首页 > 最新文献

2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)最新文献

英文 中文
Hardware Covert Attacks and Countermeasures 硬件隐蔽攻击和对策
Jahnabi Phukan, K. F. Li, F. Gebali
Computing platforms deployed in many critical infrastructures, such as smart grid, financial systems, governmental organizations etc., are subjected to security attacks and potentially devastating consequences. Computing platforms often get attacked 'physically' by an intruder accessing stored information, studying the internal structure of the hardware or injecting a fault. Even if the attackers fail to gain sensitive information stored in hardware, they may be able to disrupt the hardware or deny service leading to other kinds of security failures in the system. Hardware attacks could be covert or overt, based on the awareness of the intended system. This work classifies existing hardware attacks. Focusing mainly on covert attacks, they are quantified using a proposed schema. Different countermeasure techniques are proposed to prevent such attacks.
部署在许多关键基础设施中的计算平台,如智能电网、金融系统、政府组织等,都受到安全攻击和潜在的破坏性后果。计算机平台经常受到入侵者的“物理”攻击,入侵者会访问存储的信息,研究硬件的内部结构或注入故障。即使攻击者无法获得存储在硬件中的敏感信息,他们也可能破坏硬件或拒绝服务,从而导致系统中的其他类型的安全故障。硬件攻击可以是隐蔽的,也可以是公开的,这取决于对目标系统的感知。这项工作对现有的硬件攻击进行分类。主要关注隐蔽的攻击,使用一个提议的模式对它们进行量化。为了防止这种攻击,提出了不同的对策技术。
{"title":"Hardware Covert Attacks and Countermeasures","authors":"Jahnabi Phukan, K. F. Li, F. Gebali","doi":"10.1109/AINA.2016.144","DOIUrl":"https://doi.org/10.1109/AINA.2016.144","url":null,"abstract":"Computing platforms deployed in many critical infrastructures, such as smart grid, financial systems, governmental organizations etc., are subjected to security attacks and potentially devastating consequences. Computing platforms often get attacked 'physically' by an intruder accessing stored information, studying the internal structure of the hardware or injecting a fault. Even if the attackers fail to gain sensitive information stored in hardware, they may be able to disrupt the hardware or deny service leading to other kinds of security failures in the system. Hardware attacks could be covert or overt, based on the awareness of the intended system. This work classifies existing hardware attacks. Focusing mainly on covert attacks, they are quantified using a proposed schema. Different countermeasure techniques are proposed to prevent such attacks.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols 生物识别认证协议中的“无收据性”和“抗强制性”分析
Yoshifumi Ueshige, K. Sakurai
Recently, biometric authentication protocols are developed. Security of these protocols originates in compromising no privacy information by wiretapping, malicious access and etc. in the authentication processes. With regard to this, the authors pointed out the risk of excessive collection of privacy information caused by remaining data related to biometric authentication data such as logs and intermediate processing data on the authentication servers. As a requirement against this risk, the authors introduced receipt-freeness of biometric authentication protocols. In this research, the authors develop the above research by investigating so-called coercion-resistance which means resistance against coercing user into executing biometric authentication. This paper describes definition of coercion-resistance against wiretapping coercer, relevance to receipt-freeness, and analysis of coercion-resistance in two IC card based protocols. The results show one of the protocols satisfies receipt-freeness and coercion-resistance, although another one does not satisfy.
近年来,生物识别认证协议得到了发展。这些协议的安全性源于在认证过程中不通过窃听、恶意访问等方式泄露隐私信息。对此,作者指出,认证服务器上的日志、中间处理数据等与生物识别认证数据相关的剩余数据存在过度收集隐私信息的风险。作为对这种风险的要求,作者引入了生物识别认证协议的无收据性。在这项研究中,作者通过调查所谓的强制阻力来开展上述研究,强制阻力指的是对强制用户执行生物识别认证的阻力。本文介绍了针对窃听干扰器的矫顽性的定义,与无收据的相关性,并分析了两种基于IC卡的协议的矫顽性。结果表明,其中一种方案满足无磁和抗矫顽性,而另一种方案不满足。
{"title":"Analysis of \"Receipt-Freeness\" and \"Coercion-Resistance\" in Biometric Authentication Protocols","authors":"Yoshifumi Ueshige, K. Sakurai","doi":"10.1109/AINA.2016.97","DOIUrl":"https://doi.org/10.1109/AINA.2016.97","url":null,"abstract":"Recently, biometric authentication protocols are developed. Security of these protocols originates in compromising no privacy information by wiretapping, malicious access and etc. in the authentication processes. With regard to this, the authors pointed out the risk of excessive collection of privacy information caused by remaining data related to biometric authentication data such as logs and intermediate processing data on the authentication servers. As a requirement against this risk, the authors introduced receipt-freeness of biometric authentication protocols. In this research, the authors develop the above research by investigating so-called coercion-resistance which means resistance against coercing user into executing biometric authentication. This paper describes definition of coercion-resistance against wiretapping coercer, relevance to receipt-freeness, and analysis of coercion-resistance in two IC card based protocols. The results show one of the protocols satisfies receipt-freeness and coercion-resistance, although another one does not satisfy.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Evaluation on Quality of VoIP over Aero MACS 基于航空MACS的VoIP质量实验评价
K. Morioka, J. Naganawa, J. Honda, N. Kanada, S. Futatsumori, A. Kohmura, Takeshi Tomita, N. Yonemoto, Y. Sumiya
Aeronautical Mobile Airport Communications System (AeroMACS) is being standardized in order to provide new broadband wireless communications on airport surface. AeroMACS will be used for voice-based Air Traffic Control (ATC) services in the future as it is recommended in standards and recommended practices (SARPs) of the International Civil Aviation Organization (ICAO). Therefore, we evaluated the quality of voice over IP (VoIP) over AeroMACS for ATC. We developed the AeroMACS prototype system in Sendai Airport, a middle-size local airport in Japan. We carried out field experiments by using the prototype system to evaluate the quality of VoIP. In this paper, we provide experimental results and useful information for designing the AeroMACS system for VoIP-based ATC and airline operational control (AOC) services.
航空移动机场通信系统(AeroMACS)正在标准化,以便在机场地面提供新的宽带无线通信。AeroMACS将在未来用于基于语音的空中交通管制(ATC)服务,因为它是国际民用航空组织(ICAO)标准和推荐做法(SARPs)中推荐的。因此,我们通过AeroMACS评估了ATC的IP语音(VoIP)质量。我们在仙台机场开发了AeroMACS原型系统,仙台机场是日本的一个中型机场。我们利用原型系统进行了现场实验,对VoIP的质量进行了评估。本文为基于voip的空中交通管制和航空运营管制(AOC)服务的AeroMACS系统的设计提供了实验结果和有用信息。
{"title":"Experimental Evaluation on Quality of VoIP over Aero MACS","authors":"K. Morioka, J. Naganawa, J. Honda, N. Kanada, S. Futatsumori, A. Kohmura, Takeshi Tomita, N. Yonemoto, Y. Sumiya","doi":"10.1109/AINA.2016.49","DOIUrl":"https://doi.org/10.1109/AINA.2016.49","url":null,"abstract":"Aeronautical Mobile Airport Communications System (AeroMACS) is being standardized in order to provide new broadband wireless communications on airport surface. AeroMACS will be used for voice-based Air Traffic Control (ATC) services in the future as it is recommended in standards and recommended practices (SARPs) of the International Civil Aviation Organization (ICAO). Therefore, we evaluated the quality of voice over IP (VoIP) over AeroMACS for ATC. We developed the AeroMACS prototype system in Sendai Airport, a middle-size local airport in Japan. We carried out field experiments by using the prototype system to evaluate the quality of VoIP. In this paper, we provide experimental results and useful information for designing the AeroMACS system for VoIP-based ATC and airline operational control (AOC) services.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Results of a Raspberry Pi Based WMN Testbed Considering CPU Frequency 考虑CPU频率的树莓派WMN试验台实验结果
Tetsuya Oda, L. Barolli
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using Raspbian OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor scenario. For evaluation we considered throughput, Packet Delivery Ratio (PDR), delay, jitter, hop count, idle and CPU temperature metrics. The experimental results show that the nodes in the testbed were communicating smoothly. The performance of tesbed was better for CPU frequency 700 [MHz].
无线网状网络(WMNs)因其在协同计算和通信等领域的潜在应用而受到无线网络研究人员的广泛关注。在本文中,我们提出了一个基于Raspbian操作系统的wmn测试平台的实现。本文分析了优化链路状态路由(OLSR)协议在室内场景下的性能。为了进行评估,我们考虑了吞吐量、包传递比(PDR)、延迟、抖动、跳数、空闲和CPU温度指标。实验结果表明,试验台各节点通信顺畅。当CPU频率为700 [MHz]时,测试床的性能较好。
{"title":"Experimental Results of a Raspberry Pi Based WMN Testbed Considering CPU Frequency","authors":"Tetsuya Oda, L. Barolli","doi":"10.1109/AINA.2016.146","DOIUrl":"https://doi.org/10.1109/AINA.2016.146","url":null,"abstract":"Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using Raspbian OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor scenario. For evaluation we considered throughput, Packet Delivery Ratio (PDR), delay, jitter, hop count, idle and CPU temperature metrics. The experimental results show that the nodes in the testbed were communicating smoothly. The performance of tesbed was better for CPU frequency 700 [MHz].","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Disaster Information Gathering System Based on Web Caching and OpenFlow in Unstable Networks 基于Web缓存和OpenFlow的不稳定网络灾害信息采集系统
Saki Tabata, Kohei Ueda, R. Fukui, K. Shimazu, H. Shigeno
Emergency Rescue Information Sharing System supports rescue operations in early stage by gathering information about victims in need of help at the time of disaster. In this system, in-vehicle relays are used to gather extensive information. In-vehicle relays transmit information sent by mobile terminals to a database server via gateway switches. There are several wireless connections between relays and gateway switches to make the transmission redundant. However, information loss occurs when all links are disconnected. In addition, mobile terminals cannot send information without available wireless connections. In this paper, we propose a disaster information gathering mechanism that adopts Web-based offline operation and OpenFlow-based routing control. Offline operation of the system is realized by information caching and synchronization. Wireless links between in-vehicle relays and gateway switches are controlled by OpenFlow. Our mechanism selects a link for transmission dynamically in response to the status and priority changes of the wireless links. In order to prevent information loss while relays isolated from networks, information from mobile terminals is temporarily stored in in-vehicle servers. Prototype demonstration shows that the proposed mechanism can achieve high information gathering rate at the database server.
紧急救援信息共享系统通过在灾难发生时收集需要帮助的受害者的信息,在早期阶段支持救援行动。在该系统中,车载继电器用于收集广泛的信息。车载中继将移动终端发送的信息通过网关交换机传输到数据库服务器。在中继器和网关交换机之间有几个无线连接,使传输冗余。但是,当所有链路断开时,信息将丢失。此外,没有可用的无线连接,移动终端无法发送信息。本文提出了一种基于web的离线操作和基于openflow的路由控制的灾难信息采集机制。系统的离线运行是通过信息缓存和同步实现的。车载继电器和网关交换机之间的无线链路由OpenFlow控制。该机制根据无线链路的状态和优先级变化动态选择传输链路。为了防止中继与网络隔离时信息丢失,移动终端的信息被临时存储在车载服务器中。原型验证表明,该机制能够在数据库服务器上实现较高的信息采集速率。
{"title":"Disaster Information Gathering System Based on Web Caching and OpenFlow in Unstable Networks","authors":"Saki Tabata, Kohei Ueda, R. Fukui, K. Shimazu, H. Shigeno","doi":"10.1109/AINA.2016.80","DOIUrl":"https://doi.org/10.1109/AINA.2016.80","url":null,"abstract":"Emergency Rescue Information Sharing System supports rescue operations in early stage by gathering information about victims in need of help at the time of disaster. In this system, in-vehicle relays are used to gather extensive information. In-vehicle relays transmit information sent by mobile terminals to a database server via gateway switches. There are several wireless connections between relays and gateway switches to make the transmission redundant. However, information loss occurs when all links are disconnected. In addition, mobile terminals cannot send information without available wireless connections. In this paper, we propose a disaster information gathering mechanism that adopts Web-based offline operation and OpenFlow-based routing control. Offline operation of the system is realized by information caching and synchronization. Wireless links between in-vehicle relays and gateway switches are controlled by OpenFlow. Our mechanism selects a link for transmission dynamically in response to the status and priority changes of the wireless links. In order to prevent information loss while relays isolated from networks, information from mobile terminals is temporarily stored in in-vehicle servers. Prototype demonstration shows that the proposed mechanism can achieve high information gathering rate at the database server.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114727242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characterizing Similarity Structure of Spatial Networks Based on Degree Mixing Patterns 基于程度混合模式的空间网络相似结构表征
Arief Maulana, Kazumi Saito, Tetsuo Ikeda, Hiroaki Yuze, Takayuki Watanabe, Seiya Okubo, Nobuaki Mutoh
We address a problem of classifying and characterizing spatial networks in terms of local connection patterns of node degrees, by especially focusing on the property that the maximum node degrees of these networks are restricted to relatively small numbers. To this end, we propose two methods to analyze a set of such networks by 1) enumerating and counting the combinations of node degrees with respect to connected pair or triple nodes, 2) calculating feature vectors of these networks, which express distributions of mixing patterns' Z scores, and 3) constructing a dendrogram of these networks based on a cosine similarity between these feature vectors. In our experiments using spatial networks constructed from urban streets of seventeen cities, we confirm that our method can produce intuitively interpretable results which reflect regional characteristics of these cities. Moreover, we show that these characteristics can be reasonably described in terms of a relatively small number of selected mixing patterns, as main building blocks of given spatial networks.
我们通过特别关注这些网络的最大节点度限制于相对较小的数字的性质,解决了根据节点度的局部连接模式对空间网络进行分类和表征的问题。为此,我们提出了两种方法来分析一组这样的网络:1)枚举和计数节点度相对于连接对或三重节点的组合,2)计算这些网络的特征向量,它表示混合模式的Z分数的分布,3)基于这些特征向量之间的余弦相似度构建这些网络的树图。在我们对17个城市的街道空间网络进行的实验中,我们证实了我们的方法可以产生直观的可解释的结果,反映了这些城市的区域特征。此外,我们表明,这些特征可以用相对少量的选择混合模式来合理地描述,作为给定空间网络的主要组成部分。
{"title":"Characterizing Similarity Structure of Spatial Networks Based on Degree Mixing Patterns","authors":"Arief Maulana, Kazumi Saito, Tetsuo Ikeda, Hiroaki Yuze, Takayuki Watanabe, Seiya Okubo, Nobuaki Mutoh","doi":"10.1109/AINA.2016.116","DOIUrl":"https://doi.org/10.1109/AINA.2016.116","url":null,"abstract":"We address a problem of classifying and characterizing spatial networks in terms of local connection patterns of node degrees, by especially focusing on the property that the maximum node degrees of these networks are restricted to relatively small numbers. To this end, we propose two methods to analyze a set of such networks by 1) enumerating and counting the combinations of node degrees with respect to connected pair or triple nodes, 2) calculating feature vectors of these networks, which express distributions of mixing patterns' Z scores, and 3) constructing a dendrogram of these networks based on a cosine similarity between these feature vectors. In our experiments using spatial networks constructed from urban streets of seventeen cities, we confirm that our method can produce intuitively interpretable results which reflect regional characteristics of these cities. Moreover, we show that these characteristics can be reasonably described in terms of a relatively small number of selected mixing patterns, as main building blocks of given spatial networks.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
eHSim: An Efficient Hybrid Similarity Search with MapReduce eHSim:基于MapReduce的高效混合相似度搜索
T. Phan, J. Küng, T. K. Dang
In this paper, we study the problems of scalability and performance for similarity search by proposing eHSim, an efficient hybrid similarity search with MapReduce. More specifically, we introduce clustering schemes that partition objects into different groups by their length. Additionally, we equip our proposed schemes with pruning strategies that quickly discard irrelevant objects before truly computing their similarity. Moreover, we design a hybrid MapReduce architecture that deals with challenges from big data. Furthermore, we implement our proposed methods with MapReduce and make them compatible with the hybrid MapReduce architecture. Last but not least, we evaluate the proposed methods with real datasets. Empirical experiments show that our approach is considerably more efficient than state-of-the-arts in terms of query processing, batch processing, and data storage.
本文提出了一种基于MapReduce的高效混合相似度搜索算法eHSim,研究了相似度搜索的可扩展性和性能问题。更具体地说,我们引入了根据长度将对象划分为不同组的聚类方案。此外,我们为我们提出的方案配备了修剪策略,在真正计算其相似度之前快速丢弃无关对象。此外,我们设计了一个混合MapReduce架构,以应对大数据的挑战。此外,我们在MapReduce中实现了我们提出的方法,并使它们与混合MapReduce架构兼容。最后,我们用实际数据集对所提出的方法进行了评估。经验实验表明,我们的方法在查询处理、批处理和数据存储方面比目前的技术水平要高效得多。
{"title":"eHSim: An Efficient Hybrid Similarity Search with MapReduce","authors":"T. Phan, J. Küng, T. K. Dang","doi":"10.1109/AINA.2016.37","DOIUrl":"https://doi.org/10.1109/AINA.2016.37","url":null,"abstract":"In this paper, we study the problems of scalability and performance for similarity search by proposing eHSim, an efficient hybrid similarity search with MapReduce. More specifically, we introduce clustering schemes that partition objects into different groups by their length. Additionally, we equip our proposed schemes with pruning strategies that quickly discard irrelevant objects before truly computing their similarity. Moreover, we design a hybrid MapReduce architecture that deals with challenges from big data. Furthermore, we implement our proposed methods with MapReduce and make them compatible with the hybrid MapReduce architecture. Last but not least, we evaluate the proposed methods with real datasets. Empirical experiments show that our approach is considerably more efficient than state-of-the-arts in terms of query processing, batch processing, and data storage.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132295959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN 具有度界的优先依恋模型及其在WSN键预分配中的应用
S. Ruj, Arindam Pal
Preferential attachment models have been widely studied in complex networks, because they can explain the formation of many networks like social networks, citation networks, power grids, and biological networks, to name a few. Motivated by the application of key predistribution in wireless sensor networks (WSN), we initiate the study of preferential attachment with degree bound. Our paper has two important contributions to two different areas. The first is a contribution in the study of complex networks. We propose preferential attachment model with degree bound for the first time. In the normal preferential attachment model, the degree distribution follows a power law, with many nodes of low degree and a few nodes of high degree. In our scheme, the nodes can have a maximum degree dmax, where dmax is an integer chosen according to the application. The second is in the security of wireless sensor networks. We propose a new key predistribution scheme based on the above model. The important features of this model are that the network is fully connected, it has fewer keys, has larger size of the giant component and lower average path length compared with traditional key predistribution schemes and comparable resilience to random node attacks. We argue that in many networks like key predistribution and Internet of Things, having nodes of very high degree will be a bottle-neck in communication. Thus, studying preferential attachment model with degree bound will open up new directions in the study of complex networks, and will have many applications in real world scenarios.
优先依恋模型在复杂网络中得到了广泛的研究,因为它可以解释许多网络的形成,如社会网络、引文网络、电网和生物网络等。基于密钥预分配技术在无线传感器网络中的应用,提出了一种基于度界的优先连接方法。我们的论文对两个不同的领域有两个重要贡献。首先是对复杂网络研究的贡献。本文首次提出了带程度界的优先依恋模型。在正常优先依恋模型中,度分布服从幂律,低度节点多,高度节点少。在我们的方案中,节点可以具有最大度dmax,其中dmax是根据应用程序选择的整数。二是无线传感器网络的安全性。在此基础上提出了一种新的密钥预分配方案。该模型的重要特点是网络是完全连接的,与传统的密钥预分发方案相比,它具有更少的密钥,更大的巨型组件大小和更短的平均路径长度,并且具有相当的抗随机节点攻击的弹性。我们认为,在密钥预分配和物联网等许多网络中,节点的高度将成为通信的瓶颈。因此,研究具有程度界的优先依恋模型将为复杂网络的研究开辟新的方向,并在现实场景中具有广泛的应用价值。
{"title":"Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN","authors":"S. Ruj, Arindam Pal","doi":"10.1109/AINA.2016.141","DOIUrl":"https://doi.org/10.1109/AINA.2016.141","url":null,"abstract":"Preferential attachment models have been widely studied in complex networks, because they can explain the formation of many networks like social networks, citation networks, power grids, and biological networks, to name a few. Motivated by the application of key predistribution in wireless sensor networks (WSN), we initiate the study of preferential attachment with degree bound. Our paper has two important contributions to two different areas. The first is a contribution in the study of complex networks. We propose preferential attachment model with degree bound for the first time. In the normal preferential attachment model, the degree distribution follows a power law, with many nodes of low degree and a few nodes of high degree. In our scheme, the nodes can have a maximum degree dmax, where dmax is an integer chosen according to the application. The second is in the security of wireless sensor networks. We propose a new key predistribution scheme based on the above model. The important features of this model are that the network is fully connected, it has fewer keys, has larger size of the giant component and lower average path length compared with traditional key predistribution schemes and comparable resilience to random node attacks. We argue that in many networks like key predistribution and Internet of Things, having nodes of very high degree will be a bottle-neck in communication. Thus, studying preferential attachment model with degree bound will open up new directions in the study of complex networks, and will have many applications in real world scenarios.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Soft Real-Time Hadoop Scheduler for Big Data Processing in Smart Cities 面向智慧城市大数据处理的软实时Hadoop调度程序
Ciprian Barbieru, Florin Pop
We live in a world where every electronic device generates data, and does so in a variety of ways that respect a multitude of patterns particular to every device and user. Some users user their phone to browse the Internet on their daily commute, some check it for updates every hour, and some may use it constantly throughout the day to accomplish different tasks. Even the same device can be used in variety of ways, let alone different devices. Besides the user generated data, there is also machine generated data, which can have a more foreseeable pattern, like nightly backups or scheduled tasks, but usually imply more CPU or I/O intensive tasks than the sporadic ones generated by human users. In a context where the analyzed data size is constantly increasing and we start to talk about Big Data in more and more daily tasks, we need a way to handle all these diverse tasks that serve a variety of purposes. Some of this data must be sometimes analyzed as fast as possible, or, in some cases the analysis can be done at the end of the day, as part of a batch process. In order to handle all this diversity we design a real-time and job scheduler in Hadoop for Big Data processing that addresses both the problem of small tasks that need to be executed in real time, and in the same time, adjust for long-running jobs where time of completion is not that strictly defined. The case study is applied as support for Smart City applications that are gathered / routed / stored via mobile devices and processed / diffused via a more standard Clouds.
在我们生活的世界里,每个电子设备都会生成数据,并且以各种方式生成数据,这些方式尊重每个设备和用户特有的多种模式。一些用户在日常通勤时用手机浏览互联网,一些人每小时查看一次更新,还有一些人可能一整天都在使用手机来完成不同的任务。即使是同一设备也可以有多种使用方式,更不用说不同的设备了。除了用户生成的数据之外,还有机器生成的数据,这些数据可能具有更可预见的模式,例如夜间备份或计划任务,但通常意味着比人类用户生成的零星任务更多的CPU或I/O密集型任务。在分析数据量不断增加的背景下,我们开始在越来越多的日常任务中讨论大数据,我们需要一种方法来处理所有这些服务于各种目的的不同任务。有时必须尽可能快地分析其中一些数据,或者在某些情况下,可以在一天结束时作为批处理过程的一部分进行分析。为了处理所有这些多样性,我们在Hadoop中设计了一个用于大数据处理的实时和作业调度器,它既解决了需要实时执行的小任务的问题,同时也调整了完成时间没有严格定义的长时间作业。该案例研究用于支持通过移动设备收集/路由/存储并通过更标准的云处理/扩散的智慧城市应用程序。
{"title":"Soft Real-Time Hadoop Scheduler for Big Data Processing in Smart Cities","authors":"Ciprian Barbieru, Florin Pop","doi":"10.1109/AINA.2016.122","DOIUrl":"https://doi.org/10.1109/AINA.2016.122","url":null,"abstract":"We live in a world where every electronic device generates data, and does so in a variety of ways that respect a multitude of patterns particular to every device and user. Some users user their phone to browse the Internet on their daily commute, some check it for updates every hour, and some may use it constantly throughout the day to accomplish different tasks. Even the same device can be used in variety of ways, let alone different devices. Besides the user generated data, there is also machine generated data, which can have a more foreseeable pattern, like nightly backups or scheduled tasks, but usually imply more CPU or I/O intensive tasks than the sporadic ones generated by human users. In a context where the analyzed data size is constantly increasing and we start to talk about Big Data in more and more daily tasks, we need a way to handle all these diverse tasks that serve a variety of purposes. Some of this data must be sometimes analyzed as fast as possible, or, in some cases the analysis can be done at the end of the day, as part of a batch process. In order to handle all this diversity we design a real-time and job scheduler in Hadoop for Big Data processing that addresses both the problem of small tasks that need to be executed in real time, and in the same time, adjust for long-running jobs where time of completion is not that strictly defined. The case study is applied as support for Smart City applications that are gathered / routed / stored via mobile devices and processed / diffused via a more standard Clouds.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"3 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
SDCCN: A Novel Software Defined Content-Centric Networking Approach SDCCN:一种新颖的软件定义内容中心网络方法
Sergio Charpinel, Celso A. S. Santos, A. Vieira, R. Villaça, M. Martinello
Content Centric Networking (CCN) represents an important change in the current operation of the Internet, prioritizing content over the communication between end nodes. Routers play an essential role in CCN, since they receive the requests for a given content and provide content caching for the most popular ones. They have their own forwarding strategies and caching policies for the most popular contents. Despite the number of works on this field, experimental evaluation of different forwarding algorithms and caching policies yet demands a huge effort in routers programming. In this paper we propose SDCCN, a SDN approach to CCN that provides programmable forwarding strategy and caching policies. SDCCN allows fast prototyping and experimentation in CCN. Proofs of concept were performed to demonstrate the programmability of the cache replacement algorithms and the Strategy Layer. Experimental results, obtained through implementation in the Mininet environment, are presented and evaluated.
内容中心网络(CCN)代表了当前互联网运行的一个重要变化,将内容优先于终端节点之间的通信。路由器在CCN中扮演着重要的角色,因为它们接收给定内容的请求,并为最受欢迎的内容提供内容缓存。对于最流行的内容,它们有自己的转发策略和缓存策略。尽管在这一领域有大量的工作,但对不同转发算法和缓存策略的实验评估仍然需要在路由器编程中付出巨大的努力。在本文中,我们提出了SDCCN,这是一种提供可编程转发策略和缓存策略的CCN的SDN方法。SDCCN允许在CCN中快速原型和实验。概念验证证明了缓存替换算法和策略层的可编程性。给出了在Mininet环境下实现的实验结果,并对其进行了评价。
{"title":"SDCCN: A Novel Software Defined Content-Centric Networking Approach","authors":"Sergio Charpinel, Celso A. S. Santos, A. Vieira, R. Villaça, M. Martinello","doi":"10.1109/AINA.2016.86","DOIUrl":"https://doi.org/10.1109/AINA.2016.86","url":null,"abstract":"Content Centric Networking (CCN) represents an important change in the current operation of the Internet, prioritizing content over the communication between end nodes. Routers play an essential role in CCN, since they receive the requests for a given content and provide content caching for the most popular ones. They have their own forwarding strategies and caching policies for the most popular contents. Despite the number of works on this field, experimental evaluation of different forwarding algorithms and caching policies yet demands a huge effort in routers programming. In this paper we propose SDCCN, a SDN approach to CCN that provides programmable forwarding strategy and caching policies. SDCCN allows fast prototyping and experimentation in CCN. Proofs of concept were performed to demonstrate the programmability of the cache replacement algorithms and the Strategy Layer. Experimental results, obtained through implementation in the Mininet environment, are presented and evaluated.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133132085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1