首页 > 最新文献

2012 IEEE 31st Symposium on Reliable Distributed Systems最新文献

英文 中文
Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc Networks 移动Ad Hoc网络的匿名按需路由及流量转发安全检测
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.6
R. Jiang, Yuan Xing
Anonymous communications in mobile ad hoc networks is an important and effective way against malicious traffic analysis. Various anonymous routing schemes have been proposed for MANETs. However, most works failed to resist the global tracker, and always ignored the reliability of data delivery. In this paper, a comprehensive anonymous communication protocol, called ARSC, is proposed. The ARSC consists of anonymous routing, which is based on identity-based encryption pseudonym and single-round onion, and secure checking of traffic forwarding in data transmission phase, to achieve strong route anonymity and improve reliability of packet delivery in the data transmission phase. From the security analysis, our protocol ARSC is more secure than other schemes such as ANODR, SDAR, AnonDSR, CAR and MASK. Moreover, simulation experiments show that the ARSC has better performance than any other onion-structured anonymous routing protocols.
移动自组网中的匿名通信是抵御恶意流量分析的重要而有效的手段。针对manet,已经提出了各种匿名路由方案。然而,大多数作品未能抵抗全局跟踪器,往往忽略了数据传递的可靠性。本文提出了一种综合的匿名通信协议——ARSC。ARSC由基于身份加密假名和单轮洋葱的匿名路由和数据传输阶段流量转发的安全检查两部分组成,以实现强路由匿名性,提高数据传输阶段报文发送的可靠性。从安全性分析来看,我们的协议ARSC比其他方案如ANODR、SDAR、AnonDSR、CAR和MASK更安全。仿真实验表明,ARSC具有比其他洋葱结构匿名路由协议更好的性能。
{"title":"Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc Networks","authors":"R. Jiang, Yuan Xing","doi":"10.1109/SRDS.2012.6","DOIUrl":"https://doi.org/10.1109/SRDS.2012.6","url":null,"abstract":"Anonymous communications in mobile ad hoc networks is an important and effective way against malicious traffic analysis. Various anonymous routing schemes have been proposed for MANETs. However, most works failed to resist the global tracker, and always ignored the reliability of data delivery. In this paper, a comprehensive anonymous communication protocol, called ARSC, is proposed. The ARSC consists of anonymous routing, which is based on identity-based encryption pseudonym and single-round onion, and secure checking of traffic forwarding in data transmission phase, to achieve strong route anonymity and improve reliability of packet delivery in the data transmission phase. From the security analysis, our protocol ARSC is more secure than other schemes such as ANODR, SDAR, AnonDSR, CAR and MASK. Moreover, simulation experiments show that the ARSC has better performance than any other onion-structured anonymous routing protocols.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation 安全云浏览器:支持安全WEB导航的模型和架构
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.64
Marta Palanques, R. D. Pietro, Carlos del Ojo, M. Malet, M. Marino, Toni Felguera
A Web browser is probably the main attack vector used by hackers. Solutions to browser's security are difficult to foresee, due to the influence of user-behaviour. In this paper, we show how to tackle the issue of securing web browsers introducing a Secure Cloud Browser (SCB) architecture. The rationale behind the SCB is to reduce browser vulnerability by transporting it to a remote secure environment, making it ephemeral and renovating it in a manner that is transparent to the user. Our scheme allows the user to browse a web application while source code is remotely interpreted. Further, obfuscation techniques are used to increase the lifetime of a browser session. Details and discussion over the SCB architecture are reported, while its implementation and assessment is undergoing work.
Web浏览器可能是黑客使用的主要攻击媒介。由于用户行为的影响,浏览器安全性的解决方案很难预测。在本文中,我们展示了如何通过引入安全云浏览器(SCB)架构来解决web浏览器的安全问题。SCB背后的基本原理是通过将浏览器漏洞传输到远程安全环境,使其短暂并以对用户透明的方式进行更新来减少浏览器漏洞。我们的方案允许用户在源代码被远程解释的同时浏览web应用程序。此外,混淆技术用于增加浏览器会话的生命周期。报告了SCB架构的细节和讨论,而其实施和评估工作正在进行中。
{"title":"Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation","authors":"Marta Palanques, R. D. Pietro, Carlos del Ojo, M. Malet, M. Marino, Toni Felguera","doi":"10.1109/SRDS.2012.64","DOIUrl":"https://doi.org/10.1109/SRDS.2012.64","url":null,"abstract":"A Web browser is probably the main attack vector used by hackers. Solutions to browser's security are difficult to foresee, due to the influence of user-behaviour. In this paper, we show how to tackle the issue of securing web browsers introducing a Secure Cloud Browser (SCB) architecture. The rationale behind the SCB is to reduce browser vulnerability by transporting it to a remote secure environment, making it ephemeral and renovating it in a manner that is transparent to the user. Our scheme allows the user to browse a web application while source code is remotely interpreted. Further, obfuscation techniques are used to increase the lifetime of a browser session. Details and discussion over the SCB architecture are reported, while its implementation and assessment is undergoing work.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Reliable Communication in Intelligent Transportation Systems 迈向智能交通系统中的可靠通信
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.79
Prithviraj Patil
Cyber physical systems (CPS) are increasingly seen as a way to provide solutions for societal benefits. For these systems to become widely adopted, reliability of these systems is a key requirement because CPS appear in safety- and mission critical applications. To bring about the reliability challenges and the scientific principles behind developing solutions for CPS reliability, I am focusing on two CPS domains: intelligent transportation system and reconfigurable conveyor systems. Intelligent transportation system is a system where vehicles collaborate together to improve road safety, alleviate congestion thereby helping the environment, and providing a better travel experience. Reconfigurable conveyor systems represent a class of systems in advanced manufacturing that will make manufacturing agile while reducing the operating costs. This report presents an overview of recent work that highlights the challenges we face and their possible solutions in making communication in ITS reliable. It also discusses the reliability issues in reconfigurable conveyor systems. We then outline the future directions.
网络物理系统(CPS)越来越被视为提供社会效益解决方案的一种方式。为了使这些系统得到广泛采用,这些系统的可靠性是一个关键要求,因为CPS出现在安全和关键任务应用中。为了带来可靠性挑战和开发CPS可靠性解决方案背后的科学原理,我专注于两个CPS领域:智能运输系统和可重构输送系统。智能交通系统是一种车辆协同工作以改善道路安全、缓解拥堵从而改善环境并提供更好旅行体验的系统。可重构输送机系统代表了先进制造中的一类系统,它将使制造敏捷,同时降低运营成本。本报告概述了最近的工作,强调了我们在使ITS通信可靠方面面临的挑战及其可能的解决方案。本文还讨论了可重构输送系统的可靠性问题。然后我们概述了未来的发展方向。
{"title":"Towards Reliable Communication in Intelligent Transportation Systems","authors":"Prithviraj Patil","doi":"10.1109/SRDS.2012.79","DOIUrl":"https://doi.org/10.1109/SRDS.2012.79","url":null,"abstract":"Cyber physical systems (CPS) are increasingly seen as a way to provide solutions for societal benefits. For these systems to become widely adopted, reliability of these systems is a key requirement because CPS appear in safety- and mission critical applications. To bring about the reliability challenges and the scientific principles behind developing solutions for CPS reliability, I am focusing on two CPS domains: intelligent transportation system and reconfigurable conveyor systems. Intelligent transportation system is a system where vehicles collaborate together to improve road safety, alleviate congestion thereby helping the environment, and providing a better travel experience. Reconfigurable conveyor systems represent a class of systems in advanced manufacturing that will make manufacturing agile while reducing the operating costs. This report presents an overview of recent work that highlights the challenges we face and their possible solutions in making communication in ITS reliable. It also discusses the reliability issues in reconfigurable conveyor systems. We then outline the future directions.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Availability Modeling and Analysis for Data Backup and Restore Operations 数据备份和恢复操作的可用性建模与分析
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.9
Xiaoyan Yin, Javier Alonso, F. Machida, E. Andrade, Kishor S. Trivedi
Data backup operation is an essential part of common IT system administration to protect against data loss caused by any storage failures, human errors, or disasters. Lost data can be recovered from the backed up data if it exists. Since the backup and restore operations accrue downtime overhead or performance degradation, they have to be designed to ensure the data reliability while minimizing the performance and availability overhead. In this paper, we study the impacts of different backup policies on availability measures such as storage availability, system availability, and user-perceived availability. Backup and restore operations are designed using SysML Activity diagrams that are automatically translated into Stochastic Reward Net (SRN) to compute the availability measures. Our numerical results show the effectiveness of the combination of full backup and partial backup in terms of user-perceived data availability and data loss rate. Furthermore, the sensitivity ranking can help improve the availability measures.
数据备份操作是通用IT系统管理的重要组成部分,可以防止由于存储故障、人为错误或灾难导致的数据丢失。如果备份数据存在,则可以从备份数据中恢复丢失的数据。由于备份和恢复操作会增加停机开销或性能下降,因此必须对其进行设计,以确保数据可靠性,同时尽量减少性能和可用性开销。在本文中,我们研究了不同的备份策略对可用性度量的影响,如存储可用性、系统可用性和用户感知可用性。备份和恢复操作使用SysML活动图设计,这些活动图自动转换为随机奖励网(SRN)来计算可用性度量。我们的数值结果表明,在用户感知的数据可用性和数据丢失率方面,完全备份和部分备份组合的有效性。此外,灵敏度排序有助于改进可用性度量。
{"title":"Availability Modeling and Analysis for Data Backup and Restore Operations","authors":"Xiaoyan Yin, Javier Alonso, F. Machida, E. Andrade, Kishor S. Trivedi","doi":"10.1109/SRDS.2012.9","DOIUrl":"https://doi.org/10.1109/SRDS.2012.9","url":null,"abstract":"Data backup operation is an essential part of common IT system administration to protect against data loss caused by any storage failures, human errors, or disasters. Lost data can be recovered from the backed up data if it exists. Since the backup and restore operations accrue downtime overhead or performance degradation, they have to be designed to ensure the data reliability while minimizing the performance and availability overhead. In this paper, we study the impacts of different backup policies on availability measures such as storage availability, system availability, and user-perceived availability. Backup and restore operations are designed using SysML Activity diagrams that are automatically translated into Stochastic Reward Net (SRN) to compute the availability measures. Our numerical results show the effectiveness of the combination of full backup and partial backup in terms of user-perceived data availability and data loss rate. Furthermore, the sensitivity ranking can help improve the availability measures.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SPECULA: Speculative Replication of Software Transactional Memory SPECULA:软件事务性内存的推测复制
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.67
Sebastiano Peluso, João Fernandes, P. Romano, F. Quaglia, L. Rodrigues
This paper introduces SPECULA, a novel replication protocol for Software Transactional Memory (STM) systems that seeks maximum overlap between transaction execution and replica synchronization phases via speculative processing techniques. By removing the replica synchronization phase from the critical path of execution of transactions, SPECULA allows threads to speculatively pipeline the execution of both transactional and/or non-transactional code. The core of SPECULA is a multi-version concurrency control algorithm that supports speculative transaction processing while ensuring the strong consistency criteria that are desirable in non-sand-boxed environments like STMs. Via an experimental study, based on a fully-fledged prototype and on both synthetic and standard STM benchmarks, we demonstrate that SPECULA can achieve speedups of up to one order of magnitude with respect to state-of-the-art non-speculative replication techniques.
本文介绍了SPECULA,一种用于软件事务性内存(STM)系统的新型复制协议,它通过推测处理技术寻求事务执行和副本同步阶段之间的最大重叠。通过从事务执行的关键路径中删除副本同步阶段,SPECULA允许线程推测性地执行事务性和/或非事务性代码。SPECULA的核心是一个多版本并发控制算法,它支持推测性事务处理,同时确保在stm等非沙盒环境中所需的强一致性标准。通过一项基于成熟原型以及合成和标准STM基准的实验研究,我们证明,与最先进的非推测复制技术相比,SPECULA可以实现高达一个数量级的加速。
{"title":"SPECULA: Speculative Replication of Software Transactional Memory","authors":"Sebastiano Peluso, João Fernandes, P. Romano, F. Quaglia, L. Rodrigues","doi":"10.1109/SRDS.2012.67","DOIUrl":"https://doi.org/10.1109/SRDS.2012.67","url":null,"abstract":"This paper introduces SPECULA, a novel replication protocol for Software Transactional Memory (STM) systems that seeks maximum overlap between transaction execution and replica synchronization phases via speculative processing techniques. By removing the replica synchronization phase from the critical path of execution of transactions, SPECULA allows threads to speculatively pipeline the execution of both transactional and/or non-transactional code. The core of SPECULA is a multi-version concurrency control algorithm that supports speculative transaction processing while ensuring the strong consistency criteria that are desirable in non-sand-boxed environments like STMs. Via an experimental study, based on a fully-fledged prototype and on both synthetic and standard STM benchmarks, we demonstrate that SPECULA can achieve speedups of up to one order of magnitude with respect to state-of-the-art non-speculative replication techniques.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
GSFord: Towards a Reliable Geo-social Notification System GSFord:迈向可靠的地理社会通知系统
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.35
Kyungbaek Kim, Ye Zhao, N. Venkatasubramanian
The eventual goal of any notification system is to deliver appropriate messages to all relevant recipients with very high reliability in a timely manner. In particular, we focus on notification in extreme situations (e.g. disasters) where geographically correlated failures hinder the ability to reach recipients inside the corresponding failed region. In this paper, we present GSFord, a reliable geo-social notification system that is aware of (a) the geographies in which the message needs to be disseminated and (b) the social network characteristics of the intended recipient, in order to maximize/increase the coverage and reliability. GSFord builds robust geo-aware P2P overlays to provide efficient location-based message delivery and reliable storage of geo-social information of recipients. When an event occurs, GSFord is able to efficiently deliver the message to recipients who are either (a) located in the event area or (b) socially correlated to the event (e.g. relatives/friends of those who are impacted by an event). Furthermore, GSFord leverages the geo-social information to trigger a social diffusion process, which operates through out-of band channels such as phone calls and human contacts, in order to reach recipients which are isolated in the failed region. Through extensive evaluations, we show that GSFord is reliable, the social diffusion process enhanced by GSFord reaches up to 99.9% of desired recipients even under massive geographically correlated regional failures. We also show that GSFord is efficient even under skewed distribution of user populations.
任何通知系统的最终目标都是将适当的消息以非常高的可靠性及时地传递给所有相关的接收者。我们特别关注极端情况下的通知(例如灾难),在这种情况下,地理上相关的故障阻碍了到达相应故障区域内的收件人的能力。在本文中,我们介绍了GSFord,一个可靠的地理社会通知系统,它意识到(a)信息需要传播的地理位置和(b)预期接收者的社会网络特征,以最大化/增加覆盖范围和可靠性。GSFord构建了强大的地理感知P2P覆盖,以提供高效的基于位置的消息传递和可靠的接收者地理社会信息存储。当事件发生时,GSFord能够有效地将消息传递给(a)位于事件区域或(b)与事件有社会关联的接收者(例如,受事件影响者的亲戚/朋友)。此外,GSFord利用地理社会信息触发社会扩散过程,该过程通过电话和人际接触等带外渠道运作,以便接触到在失败地区被隔离的接收者。通过广泛的评估,我们表明GSFord是可靠的,即使在大量地理相关区域失效的情况下,GSFord增强的社会扩散过程也达到99.9%的期望接受者。我们还表明,即使在用户群体分布不均的情况下,GSFord也是有效的。
{"title":"GSFord: Towards a Reliable Geo-social Notification System","authors":"Kyungbaek Kim, Ye Zhao, N. Venkatasubramanian","doi":"10.1109/SRDS.2012.35","DOIUrl":"https://doi.org/10.1109/SRDS.2012.35","url":null,"abstract":"The eventual goal of any notification system is to deliver appropriate messages to all relevant recipients with very high reliability in a timely manner. In particular, we focus on notification in extreme situations (e.g. disasters) where geographically correlated failures hinder the ability to reach recipients inside the corresponding failed region. In this paper, we present GSFord, a reliable geo-social notification system that is aware of (a) the geographies in which the message needs to be disseminated and (b) the social network characteristics of the intended recipient, in order to maximize/increase the coverage and reliability. GSFord builds robust geo-aware P2P overlays to provide efficient location-based message delivery and reliable storage of geo-social information of recipients. When an event occurs, GSFord is able to efficiently deliver the message to recipients who are either (a) located in the event area or (b) socially correlated to the event (e.g. relatives/friends of those who are impacted by an event). Furthermore, GSFord leverages the geo-social information to trigger a social diffusion process, which operates through out-of band channels such as phone calls and human contacts, in order to reach recipients which are isolated in the failed region. Through extensive evaluations, we show that GSFord is reliable, the social diffusion process enhanced by GSFord reaches up to 99.9% of desired recipients even under massive geographically correlated regional failures. We also show that GSFord is efficient even under skewed distribution of user populations.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130754737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Theory of Packet Flows Based on Law-of-Mass-Action Scheduling 基于质量-动作调度定律的分组流理论
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.2
Thomas Meyer, C. Tschudin
Designing dynamically robust protocols is not a simple task with current classic work-conserving scheduling, where packets are sent out as soon as processing and transmission capacity is available. We show that deviating from this fundamental queuing assumption leads to much more controllable and analyzable forms of protocols. At the core of our work is a queue-scheduling discipline based on the chemical "Law of Mass Action" (LoMA) that serves a queue with a rate proportional to its fill level. In this paper we introduce our LoMA-scheduling approach and provide a solid mathematical framework adopted from chemistry that simplifies the analysis of the corresponding queueing networks, including the prediction of the underlying protocols' dynamics. We demonstrate the elegance of our model by implementing and analyzing a TCP-compatible "chemical" congestion control algorithm C3A with only a few interacting queues (another novelty of our approach). We also show the application of our theory to gossip protocols, explain an effective implementation of the scheduler and discuss possibilities of how to integrate mass-action scheduling into traditional networking environments.
设计动态健壮的协议并不是一项简单的任务,当前经典的节省工作的调度,在这种调度中,只要处理和传输能力可用,数据包就会发送出去。我们表明,偏离这个基本的排队假设会导致更可控和可分析的协议形式。我们工作的核心是基于化学“质量作用定律”(LoMA)的队列调度学科,该学科以与其填充水平成比例的速率为队列提供服务。在本文中,我们介绍了我们的loma调度方法,并提供了一个来自化学的坚实数学框架,简化了相应队列网络的分析,包括对底层协议动态的预测。我们通过实现和分析一个tcp兼容的“化学”拥塞控制算法C3A来展示我们模型的优雅之处,该算法只有几个交互队列(我们方法的另一个新颖之处)。我们还展示了我们的理论在八卦协议中的应用,解释了调度程序的有效实现,并讨论了如何将大规模动作调度集成到传统网络环境中的可能性。
{"title":"A Theory of Packet Flows Based on Law-of-Mass-Action Scheduling","authors":"Thomas Meyer, C. Tschudin","doi":"10.1109/SRDS.2012.2","DOIUrl":"https://doi.org/10.1109/SRDS.2012.2","url":null,"abstract":"Designing dynamically robust protocols is not a simple task with current classic work-conserving scheduling, where packets are sent out as soon as processing and transmission capacity is available. We show that deviating from this fundamental queuing assumption leads to much more controllable and analyzable forms of protocols. At the core of our work is a queue-scheduling discipline based on the chemical \"Law of Mass Action\" (LoMA) that serves a queue with a rate proportional to its fill level. In this paper we introduce our LoMA-scheduling approach and provide a solid mathematical framework adopted from chemistry that simplifies the analysis of the corresponding queueing networks, including the prediction of the underlying protocols' dynamics. We demonstrate the elegance of our model by implementing and analyzing a TCP-compatible \"chemical\" congestion control algorithm C3A with only a few interacting queues (another novelty of our approach). We also show the application of our theory to gossip protocols, explain an effective implementation of the scheduler and discuss possibilities of how to integrate mass-action scheduling into traditional networking environments.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"744 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions 正常条件下具有恒定时间复杂度的稳健投机拜占庭随机共识
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.62
Bruno Vavala, N. Neves
Randomized Byzantine Consensus can be an interesting building block in the implementation of asynchronous distributed systems. Despite its exponential worst-case complexity, which would make it less appealing in practice, a few experimental works have argued quite the opposite. To bridge the gap between theory and practice, we analyze a well-known state-of-the-art algorithm in normal system conditions, in which crash failures may occur but no malicious attacks, proving that it is fast on average. We then leverage our analysis to improve its best-case complexity from three to two phases, by reducing the communication operations through speculative executions. Our findings are confirmed through an experimental validation.
在异步分布式系统的实现中,随机拜占庭共识可能是一个有趣的构建块。尽管它的指数最坏情况复杂性会使它在实践中不那么吸引人,但一些实验作品却提出了相反的观点。为了弥合理论与实践之间的差距,我们在正常的系统条件下分析了一种众所周知的最先进的算法,在这种情况下,可能会发生崩溃故障,但没有恶意攻击,证明了它的平均速度。然后,我们利用我们的分析,通过减少通过推测执行的通信操作,将其最佳情况复杂度从三个阶段提高到两个阶段。我们的发现通过实验验证得到了证实。
{"title":"Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions","authors":"Bruno Vavala, N. Neves","doi":"10.1109/SRDS.2012.62","DOIUrl":"https://doi.org/10.1109/SRDS.2012.62","url":null,"abstract":"Randomized Byzantine Consensus can be an interesting building block in the implementation of asynchronous distributed systems. Despite its exponential worst-case complexity, which would make it less appealing in practice, a few experimental works have argued quite the opposite. To bridge the gap between theory and practice, we analyze a well-known state-of-the-art algorithm in normal system conditions, in which crash failures may occur but no malicious attacks, proving that it is fast on average. We then leverage our analysis to improve its best-case complexity from three to two phases, by reducing the communication operations through speculative executions. Our findings are confirmed through an experimental validation.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pairwise Key Generation Scheme for Cellular Mobile Communication 蜂窝式移动通信的成对密钥生成方案
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.48
Chetan Jaiswal, Vijay Kumar
We present two new key generation schemes for secure communication between a pair of mobile nodes (cell phones). Unlike existing algorithms, our scheme does not (a) store a key chain in the memory from a universal key space, (b) use key broadcast, (c) distribute selected keys to the network nodes, and (d) use database of keys for selecting keys for communication. Rather, the pair of nodes that want to communicate securely generate identical keys independently with the help of a head node. We show the behavior of these schemes through a simple analytical model.
我们提出了两种新的密钥生成方案,用于一对移动节点(手机)之间的安全通信。与现有算法不同,我们的方案不需要(a)在内存中存储通用密钥空间中的密钥链,(b)使用密钥广播,(c)将选择的密钥分发到网络节点,以及(d)使用密钥数据库选择用于通信的密钥。相反,希望安全通信的两个节点在头节点的帮助下独立生成相同的密钥。我们通过一个简单的解析模型来说明这些方案的行为。
{"title":"Pairwise Key Generation Scheme for Cellular Mobile Communication","authors":"Chetan Jaiswal, Vijay Kumar","doi":"10.1109/SRDS.2012.48","DOIUrl":"https://doi.org/10.1109/SRDS.2012.48","url":null,"abstract":"We present two new key generation schemes for secure communication between a pair of mobile nodes (cell phones). Unlike existing algorithms, our scheme does not (a) store a key chain in the memory from a universal key space, (b) use key broadcast, (c) distribute selected keys to the network nodes, and (d) use database of keys for selecting keys for communication. Rather, the pair of nodes that want to communicate securely generate identical keys independently with the help of a head node. We show the behavior of these schemes through a simple analytical model.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Reliability and Availability of Vehicular Communications Using Voronoi Diagram-Based Placement of Road Side Units 利用基于Voronoi图的路边单元布置提高车辆通信的可靠性和可用性
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.39
Prithviraj Patil, A. Gokhale
Vehicular Ad-hoc Networks (VANETs) form the basis for critical services that improve traffic safety and alleviate traffic congestion. The reliability of VANET-based services and applications that are based solely on vehicle-to-vehicle (V2V) communications, however, is hindered due primarily to limited and often fluctuating V2V communications. To address this limitation, Road-Side Units (RSU) have been proposed to complement V2V communications by providing stable event and data brokering capability. Effective placement of the RSUs is a key requirement in improving reliability of VANET services. This poster describes a novel Voronoi network-based algorithm for the effective placement of RSUs. The reliability metric considered in placing the RSUs involves bounding both the delay incurred by communication packets and packet loss, which in turn ensure timeliness and correct operation of the VANET services.
车辆自组织网络(vanet)构成了提高交通安全和缓解交通拥堵的关键服务的基础。然而,完全基于车对车(V2V)通信的基于vanet的服务和应用程序的可靠性受到阻碍,主要原因是V2V通信有限且经常波动。为了解决这一限制,路边单元(RSU)被提议通过提供稳定的事件和数据代理功能来补充V2V通信。有效安置rsu是提高VANET服务可靠性的关键要求。这张海报描述了一种新颖的基于Voronoi网络的rsu有效放置算法。放置rsu时考虑的可靠性度量包括对通信数据包产生的延迟和丢包进行限制,从而确保VANET业务的及时性和正确运行。
{"title":"Improving the Reliability and Availability of Vehicular Communications Using Voronoi Diagram-Based Placement of Road Side Units","authors":"Prithviraj Patil, A. Gokhale","doi":"10.1109/SRDS.2012.39","DOIUrl":"https://doi.org/10.1109/SRDS.2012.39","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) form the basis for critical services that improve traffic safety and alleviate traffic congestion. The reliability of VANET-based services and applications that are based solely on vehicle-to-vehicle (V2V) communications, however, is hindered due primarily to limited and often fluctuating V2V communications. To address this limitation, Road-Side Units (RSU) have been proposed to complement V2V communications by providing stable event and data brokering capability. Effective placement of the RSUs is a key requirement in improving reliability of VANET services. This poster describes a novel Voronoi network-based algorithm for the effective placement of RSUs. The reliability metric considered in placing the RSUs involves bounding both the delay incurred by communication packets and packet loss, which in turn ensure timeliness and correct operation of the VANET services.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 IEEE 31st Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1