首页 > 最新文献

2012 IEEE 31st Symposium on Reliable Distributed Systems最新文献

英文 中文
Banking on Decoupling: Budget-Driven Sustainability for HPC Applications on EC2 Spot Instances 基于解耦的银行:EC2现货实例上HPC应用的预算驱动可持续性
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.11
Moussa Taifi
Cloud providers are auctioning their excess capacity using dynamically priced virtual instances. These spot instances provide significant savings compared to on-demand or fixed price instances. The users willing to use these resources are asked to provide a maximum bid price per hour, and the cloud provider runs the instances as long as the market price is below the user's bid price. By using such resources, the users are exposed explicitly to failures and need to adapt their applications to provide some level of fault tolerance. In this paper we expose the effect of bidding in the case of virtual HPC clusters composed of spot instances. We describe the interesting effect of uniform versus non-uniform bidding, in terms of failure rate and failure model. We propose an initial attempt to deal with the problem of predicting the runtime of a parallel application under various bidding strategies and various system parameters. We describe the relationship between bidding strategies and programming models. We build a preliminary optimization model that uses real price traces from Amazon Web Services as inputs, as well as instrumented values related to the processing and network capacities of clusters instances on the EC2 services. Our results show preliminary insights into the relationship between non-uniform bidding and application scaling strategies.
云提供商正在使用动态定价的虚拟实例拍卖他们的过剩容量。与按需或固定价格实例相比,这些现货实例提供了显著的节省。愿意使用这些资源的用户被要求提供每小时的最高出价,只要市场价格低于用户的出价,云提供商就会运行这些实例。通过使用这些资源,用户将显式地暴露于故障,并且需要调整其应用程序以提供某种程度的容错。本文揭示了竞价对由现货实例组成的虚拟高性能计算集群的影响。我们从失败率和失败模型的角度描述了统一和非统一招标的有趣效果。我们提出了一个初步的尝试来处理在各种投标策略和各种系统参数下预测并行应用程序运行时的问题。我们描述了投标策略和规划模型之间的关系。我们构建了一个初步的优化模型,该模型使用来自Amazon Web Services的真实价格轨迹作为输入,以及与EC2服务上集群实例的处理和网络容量相关的仪器值。我们的研究结果初步揭示了非统一竞价与应用程序扩展策略之间的关系。
{"title":"Banking on Decoupling: Budget-Driven Sustainability for HPC Applications on EC2 Spot Instances","authors":"Moussa Taifi","doi":"10.1109/SRDS.2012.11","DOIUrl":"https://doi.org/10.1109/SRDS.2012.11","url":null,"abstract":"Cloud providers are auctioning their excess capacity using dynamically priced virtual instances. These spot instances provide significant savings compared to on-demand or fixed price instances. The users willing to use these resources are asked to provide a maximum bid price per hour, and the cloud provider runs the instances as long as the market price is below the user's bid price. By using such resources, the users are exposed explicitly to failures and need to adapt their applications to provide some level of fault tolerance. In this paper we expose the effect of bidding in the case of virtual HPC clusters composed of spot instances. We describe the interesting effect of uniform versus non-uniform bidding, in terms of failure rate and failure model. We propose an initial attempt to deal with the problem of predicting the runtime of a parallel application under various bidding strategies and various system parameters. We describe the relationship between bidding strategies and programming models. We build a preliminary optimization model that uses real price traces from Amazon Web Services as inputs, as well as instrumented values related to the processing and network capacities of clusters instances on the EC2 services. Our results show preliminary insights into the relationship between non-uniform bidding and application scaling strategies.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128004474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions 资源受限设备的广播认证:一个主要缺陷和一些解决方案
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.13
R. D. Pietro, F. Martinelli, Nino Vincenzo Verde
Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification.
广播认证是无线传感器网络等资源受限设备的重要安全机制。在本文中,我们修改了广播身份验证在这种情况下是如何实施的,并且我们展示了大多数当前的实现(通常基于轻量级哈希链实现身份验证属性的时间限制有效性)留下了可怕攻击的可能性。我们详细介绍了这种攻击,并提出了三种不同的协议来应对它:PASS、TASS和PTASS。我们进一步分析了这些协议在设置、传输开销和设备验证方面引入的开销。
{"title":"Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions","authors":"R. D. Pietro, F. Martinelli, Nino Vincenzo Verde","doi":"10.1109/SRDS.2012.13","DOIUrl":"https://doi.org/10.1109/SRDS.2012.13","url":null,"abstract":"Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Generation of Graceful Programs 自动生成优美的程序
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.8
Yiyan Lin, S. Kulkarni
Traditionally, (nonmasking and masking) fault tolerance has focused on ensuring that after the occurrence of faults, the program recovers to states from where it continues to satisfy its original specification. However, a problem with this limited notion is that, in some cases, it may be impossible to recover to states from where the entire original specification is satisfied. For this reason, one can consider a fault-tolerant graceful-degradation program that ensures that upon the occurrence of faults, the program recovers to states from where a (given) subset of its specification is satisfied. Typically, the subset of specification satisfied thus would be the critical requirements. In this paper, we focus on automatically revising a given program to obtain a corresponding graceful program, i.e., a program that satisfies a weaker specification. Specifically, this step involves adding new behaviors that satisfy the given subset of specification. Moreover, it ensures that during this process, it does not remove any behavior from the original program. With this motivation, in this paper, we focus on automatic derivation of the graceful program, i.e., a program that contains all behaviors of the original program and some new behaviors that satisfy the weaker conditions. We note that this aspect differentiates this work from previous work on controller synthesis as well as automated addition of fault tolerance in that this work requires that no new behaviors are added in the absence of faults.
传统上,(非屏蔽和屏蔽)容错关注的是确保在发生错误后,程序恢复到继续满足其原始规范的状态。然而,这种有限概念的一个问题是,在某些情况下,可能不可能从满足整个原始规范的状态恢复到状态。出于这个原因,可以考虑容错的优雅降级程序,它确保在发生故障时,程序从满足其规范的(给定)子集的状态恢复。通常,这样满足的规范子集将是关键需求。在本文中,我们关注的是自动修正给定的程序以得到相应的优美程序,即满足弱规范的程序。具体来说,这一步涉及到添加满足给定规范子集的新行为。此外,它确保在此过程中,它不会从原始程序中删除任何行为。在此动机下,本文重点研究优美程序的自动派生,即包含原程序的所有行为和满足较弱条件的一些新行为的程序。我们注意到,这方面的工作与之前在控制器综合以及自动添加容错方面的工作不同,因为这项工作要求在没有故障的情况下不添加新的行为。
{"title":"Automatic Generation of Graceful Programs","authors":"Yiyan Lin, S. Kulkarni","doi":"10.1109/SRDS.2012.8","DOIUrl":"https://doi.org/10.1109/SRDS.2012.8","url":null,"abstract":"Traditionally, (nonmasking and masking) fault tolerance has focused on ensuring that after the occurrence of faults, the program recovers to states from where it continues to satisfy its original specification. However, a problem with this limited notion is that, in some cases, it may be impossible to recover to states from where the entire original specification is satisfied. For this reason, one can consider a fault-tolerant graceful-degradation program that ensures that upon the occurrence of faults, the program recovers to states from where a (given) subset of its specification is satisfied. Typically, the subset of specification satisfied thus would be the critical requirements. In this paper, we focus on automatically revising a given program to obtain a corresponding graceful program, i.e., a program that satisfies a weaker specification. Specifically, this step involves adding new behaviors that satisfy the given subset of specification. Moreover, it ensures that during this process, it does not remove any behavior from the original program. With this motivation, in this paper, we focus on automatic derivation of the graceful program, i.e., a program that contains all behaviors of the original program and some new behaviors that satisfy the weaker conditions. We note that this aspect differentiates this work from previous work on controller synthesis as well as automated addition of fault tolerance in that this work requires that no new behaviors are added in the absence of faults.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RD2: Resilient Dynamic Desynchronization for TDMA over Lossy Networks RD2:损耗网络上TDMA的弹性动态去同步
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.57
T. Hinterhofer, H. Schwefel, S. Tomic
We present a distributed TDMA negotiation approach for single-hop ad-hoc network communication. It is distributed, resilient to arbitrary transient packet loss and defines a non-overlapping TDMA schedule without the need of global time synchronization. A participating node can dynamically request a fraction of the static TDMA period T. It will receive its fraction if enough time resources are available. In any case, every node can request and will receive at least a fair fraction of size 1/N. Due to its resilience to arbitrary transient packet loss, the algorithm is well suited for lossy networks like found in wireless communications. Our approach is designed to work in highly dynamic scenarios efficiently. We will show, that it defines a dynamic non-overlapping TDMA schedule even at high packet loss rates. The performance of the TDMA negotiation is analyzed by simulation and compared to results of related work.
提出了一种用于单跳自组织网络通信的分布式TDMA协商方法。它是分布式的,对任意瞬态丢包具有弹性,并且定义了一个不需要全局时间同步的非重叠TDMA调度。参与节点可以动态地请求静态TDMA周期t的一部分,如果有足够的时间资源可用,它将收到它的一部分。在任何情况下,每个节点都可以请求并将至少接收大小为1/N的相当一部分。由于其对任意瞬态数据包丢失的弹性,该算法非常适合于无线通信中发现的有损网络。我们的方法旨在高效地在高度动态的场景中工作。我们将展示,即使在高丢包率下,它也定义了动态的非重叠TDMA调度。通过仿真分析了TDMA协商的性能,并与相关工作结果进行了比较。
{"title":"RD2: Resilient Dynamic Desynchronization for TDMA over Lossy Networks","authors":"T. Hinterhofer, H. Schwefel, S. Tomic","doi":"10.1109/SRDS.2012.57","DOIUrl":"https://doi.org/10.1109/SRDS.2012.57","url":null,"abstract":"We present a distributed TDMA negotiation approach for single-hop ad-hoc network communication. It is distributed, resilient to arbitrary transient packet loss and defines a non-overlapping TDMA schedule without the need of global time synchronization. A participating node can dynamically request a fraction of the static TDMA period T. It will receive its fraction if enough time resources are available. In any case, every node can request and will receive at least a fair fraction of size 1/N. Due to its resilience to arbitrary transient packet loss, the algorithm is well suited for lossy networks like found in wireless communications. Our approach is designed to work in highly dynamic scenarios efficiently. We will show, that it defines a dynamic non-overlapping TDMA schedule even at high packet loss rates. The performance of the TDMA negotiation is analyzed by simulation and compared to results of related work.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds 云的云中拜占庭容错MapReduce的可行性研究
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.46
M. Correia, Pedro Costa, Marcelo Pasin, A. Bessani, Fernando M. V. Ramos, P. Veríssimo
MapReduce is a framework for processing large data sets largely used in cloud computing. MapReduce implementations like Hadoop can tolerate crashes and file corruptions, but there is evidence that general arbitrary faults do occur and can affect the correctness of job executions. Furthermore, many individual cloud outages have been reported, raising concerns about depending on a single cloud. We present a MapReduce runtime that tolerates arbitrary faults and runs in a set of clouds at a reasonable cost in terms of computation and execution time. The main challenge is to avoid sending through the internet the huge amount of data that would normally be exchanged between map and reduce tasks.
MapReduce是一个处理大型数据集的框架,主要用于云计算。像Hadoop这样的MapReduce实现可以容忍崩溃和文件损坏,但有证据表明,一般的任意错误确实会发生,并可能影响作业执行的正确性。此外,已经报告了许多单独的云中断,这引起了人们对依赖单一云的担忧。我们提出了一个MapReduce运行时,它可以容忍任意错误,并在计算和执行时间方面以合理的成本运行在一组云中。主要的挑战是避免通过互联网发送通常会在map和reduce任务之间交换的大量数据。
{"title":"On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds","authors":"M. Correia, Pedro Costa, Marcelo Pasin, A. Bessani, Fernando M. V. Ramos, P. Veríssimo","doi":"10.1109/SRDS.2012.46","DOIUrl":"https://doi.org/10.1109/SRDS.2012.46","url":null,"abstract":"MapReduce is a framework for processing large data sets largely used in cloud computing. MapReduce implementations like Hadoop can tolerate crashes and file corruptions, but there is evidence that general arbitrary faults do occur and can affect the correctness of job executions. Furthermore, many individual cloud outages have been reported, raising concerns about depending on a single cloud. We present a MapReduce runtime that tolerates arbitrary faults and runs in a set of clouds at a reasonable cost in terms of computation and execution time. The main challenge is to avoid sending through the internet the huge amount of data that would normally be exchanged between map and reduce tasks.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124006619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Detecting Anomalous User Behaviors in Workflow-Driven Web Applications 在工作流驱动的Web应用程序中检测异常用户行为
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.19
Xiaowei Li, Yuan Xue, B. Malin
Web applications are increasingly used as portals to interact with back-end database systems and support business processes. This type of data-centric workflow-driven web application is vulnerable to two types of security threats. The first is an request integrity attack, which stems from the vulnerabilities in the implementation of business logic within web applications. The second is guideline violation, which stems from privilege misuse in scenarios where business logic and policies are too complex to be accurately defined and enforced. Both threats can lead to sequences of web requests that deviate from typical user behaviors. The objective of this paper is to detect anomalous user behaviors based on the sequence of their requests within a web session. We first decompose web sessions into workflows based on their data objects. In doing so, the detection of anomalous sessions is reduced to detection of anomalous workflows. Next, we apply a hidden Markov model (HMM) to characterize workflows on a per-object basis. In this model, the implicit business logic involved in this object defines the unobserved states of the Markov process, where the web requests are observations. To derive more robust HMMs, we extend the object-specific approach to an object-cluster approach, where objects with similar workflows are clustered and HMM models are derived on a per-cluster basis. We evaluate our models using two real systems, including an open source web application and a large web-based electronic medical record system. The results show that our approach can detect anomalous web sessions and lend evidence to suggest that the clustering approach can achieve relatively low false positive rates while maintaining its detection accuracy.
Web应用程序越来越多地被用作与后端数据库系统交互和支持业务流程的门户。这种以数据为中心的工作流驱动的web应用程序容易受到两种类型的安全威胁。第一种是请求完整性攻击,它源于web应用程序中业务逻辑实现中的漏洞。第二种是准则违反,它源于在业务逻辑和策略过于复杂而无法准确定义和执行的场景中滥用特权。这两种威胁都可能导致偏离典型用户行为的web请求序列。本文的目的是根据用户在web会话中的请求顺序来检测异常用户行为。我们首先根据web会话的数据对象将其分解为工作流。在这样做的过程中,异常会话的检测被简化为异常工作流的检测。接下来,我们应用隐马尔可夫模型(HMM)在每个对象的基础上描述工作流。在该模型中,该对象中涉及的隐式业务逻辑定义了马尔可夫过程的未观察状态,其中web请求是观察。为了获得更健壮的HMM,我们将特定于对象的方法扩展为对象集群方法,其中具有相似工作流的对象被聚类,HMM模型在每个集群的基础上派生。我们使用两个真实的系统来评估我们的模型,包括一个开源的web应用程序和一个大型的基于web的电子医疗记录系统。结果表明,该方法可以检测到异常的web会话,并证明聚类方法在保持检测精度的同时可以实现相对较低的误报率。
{"title":"Detecting Anomalous User Behaviors in Workflow-Driven Web Applications","authors":"Xiaowei Li, Yuan Xue, B. Malin","doi":"10.1109/SRDS.2012.19","DOIUrl":"https://doi.org/10.1109/SRDS.2012.19","url":null,"abstract":"Web applications are increasingly used as portals to interact with back-end database systems and support business processes. This type of data-centric workflow-driven web application is vulnerable to two types of security threats. The first is an request integrity attack, which stems from the vulnerabilities in the implementation of business logic within web applications. The second is guideline violation, which stems from privilege misuse in scenarios where business logic and policies are too complex to be accurately defined and enforced. Both threats can lead to sequences of web requests that deviate from typical user behaviors. The objective of this paper is to detect anomalous user behaviors based on the sequence of their requests within a web session. We first decompose web sessions into workflows based on their data objects. In doing so, the detection of anomalous sessions is reduced to detection of anomalous workflows. Next, we apply a hidden Markov model (HMM) to characterize workflows on a per-object basis. In this model, the implicit business logic involved in this object defines the unobserved states of the Markov process, where the web requests are observations. To derive more robust HMMs, we extend the object-specific approach to an object-cluster approach, where objects with similar workflows are clustered and HMM models are derived on a per-cluster basis. We evaluate our models using two real systems, including an open source web application and a large web-based electronic medical record system. The results show that our approach can detect anomalous web sessions and lend evidence to suggest that the clustering approach can achieve relatively low false positive rates while maintaining its detection accuracy.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
HybCAST: Rich Content Dissemination in Hybrid Cellular and 802.11 Ad Hoc Networks HybCAST:混合蜂窝和802.11 Ad Hoc网络中的丰富内容传播
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.36
N. Do, Cheng-Hsin Hsu, N. Venkatasubramanian
We design, implement, and evaluate a middleware system, HybCAST, that leverages a hybrid cellular and ad hoc network to disseminate rich contents from a source to all mobile devices in a predetermined region. HybCAST targets information dissemination over a range of scenarios (e.g., military operations, crisis alerting, and popular sporting events) in which high reliability and low latency are critical and existing fixed infrastructures such as wired networks, 802.11 access points are heavily loaded or partially destroyed. HybCAST implements a suite of protocols that: (i) structures the hybrid network into a hierarchy of two-level ad hoc clusters for better scalability, (ii) employ both data push and pull mechanisms for high reliability and low latency dissemination of rich content, and (iii) implement a near-optimal gateway selection algorithm to minimize the transmission redundancy. To demonstrate its practicality and efficiency, we have implemented and deployed the HybCAST middleware on several Android smart phones and an in-network Linux machine that acts as a dissemination server. The system is evaluated via real experiments using a UMTS network and extensive packet-level simulations. Our experimental results from a live network show that HybCAST achieves 100% reliability with shorter latencies and lower overall energy consumption. Simulation results confirm that HybCAST outperforms other state-of-the-art systems in the literature. For example, HybCAST exhibits a 5 times reduction in the dissemination latencies as compared to other hybrid dissemination protocols, while its energy consumption is a third of a cellular-only dissemination system. Furthermore, the simulation results demonstrate that HybCAST scales well and maintains good performance under varying numbers of mobile devices, diverse content sizes, and device mobility.
我们设计、实现并评估了一个中间件系统HybCAST,它利用混合蜂窝和自组织网络将丰富的内容从一个源传播到预定区域内的所有移动设备。HybCAST的目标是在一系列场景(例如,军事行动、危机警报和流行的体育赛事)中进行信息传播,在这些场景中,高可靠性和低延迟至关重要,现有的固定基础设施(如有线网络、802.11接入点)负载沉重或部分被破坏。HybCAST实现了一套协议:(i)将混合网络结构成两级自组织集群的层次结构,以获得更好的可扩展性;(ii)采用数据推送和拉取机制,以实现高可靠性和低延迟的丰富内容传播;(iii)实现近乎最佳的网关选择算法,以最大限度地减少传输冗余。为了证明它的实用性和效率,我们在几台Android智能手机和一台作为传播服务器的网络内Linux机器上实现和部署了HybCAST中间件。该系统通过UMTS网络的实际实验和广泛的分组级模拟进行了评估。我们在一个实时网络上的实验结果表明,HybCAST实现了100%的可靠性,具有更短的延迟和更低的总体能耗。仿真结果证实,HybCAST优于文献中其他最先进的系统。例如,与其他混合传播协议相比,HybCAST的传播延迟减少了5倍,而其能耗仅为纯蜂窝传播系统的三分之一。此外,仿真结果表明,HybCAST在不同数量的移动设备、不同的内容大小和设备移动性下都能很好地扩展并保持良好的性能。
{"title":"HybCAST: Rich Content Dissemination in Hybrid Cellular and 802.11 Ad Hoc Networks","authors":"N. Do, Cheng-Hsin Hsu, N. Venkatasubramanian","doi":"10.1109/SRDS.2012.36","DOIUrl":"https://doi.org/10.1109/SRDS.2012.36","url":null,"abstract":"We design, implement, and evaluate a middleware system, HybCAST, that leverages a hybrid cellular and ad hoc network to disseminate rich contents from a source to all mobile devices in a predetermined region. HybCAST targets information dissemination over a range of scenarios (e.g., military operations, crisis alerting, and popular sporting events) in which high reliability and low latency are critical and existing fixed infrastructures such as wired networks, 802.11 access points are heavily loaded or partially destroyed. HybCAST implements a suite of protocols that: (i) structures the hybrid network into a hierarchy of two-level ad hoc clusters for better scalability, (ii) employ both data push and pull mechanisms for high reliability and low latency dissemination of rich content, and (iii) implement a near-optimal gateway selection algorithm to minimize the transmission redundancy. To demonstrate its practicality and efficiency, we have implemented and deployed the HybCAST middleware on several Android smart phones and an in-network Linux machine that acts as a dissemination server. The system is evaluated via real experiments using a UMTS network and extensive packet-level simulations. Our experimental results from a live network show that HybCAST achieves 100% reliability with shorter latencies and lower overall energy consumption. Simulation results confirm that HybCAST outperforms other state-of-the-art systems in the literature. For example, HybCAST exhibits a 5 times reduction in the dissemination latencies as compared to other hybrid dissemination protocols, while its energy consumption is a third of a cellular-only dissemination system. Furthermore, the simulation results demonstrate that HybCAST scales well and maintains good performance under varying numbers of mobile devices, diverse content sizes, and device mobility.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed Monitoring of Temporal System Properties Using Petri Nets 基于Petri网的时间系统特性分布式监测
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.21
Olivier Baldellon, J. Fabre, Matthieu Roy
Supervising a system in operation allows to detect a violation of system specification or temporal properties, and is the first step required by any reconfiguration mechanism. In this work, we focus on run-time verification of temporal system properties in distributed and real-time systems. Based on a description of a property that includes events and temporal constraints, expressed as an arc timed Petri net, we automatically derive a monitoring system responsible for checking this property. The proposed approach enables the distributed verification of system properties. Our contribution is twofold. On the theoretical side, we introduce a slight modification of the semantics of Petri nets to be able to execute it in partial executions and noisy observation environments. On the practical side, we show how to use this formal framework to provide a distributed and efficient monitoring system, and describe its current implementation.
对运行中的系统进行监督可以检测出对系统规范或时间属性的违反,这是任何重新配置机制所需要的第一步。在这项工作中,我们重点关注分布式和实时系统中时态系统属性的运行时验证。基于对包含事件和时间约束的属性的描述,用弧时间Petri网表示,我们自动推导出负责检查该属性的监控系统。该方法实现了对系统属性的分布式验证。我们的贡献是双重的。在理论方面,我们引入了对Petri网语义的轻微修改,以便能够在部分执行和嘈杂的观察环境中执行它。在实践方面,我们展示了如何使用这个正式框架来提供一个分布式和高效的监控系统,并描述了它的当前实现。
{"title":"Distributed Monitoring of Temporal System Properties Using Petri Nets","authors":"Olivier Baldellon, J. Fabre, Matthieu Roy","doi":"10.1109/SRDS.2012.21","DOIUrl":"https://doi.org/10.1109/SRDS.2012.21","url":null,"abstract":"Supervising a system in operation allows to detect a violation of system specification or temporal properties, and is the first step required by any reconfiguration mechanism. In this work, we focus on run-time verification of temporal system properties in distributed and real-time systems. Based on a description of a property that includes events and temporal constraints, expressed as an arc timed Petri net, we automatically derive a monitoring system responsible for checking this property. The proposed approach enables the distributed verification of system properties. Our contribution is twofold. On the theoretical side, we introduce a slight modification of the semantics of Petri nets to be able to execute it in partial executions and noisy observation environments. On the practical side, we show how to use this formal framework to provide a distributed and efficient monitoring system, and describe its current implementation.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122604553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks Off the Wall:减轻分布式拒绝服务攻击的轻量级分布式过滤
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.45
Zhang Fu, M. Papatriantafilou
Distributed Denial of Service (DDoS) attacks are hard to deal with, due to the fact that it is difficult to distinguish legitimate traffic from malicious traffic, especially since the latter is from distributed sources. To accurately filter malicious traffic one needs (strong but costly) packet authentication primitives which increase the design complexity and typically affect throughput. It is a challenge to keep a balance between throughput and security/protection of the network core and end resources. In this paper, we propose SIEVE, a lightweight distributed filtering protocol/method. Depending on the attacker's ability, SIEVE can provide a standalone filter for moderate adversary models and a complementary filter which can enhance the performance of strong and more complex methods for stronger adversary models.
分布式拒绝服务(DDoS)攻击很难处理,因为很难区分合法流量和恶意流量,特别是恶意流量来自分布式来源。为了准确地过滤恶意流量,需要(强大但昂贵的)数据包认证原语,这增加了设计复杂性,通常会影响吞吐量。在网络核心和终端资源的吞吐量和安全性/保护之间保持平衡是一个挑战。在本文中,我们提出了一种轻量级的分布式过滤协议/方法SIEVE。根据攻击者的能力,SIEVE可以为中等对手模型提供一个独立的过滤器,也可以为更强的对手模型提供一个互补的过滤器,后者可以增强强大和更复杂方法的性能。
{"title":"Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks","authors":"Zhang Fu, M. Papatriantafilou","doi":"10.1109/SRDS.2012.45","DOIUrl":"https://doi.org/10.1109/SRDS.2012.45","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are hard to deal with, due to the fact that it is difficult to distinguish legitimate traffic from malicious traffic, especially since the latter is from distributed sources. To accurately filter malicious traffic one needs (strong but costly) packet authentication primitives which increase the design complexity and typically affect throughput. It is a challenge to keep a balance between throughput and security/protection of the network core and end resources. In this paper, we propose SIEVE, a lightweight distributed filtering protocol/method. Depending on the attacker's ability, SIEVE can provide a standalone filter for moderate adversary models and a complementary filter which can enhance the performance of strong and more complex methods for stronger adversary models.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128785296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks 三点加密(3PE):容延迟网络中的安全通信
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.74
Roy Cabaniss, Vimal Kumar, S. Madria
Mobile ad hoc networks (MANET) are a subset of Delay Tolerant Networks (DTNs) composed of several mobile devices. These dynamic environments makes conventional security algorithms unreliable, nodes that are far apart may not have access to the other's public key, making secure message exchange difficult. Other security methods rely on requesting the key from a trusted third party, which can be unavailable in DTN. The purpose of this paper is to introduce two message security algorithms capable of delivering messages securely against either eavesdropping or manipulation. The first algorithm, Chaining, uses multiple midpoints to re-encrypt the message for the destination node. The second, Fragmenting, separates the message key into pieces that are both routed and secured independently from each other. Both techniques have improved security in hostile environments. This improvement has a performance trade-off, however, reducing the delivery ratio and increasing the delivery time.
移动自组网(MANET)是由多个移动设备组成的容忍延迟网络(DTNs)的一个子集。这些动态环境使传统的安全算法变得不可靠,相距很远的节点可能无法访问对方的公钥,从而使安全消息交换变得困难。其他安全方法依赖于从可信的第三方请求密钥,这在DTN中可能不可用。本文的目的是介绍两种消息安全算法,能够安全地传递消息,防止窃听或操纵。第一种算法Chaining使用多个中点为目标节点重新加密消息。第二种方法是分段,它将消息密钥分离成相互独立地路由和保护的部分。这两种技术都提高了在敌对环境中的安全性。然而,这种改进需要在性能上进行权衡,降低了交付比率并增加了交付时间。
{"title":"Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks","authors":"Roy Cabaniss, Vimal Kumar, S. Madria","doi":"10.1109/SRDS.2012.74","DOIUrl":"https://doi.org/10.1109/SRDS.2012.74","url":null,"abstract":"Mobile ad hoc networks (MANET) are a subset of Delay Tolerant Networks (DTNs) composed of several mobile devices. These dynamic environments makes conventional security algorithms unreliable, nodes that are far apart may not have access to the other's public key, making secure message exchange difficult. Other security methods rely on requesting the key from a trusted third party, which can be unavailable in DTN. The purpose of this paper is to introduce two message security algorithms capable of delivering messages securely against either eavesdropping or manipulation. The first algorithm, Chaining, uses multiple midpoints to re-encrypt the message for the destination node. The second, Fragmenting, separates the message key into pieces that are both routed and secured independently from each other. Both techniques have improved security in hostile environments. This improvement has a performance trade-off, however, reducing the delivery ratio and increasing the delivery time.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 IEEE 31st Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1