) of each solar-powered node, based on an estimated energy budget for the following period. Energy budget includes current energy, the predicted energy consumption and the energy expected from the solar cell. Multipath routing scheme (MRS) is used for route selection based on round-robin model. Thus energy optimization is attained during real-time route discovery and packet forwarding by reducing congestion in the network.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Controlling Physical Objects with Privacy using Secure RFID System 使用安全RFID系统控制具有隐私的物理对象
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.33
Fahad Samad, Sadeq Ali Makram
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way with sufficient privacy. This paper presents a secure system model which enables a user to control his possessions even sitting remotely from the objects' locations. The limitations of RFID tags are taken into account and it is shown that the system mitigates many threats keeping the privacy of the tags and the user intact.
技术环境中的安全和隐私威胁是利用最新技术为我们带来利益的巨大障碍。这种威胁也存在于RFID系统中,而RFID系统目前已广泛应用于无处不在的通信中。这些系统还可以与蜂窝网络结合使用,以一种安全的方式控制用户的物理对象,并具有足够的隐私。本文提出了一种安全的系统模型,使用户可以远程控制自己的物品。考虑到RFID标签的局限性,表明该系统减轻了许多威胁,保持标签和用户的隐私完整。
{"title":"Controlling Physical Objects with Privacy using Secure RFID System","authors":"Fahad Samad, Sadeq Ali Makram","doi":"10.1109/NTMS.2008.ECP.33","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.33","url":null,"abstract":"Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way with sufficient privacy. This paper presents a secure system model which enables a user to control his possessions even sitting remotely from the objects' locations. The limitations of RFID tags are taken into account and it is shown that the system mitigates many threats keeping the privacy of the tags and the user intact.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path Selection Method for Localized QoS Routing 本地化QoS路由的选路方法
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.75
A. Alzahrani, M. E. Woodward
Quality of service (QoS) routing has been proposed for supporting the requirements of network applications and satisfying connection constraints. A large amount of information needs to be exchanged periodically among routers. Therefore, in order to satisfy such requirements localized QoS routing algorithms have been proposed. This is where source nodes make routing decisions based on statistics collected locally. Using local information for routing avoids the overheads of exchanging global information with other nodes. In this paper we present a localized bandwidth-based QoS routing (BBR) algorithm, which relies on residual bandwidth that each path can support to make routing decisions. We compare our scheme with credit based routing (CBR) and the commonly used global WSP routing scheme under different traffic loads and network topologies. We demonstrated through simulation that our scheme performs better than CBR and outperforms the WSP scheme in some network topologies, even for a small update interval of link state.
为了满足网络应用需求和满足连接约束,提出了服务质量(QoS)路由。路由器之间需要定期交换大量的信息。因此,为了满足这种需求,提出了本地化QoS路由算法。在这种情况下,源节点根据本地收集的统计信息做出路由决策。使用本地信息进行路由避免了与其他节点交换全局信息的开销。本文提出了一种基于局部带宽的QoS路由(BBR)算法,该算法依赖于每条路径所能支持的剩余带宽来进行路由决策。在不同的流量负载和网络拓扑下,将该方案与基于信用的路由(CBR)和常用的全局WSP路由方案进行了比较。我们通过仿真证明了我们的方案在某些网络拓扑中优于CBR并优于WSP方案,即使对于较小的链路状态更新间隔也是如此。
{"title":"Path Selection Method for Localized QoS Routing","authors":"A. Alzahrani, M. E. Woodward","doi":"10.1109/NTMS.2008.ECP.75","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.75","url":null,"abstract":"Quality of service (QoS) routing has been proposed for supporting the requirements of network applications and satisfying connection constraints. A large amount of information needs to be exchanged periodically among routers. Therefore, in order to satisfy such requirements localized QoS routing algorithms have been proposed. This is where source nodes make routing decisions based on statistics collected locally. Using local information for routing avoids the overheads of exchanging global information with other nodes. In this paper we present a localized bandwidth-based QoS routing (BBR) algorithm, which relies on residual bandwidth that each path can support to make routing decisions. We compare our scheme with credit based routing (CBR) and the commonly used global WSP routing scheme under different traffic loads and network topologies. We demonstrated through simulation that our scheme performs better than CBR and outperforms the WSP scheme in some network topologies, even for a small update interval of link state.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems 点对点系统中流的离线建模与优化方法
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.71
K. Walkowiak
Peer-to-peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual Internet users that commonly employ P2P software to download electronic music, movies, software provide considerable income for Internet service providers (ISP). However, the use of P2P systems produces many problems related to traffic engineering, optimization, network congestion, etc. In this paper we propose a generic approach to offline modeling of flows in P2P systems. We focus exclusively on P2P file sharing systems. We show how various constraints following from real P2P systems can be formulated. The formulations can be applied for designing and optimization of P2P systems. To illustrate our approach we present results obtained from CPLEX solver.
点对点(P2P)系统近年来受到了广泛的关注。根据许多统计数据,P2P系统贡献了互联网流量的很大一部分。个人互联网用户通常使用P2P软件下载电子音乐、电影、软件,为互联网服务提供商(ISP)提供了可观的收入。然而,P2P系统的使用产生了许多与流量工程、优化、网络拥塞等相关的问题。本文提出了一种通用的P2P系统流离线建模方法。我们专注于P2P文件共享系统。我们展示了如何从实际的P2P系统可以制定各种约束。该公式可用于P2P系统的设计和优化。为了说明我们的方法,我们给出了从CPLEX求解器得到的结果。
{"title":"Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer Systems","authors":"K. Walkowiak","doi":"10.1109/NTMS.2008.ECP.71","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.71","url":null,"abstract":"Peer-to-peer (P2P) systems gain much attention in recent years. According to many statistics, P2P systems contribute a significant portion of the Internet traffic. Individual Internet users that commonly employ P2P software to download electronic music, movies, software provide considerable income for Internet service providers (ISP). However, the use of P2P systems produces many problems related to traffic engineering, optimization, network congestion, etc. In this paper we propose a generic approach to offline modeling of flows in P2P systems. We focus exclusively on P2P file sharing systems. We show how various constraints following from real P2P systems can be formulated. The formulations can be applied for designing and optimization of P2P systems. To illustrate our approach we present results obtained from CPLEX solver.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An RF Channel Emulator-Based Testbed for Cooperative Transmission Using Wireless Sensor Devices 基于射频信道仿真器的无线传感器协同传输试验台
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.22
Jin-Woo Jung, M. A. Ingram
In this paper, the issues and methods regarding setting up the testbed for measuring the performance of cooperative transmission is introduced. Also, some experiments on both the testbed and the performance of cooperative transmission is introduced and discussed. This testbed is novel in the sense that it uses actual sensor devices along with the channel emulator, which allows us to emulate the exact channels we want without looking for suitable channel environments. We consider the two- hop relay network for our target network model, and cooperative transmission scheme we have selected is decode-and-forward fixed relaying scheme introduced.
本文介绍了搭建协同传输性能测试平台的问题和方法。此外,还介绍和讨论了在试验台和协同传输性能上的一些实验。这个测试平台是新颖的,因为它使用了实际的传感器设备和通道模拟器,这使我们能够模拟我们想要的确切通道,而无需寻找合适的通道环境。我们的目标网络模型考虑了两跳中继网络,我们选择的合作传输方案是译码转发固定中继方案。
{"title":"An RF Channel Emulator-Based Testbed for Cooperative Transmission Using Wireless Sensor Devices","authors":"Jin-Woo Jung, M. A. Ingram","doi":"10.1109/NTMS.2008.ECP.22","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.22","url":null,"abstract":"In this paper, the issues and methods regarding setting up the testbed for measuring the performance of cooperative transmission is introduced. Also, some experiments on both the testbed and the performance of cooperative transmission is introduced and discussed. This testbed is novel in the sense that it uses actual sensor devices along with the channel emulator, which allows us to emulate the exact channels we want without looking for suitable channel environments. We consider the two- hop relay network for our target network model, and cooperative transmission scheme we have selected is decode-and-forward fixed relaying scheme introduced.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Self Organizing Maps for Synchronization in Wireless Sensor Networks 用于无线传感器网络同步的自组织映射
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.90
L. Paladina, A. Biundo, M. Scarpa, A. Puliafito
Providing a powerful synchronization system is one of the most important goals to be pursued if an efficient utilization of sensor networks has to be addressed. The basic concept behind a Wireless Sensor Network is to deploy a large number of sensor nodes able to acquire and process data. Most of WSNs applications require sensor nodes to maintain local clocks both to determine the events order and to provide temporal information to measured data; to achieve this goal applications generally require a low synchronization precision, close to Milli seconds. This paper proposes a novel synchronization system based on Kohonen's Self Organizing Maps (SOMs), able to provide some Artificial Intelligence features to sensor nodes. A SOM is a particular neural network that learns to classify data without any supervision. In each sensor node, a SOM is implemented to evaluate the sensor node time, using a very little amount of storage and computing resources. In a scenario where thousands of sensor nodes are placed, this system evaluates the time of each sensor in a distributed manner, assuming a very little percentage of nodes knowing the actual time, thus ensuring an effective clock synchronization among all the sensors.
如果要有效地利用传感器网络,提供一个强大的同步系统是要追求的最重要的目标之一。无线传感器网络背后的基本概念是部署大量能够获取和处理数据的传感器节点。大多数wsn应用要求传感器节点维持本地时钟,以确定事件顺序并为测量数据提供时间信息;要实现这一目标,应用程序通常需要较低的同步精度,接近毫秒。本文提出了一种新的基于Kohonen自组织映射(SOMs)的同步系统,该系统能够为传感器节点提供一些人工智能特征。SOM是一种特殊的神经网络,它在没有任何监督的情况下学习对数据进行分类。在每个传感器节点中,使用非常少的存储和计算资源,实现SOM来评估传感器节点时间。在放置数千个传感器节点的场景中,该系统以分布式方式评估每个传感器的时间,假设很少的节点知道实际时间,从而确保所有传感器之间有效的时钟同步。
{"title":"Self Organizing Maps for Synchronization in Wireless Sensor Networks","authors":"L. Paladina, A. Biundo, M. Scarpa, A. Puliafito","doi":"10.1109/NTMS.2008.ECP.90","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.90","url":null,"abstract":"Providing a powerful synchronization system is one of the most important goals to be pursued if an efficient utilization of sensor networks has to be addressed. The basic concept behind a Wireless Sensor Network is to deploy a large number of sensor nodes able to acquire and process data. Most of WSNs applications require sensor nodes to maintain local clocks both to determine the events order and to provide temporal information to measured data; to achieve this goal applications generally require a low synchronization precision, close to Milli seconds. This paper proposes a novel synchronization system based on Kohonen's Self Organizing Maps (SOMs), able to provide some Artificial Intelligence features to sensor nodes. A SOM is a particular neural network that learns to classify data without any supervision. In each sensor node, a SOM is implemented to evaluate the sensor node time, using a very little amount of storage and computing resources. In a scenario where thousands of sensor nodes are placed, this system evaluates the time of each sensor in a distributed manner, assuming a very little percentage of nodes knowing the actual time, thus ensuring an effective clock synchronization among all the sensors.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126107167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 New Technologies, Mobility and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1