首页 > 最新文献

2008 New Technologies, Mobility and Security最新文献

英文 中文
A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph 基于攻击图的最小代价网络加固启发式方法
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.9
T. Islam, Lingyu Wang
Network hardening answers the following critical question in defending against multi-step intrusions: Which vulnerabilities must be removed in order to prevent any attacker from reaching the given goal conditions. Existing approaches usually derive a logic proposition to represent the negation of the goal conditions in terms of initially satisfied conditions. In the disjunctive normal form (DNF) of the logic proposition, each disjunction then provides a viable solution to network hardening. However, such solutions suffer from an exponential time complexity. In this work, we study heuristic methods for solving this important problem with a reasonable complexity. We evaluate our proposed solution through comprehensive experiments. The results show that our solution can achieve comparable costs of network hardening in much less time than the optimal solution.
网络强化在防御多步骤入侵时回答了以下关键问题:为了防止任何攻击者达到给定的目标条件,必须删除哪些漏洞。现有的方法通常推导出一个逻辑命题来表示初始满足条件对目标条件的否定。在逻辑命题的析取范式(DNF)中,每个析取为网络强化提供了一个可行的解决方案。然而,这种解决方案的时间复杂度是指数级的。在这项工作中,我们研究了以合理的复杂性解决这一重要问题的启发式方法。我们通过综合实验来评估我们提出的解决方案。结果表明,我们的解决方案可以在更短的时间内实现与最优解决方案相当的网络加固成本。
{"title":"A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph","authors":"T. Islam, Lingyu Wang","doi":"10.1109/NTMS.2008.ECP.9","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.9","url":null,"abstract":"Network hardening answers the following critical question in defending against multi-step intrusions: Which vulnerabilities must be removed in order to prevent any attacker from reaching the given goal conditions. Existing approaches usually derive a logic proposition to represent the negation of the goal conditions in terms of initially satisfied conditions. In the disjunctive normal form (DNF) of the logic proposition, each disjunction then provides a viable solution to network hardening. However, such solutions suffer from an exponential time complexity. In this work, we study heuristic methods for solving this important problem with a reasonable complexity. We evaluate our proposed solution through comprehensive experiments. The results show that our solution can achieve comparable costs of network hardening in much less time than the optimal solution.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116440590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Performance Tuning of Steganography Algorithm for Privacy Preserving Association Rule Mining in Heterogeneous Data Base 异构数据库中保护隐私关联规则挖掘隐写算法的性能调优
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.79
Mahmoud Hussein, A. El-Sisi, N. Ismail
Privacy and security issues in data mining become an important property in any data mining system. A considerable research has focused on developing new data mining algorithms that incorporate privacy constraints. In this paper, we focus on privately mining association rules in vertically partitioned data where the problem has been reduced to privately computing Boolean scalar products. We propose a modification of steganography-based multiparty protocols for this problem. The proposed modification fine tune the performance to be faster in case of very large database, with acceptable level of reduction in privacy.
数据挖掘中的隐私和安全问题成为任何数据挖掘系统的重要属性。大量的研究集中在开发包含隐私约束的新数据挖掘算法上。在本文中,我们关注的是在垂直分区数据中私下挖掘关联规则,其中的问题被简化为私下计算布尔标量积。针对这个问题,我们提出了一种基于隐写术的多方协议的修改。在数据库非常大的情况下,建议的修改微调了性能,使其更快,隐私降低的程度可以接受。
{"title":"Performance Tuning of Steganography Algorithm for Privacy Preserving Association Rule Mining in Heterogeneous Data Base","authors":"Mahmoud Hussein, A. El-Sisi, N. Ismail","doi":"10.1109/NTMS.2008.ECP.79","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.79","url":null,"abstract":"Privacy and security issues in data mining become an important property in any data mining system. A considerable research has focused on developing new data mining algorithms that incorporate privacy constraints. In this paper, we focus on privately mining association rules in vertically partitioned data where the problem has been reduced to privately computing Boolean scalar products. We propose a modification of steganography-based multiparty protocols for this problem. The proposed modification fine tune the performance to be faster in case of very large database, with acceptable level of reduction in privacy.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobility Simulation for the Evaluation of UMTS Power Control Algorithms UMTS功率控制算法评估的移动性仿真
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.63
C. Joumaa, A. Caminada, S. Lamrous
Mobility is a major feature in mobile networks. The aim of this study is to analyze its impact on the power control procedure in UMTS network through several power control mechanisms. Mobiles motion is simulated using the Mask Based Mobility Model, an emerging mobility model based on Markov chains. After presenting the power control procedure and algorithms in UMTS, a description of the simulation environment, scenarios and results will be given.
移动性是移动网络的一个主要特征。本研究的目的是通过几种功率控制机制来分析其对UMTS网络中功率控制过程的影响。利用基于马尔可夫链的新兴移动模型Mask Based Mobility Model来模拟移动设备的运动。在介绍了UMTS中的功率控制程序和算法之后,将给出仿真环境、场景和结果的描述。
{"title":"Mobility Simulation for the Evaluation of UMTS Power Control Algorithms","authors":"C. Joumaa, A. Caminada, S. Lamrous","doi":"10.1109/NTMS.2008.ECP.63","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.63","url":null,"abstract":"Mobility is a major feature in mobile networks. The aim of this study is to analyze its impact on the power control procedure in UMTS network through several power control mechanisms. Mobiles motion is simulated using the Mask Based Mobility Model, an emerging mobility model based on Markov chains. After presenting the power control procedure and algorithms in UMTS, a description of the simulation environment, scenarios and results will be given.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Approach for Wireless Sensor Network Management: LiveNCM 无线传感器网络管理的新方法:LiveNCM
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.10
Aurélien Jacquot, J. Chanet, K. Hou, Xunming Diao, Jianjin Li
The Wireless Sensor Networks (WSN), with their constant evolution, need more and more practical and effective WSN Management Tools (WMT) for large-scale deployment. Due to the resource constraints of wireless sensor node, it is impossible to implement the full classical SNMP standard in WSN applications. Therefore, it is important to develop new WMT providing a subset of functionalities of SNMP standard dedicated to WSN by taking into account the resource constraints of wireless sensor node. In this paper, we propose a new WMT named LiveNCM: LiveNode Non-invasive Context-aware, and modular Management. LiveNCM is based on a configurable modular architecture enables to fit to an application and to provide traditional administration functionalities similar to the SNMP ones. In addition, LiveNCM introduces the concept of noninvasive context-aware to diagnose the wireless sensor node state to reduce the network traffic then the energy consumption. This reduction is obtained by estimating some data with linear models like polygonal ones or interpreting data message exchanges. To validate the proposed concept, the LiveNode platform is used to implement and test energy consumption with LiveNCM protocol.
随着无线传感器网络(WSN)的不断发展,需要越来越多实用有效的WSN管理工具来实现大规模部署。由于无线传感器节点的资源限制,在无线传感器网络应用中不可能完全实现经典的SNMP标准。因此,考虑到无线传感器节点的资源约束,开发新的WMT是很重要的,它提供了专用于WSN的SNMP标准功能子集。在本文中,我们提出了一个新的WMT命名为LiveNCM: LiveNode非侵入性上下文感知和模块化管理。LiveNCM基于可配置的模块化体系结构,能够适应应用程序并提供与SNMP类似的传统管理功能。此外,LiveNCM引入了无创上下文感知的概念来诊断无线传感器节点状态,以减少网络流量,从而降低能耗。这种简化是通过使用线性模型(如多边形模型)估计一些数据或解释数据消息交换来实现的。为了验证提出的概念,使用LiveNode平台实现和测试LiveNCM协议的能耗。
{"title":"A New Approach for Wireless Sensor Network Management: LiveNCM","authors":"Aurélien Jacquot, J. Chanet, K. Hou, Xunming Diao, Jianjin Li","doi":"10.1109/NTMS.2008.ECP.10","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.10","url":null,"abstract":"The Wireless Sensor Networks (WSN), with their constant evolution, need more and more practical and effective WSN Management Tools (WMT) for large-scale deployment. Due to the resource constraints of wireless sensor node, it is impossible to implement the full classical SNMP standard in WSN applications. Therefore, it is important to develop new WMT providing a subset of functionalities of SNMP standard dedicated to WSN by taking into account the resource constraints of wireless sensor node. In this paper, we propose a new WMT named LiveNCM: LiveNode Non-invasive Context-aware, and modular Management. LiveNCM is based on a configurable modular architecture enables to fit to an application and to provide traditional administration functionalities similar to the SNMP ones. In addition, LiveNCM introduces the concept of noninvasive context-aware to diagnose the wireless sensor node state to reduce the network traffic then the energy consumption. This reduction is obtained by estimating some data with linear models like polygonal ones or interpreting data message exchanges. To validate the proposed concept, the LiveNode platform is used to implement and test energy consumption with LiveNCM protocol.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Time and Location Based Services with Access Control 基于访问控制的时间和位置服务
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.98
Clara Bertolissi, M. Fernández
We propose an access control model that extends RBAC (role-based access control) to take time and location into account, and use term rewriting systems to specify access control policies in this model. We discuss implementation techniques for rewrite-based policy specifications, and the integration of these policies in Web applications. The declarative nature of the model facilitates the analysis of policies and the evaluation of access requests: we present two case-studies.
我们提出了一个扩展RBAC(基于角色的访问控制)以考虑时间和位置的访问控制模型,并使用术语重写系统来指定该模型中的访问控制策略。我们将讨论基于重写的策略规范的实现技术,以及在Web应用程序中集成这些策略。该模型的声明性有助于分析策略和评估访问请求:我们提供了两个案例研究。
{"title":"Time and Location Based Services with Access Control","authors":"Clara Bertolissi, M. Fernández","doi":"10.1109/NTMS.2008.ECP.98","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.98","url":null,"abstract":"We propose an access control model that extends RBAC (role-based access control) to take time and location into account, and use term rewriting systems to specify access control policies in this model. We discuss implementation techniques for rewrite-based policy specifications, and the integration of these policies in Web applications. The declarative nature of the model facilitates the analysis of policies and the evaluation of access requests: we present two case-studies.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114362531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Intrusion Detection for Computational Grids 基于计算网格的入侵检测
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.54
Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, C. Westphall, A. Sekkaki
Current intrusion detection technology is limited in providing protection against the intrusions that may violate the security of computational grids. We present the problem of grid intrusion detection, describe the requirements of a system to detect them, propose a grid intrusion detection method, and show how it overcomes the limitations by integrating the detection of the typical host computer and network attacks with the detection of grid-specific attacks and user behavior anomalies. This integration is evaluated with a case study that makes use of simulations and a prototype implementation.
目前的入侵检测技术在提供对可能破坏计算网格安全的入侵的保护方面是有限的。我们提出了网格入侵检测的问题,描述了系统检测它们的要求,提出了一种网格入侵检测方法,并展示了它如何通过将典型主机和网络攻击的检测与特定网格的攻击和用户行为异常的检测相结合来克服局限性。通过使用模拟和原型实现的案例研究来评估这种集成。
{"title":"Intrusion Detection for Computational Grids","authors":"Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, C. Westphall, A. Sekkaki","doi":"10.1109/NTMS.2008.ECP.54","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.54","url":null,"abstract":"Current intrusion detection technology is limited in providing protection against the intrusions that may violate the security of computational grids. We present the problem of grid intrusion detection, describe the requirements of a system to detect them, propose a grid intrusion detection method, and show how it overcomes the limitations by integrating the detection of the typical host computer and network attacks with the detection of grid-specific attacks and user behavior anomalies. This integration is evaluated with a case study that makes use of simulations and a prototype implementation.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126562356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer Management 基于RAN缓冲管理的HSDPA终端用户多流流量端到端QoS改进
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.43
S. Yerima, K. Al-Begain
High speed downlink packet access (HSDPA) was introduced to UMTS radio access segment to provide higher capacity for new packet switched services. As a result, packet switched sessions with multiple diverse traffic flows such as concurrent voice and data, or video and data being transmitted to the same user are a likely commonplace cellular packet data scenario. In HSDPA, radio access network (RAN) buffer management schemes are essential to support the end-to-end QoS of such sessions. Hence in this paper we present the end-to-end performance study of a proposed RAN buffer management scheme for multi-flow sessions via dynamic system-level HSDPA simulations. The scheme is an enhancement of a time-space priority (TSP) queuing strategy applied to the node B MAC-hs buffer allocated to an end user with concurrent real-time (RT) and non-real-time (NRT) flows during a multi-flow session. The experimental multi- flow scenario is a packet voice call with concurrent TCP-based file download to the same user. Results show that with the proposed enhancements to the TSP-based RAN buffer management, end-to-end QoS performance gains accrue to the NRT flow without compromising RT flow QoS of the same end user session.
高速下行分组接入(HSDPA)被引入UMTS无线接入段,为新的分组交换业务提供更高的容量。因此,具有多个不同流量(如并发语音和数据,或将视频和数据传输给同一用户)的分组交换会话可能是常见的蜂窝分组数据场景。在HSDPA中,无线接入网(RAN)缓冲管理方案是支持这种会话的端到端QoS的关键。因此,在本文中,我们通过动态系统级HSDPA模拟,提出了一种针对多流会话的拟议RAN缓冲管理方案的端到端性能研究。该方案是对时间-空间优先级(TSP)排队策略的改进,应用于在多流会话中分配给具有并发实时(RT)和非实时(NRT)流的终端用户的节点B MAC-hs缓冲区。实验的多流场景是一个分组语音呼叫,并发的基于tcp的文件下载到同一用户。结果表明,通过对基于tsp的RAN缓冲区管理的改进,端到端QoS性能的提高可以在不影响相同终端用户会话的RT流QoS的情况下增加到NRT流。
{"title":"End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer Management","authors":"S. Yerima, K. Al-Begain","doi":"10.1109/NTMS.2008.ECP.43","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.43","url":null,"abstract":"High speed downlink packet access (HSDPA) was introduced to UMTS radio access segment to provide higher capacity for new packet switched services. As a result, packet switched sessions with multiple diverse traffic flows such as concurrent voice and data, or video and data being transmitted to the same user are a likely commonplace cellular packet data scenario. In HSDPA, radio access network (RAN) buffer management schemes are essential to support the end-to-end QoS of such sessions. Hence in this paper we present the end-to-end performance study of a proposed RAN buffer management scheme for multi-flow sessions via dynamic system-level HSDPA simulations. The scheme is an enhancement of a time-space priority (TSP) queuing strategy applied to the node B MAC-hs buffer allocated to an end user with concurrent real-time (RT) and non-real-time (NRT) flows during a multi-flow session. The experimental multi- flow scenario is a packet voice call with concurrent TCP-based file download to the same user. Results show that with the proposed enhancements to the TSP-based RAN buffer management, end-to-end QoS performance gains accrue to the NRT flow without compromising RT flow QoS of the same end user session.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Intrusion Detection Systems of Computer Communication Networks 计算机通信网络的分布式入侵检测系统
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.39
A. Grzech, M. Kazmierski
The aim of the contribution is to present an attempt to utilize some data about network topology and performance to increase capabilities of intrusion detection system. Some simple example presents an approach to design topology (location and the needed number of intrusion detection devices) which allows efficiently detecting intrusions and limiting the overall overhead caused by intrusion detection devices performance.
本文的目的是尝试利用网络拓扑和性能的一些数据来提高入侵检测系统的能力。通过一个简单的例子,给出了一种设计拓扑(入侵检测设备的位置和所需数量)的方法,该方法可以有效地检测入侵并限制入侵检测设备性能造成的总体开销。
{"title":"Distributed Intrusion Detection Systems of Computer Communication Networks","authors":"A. Grzech, M. Kazmierski","doi":"10.1109/NTMS.2008.ECP.39","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.39","url":null,"abstract":"The aim of the contribution is to present an attempt to utilize some data about network topology and performance to increase capabilities of intrusion detection system. Some simple example presents an approach to design topology (location and the needed number of intrusion detection devices) which allows efficiently detecting intrusions and limiting the overall overhead caused by intrusion detection devices performance.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134523677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SCAR: Sequential Coordinate Routing Algorithm for Autonomous Wireless Sensor Network 自主无线传感器网络的顺序坐标路由算法
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.84
Amir M. Jafari, A. Sklorz, W. Lang
Implementation of wireless sensors for process automation applications is a progressing step in wireless sensor network applications. Establishing autonomous network is considered as an achievement of such implementation. Autonomous wireless sensor/actuator networks require target- oriented routing algorithm. In the first section the perception of autonomous network is explained and expected features from routing algorithm are clarified. In the second section, development, functionality and properties of Sequential Coordinate Routing Algorithm (SCAR) are explained. Besides the target-oriented property as a main feature of the SCAR, based on the mathematical claim and its proof, it is shown how the minimum energy consumption is taken into consideration. By realizing the core of the routing algorithm, it is presented that the void problem does not exist and it is easy to compute. Therefore, it is not a complex algorithm.
实现过程自动化应用的无线传感器是无线传感器网络应用的一个进步步骤。建立自治网络被认为是实现这一目标的成果。自主无线传感器/执行器网络需要目标导向路由算法。在第一部分中,解释了自治网络的感知,并澄清了路由算法的期望特征。第二部分介绍了顺序坐标路由算法(SCAR)的发展、功能和特性。除了目标导向特性是SCAR的主要特征外,根据数学上的要求及其证明,说明了如何考虑最小能耗。通过对路由算法核心的实现,证明了该算法不存在空洞问题,且易于计算。因此,它不是一个复杂的算法。
{"title":"SCAR: Sequential Coordinate Routing Algorithm for Autonomous Wireless Sensor Network","authors":"Amir M. Jafari, A. Sklorz, W. Lang","doi":"10.1109/NTMS.2008.ECP.84","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.84","url":null,"abstract":"Implementation of wireless sensors for process automation applications is a progressing step in wireless sensor network applications. Establishing autonomous network is considered as an achievement of such implementation. Autonomous wireless sensor/actuator networks require target- oriented routing algorithm. In the first section the perception of autonomous network is explained and expected features from routing algorithm are clarified. In the second section, development, functionality and properties of Sequential Coordinate Routing Algorithm (SCAR) are explained. Besides the target-oriented property as a main feature of the SCAR, based on the mathematical claim and its proof, it is shown how the minimum energy consumption is taken into consideration. By realizing the core of the routing algorithm, it is presented that the void problem does not exist and it is easy to compute. Therefore, it is not a complex algorithm.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specification of Rating Function of Online Charging System in 3GPP IP Multimedia System (IMS) Environment 3GPP IP多媒体系统(IMS)环境下在线收费系统分级功能规范
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.91
H. Oumina, D. Ranc
Determine the right price for one application usage is a core function of Rating Module in real time charging. Telecom operators base their tariff plans and promotions for services on this function to implement. Hence, rating plays a very important role to implement flexibility in operators billing and charging platform and to maintain their investments without penalizing customer according to service delivery. In the context of all-IP paradigm with the IP Multimedia System introduction, and the consequent revolution in terms of applications more perceived as multimedia sessions evolving many types of media and many stakeholders at the same time, the concept of rating evolved as well to tackle the challenge of multimedia complex applications and quality of service in packet switched networks. Consequently, the function of rating these applications depends on many service, network and commercial parameters which make an accurate real time charging a complex task. In order to handle this complexity, the present contribution suggests an enhancement of rating parameters in the online charging system of IMS. Also, it defines a modeling of rating function of the online charging system. This modeling aims to define the main blocks of this function and the interaction with network, business information and user information.
为一个应用程序的使用确定合适的价格是Rating Module实时收费的核心功能。电信运营商的资费计划和促销活动都是基于这一功能来实施的。因此,费率在实现运营商计费和收费平台的灵活性以及在不因服务交付而惩罚客户的情况下维护其投资方面发挥着非常重要的作用。随着IP多媒体系统的引入,在全IP范式的背景下,随之而来的应用革命更多地被认为是多媒体会话,同时发展了许多类型的媒体和许多利益相关者,评级的概念也得到了发展,以应对多媒体复杂应用和分组交换网络中服务质量的挑战。因此,对这些应用程序进行评级的功能取决于许多服务、网络和商业参数,这使得准确的实时收费成为一项复杂的任务。为了处理这种复杂性,本研究建议在IMS的在线收费系统中增加收费参数。并对在线收费系统的收费函数进行了建模。该建模旨在定义该功能的主要模块以及与网络、业务信息和用户信息的交互。
{"title":"Specification of Rating Function of Online Charging System in 3GPP IP Multimedia System (IMS) Environment","authors":"H. Oumina, D. Ranc","doi":"10.1109/NTMS.2008.ECP.91","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.91","url":null,"abstract":"Determine the right price for one application usage is a core function of Rating Module in real time charging. Telecom operators base their tariff plans and promotions for services on this function to implement. Hence, rating plays a very important role to implement flexibility in operators billing and charging platform and to maintain their investments without penalizing customer according to service delivery. In the context of all-IP paradigm with the IP Multimedia System introduction, and the consequent revolution in terms of applications more perceived as multimedia sessions evolving many types of media and many stakeholders at the same time, the concept of rating evolved as well to tackle the challenge of multimedia complex applications and quality of service in packet switched networks. Consequently, the function of rating these applications depends on many service, network and commercial parameters which make an accurate real time charging a complex task. In order to handle this complexity, the present contribution suggests an enhancement of rating parameters in the online charging system of IMS. Also, it defines a modeling of rating function of the online charging system. This modeling aims to define the main blocks of this function and the interaction with network, business information and user information.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131434399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 New Technologies, Mobility and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1