首页 > 最新文献

2017 IEEE 25th International Conference on Network Protocols (ICNP)最新文献

英文 中文
BlueCoDE: Bluetooth coordination in dense environment for better coexistence BlueCoDE:密集环境下的蓝牙协调,更好的共存
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117534
Weiping Sun, Jonghoe Koo, Seongho Byeon, Woojin Park, Sangsoon Lim, Daehyun Ban, Sunghyun Choi
Dense Wi-Fi and Bluetooth (BT) environments become increasingly common so that the coexistence issue between Wi-Fi and BT is imperative to solve. In this paper, we propose BlueCoDE, a coordination scheme for multiple neighboring BT piconets, to make them collision-free and less harmful to Wi-Fi. BlueCoDE reuses BT's existing PHY and MAC design, thus making it practically feasible. We implement a prototype of BlueCoDE on Ubertooth One platform and corroborate the performance gain via analysis, NS-3 simulations, and prototype-based experiments. Our experimental results show that with merely 10 legacy BT piconets, neighboring Wi-Fi network becomes useless achieving under 1 Mb/s throughput, while BlueCoDE enables the Wi-Fi throughput always remain above 12 Mb/s. We expect BlueCoDE to be a breakthrough solution for coexistence in dense Wi-Fi and BT environments.
密集Wi-Fi和蓝牙(BT)环境日益普遍,Wi-Fi和BT共存问题亟待解决。在本文中,我们提出了一种针对多个相邻BT微网的协调方案BlueCoDE,使它们无碰撞,对Wi-Fi的危害更小。BlueCoDE重用了BT现有的PHY和MAC设计,从而使其具有实际可行性。我们在Ubertooth One平台上实现了BlueCoDE的原型,并通过分析、NS-3模拟和基于原型的实验验证了性能增益。我们的实验结果表明,仅使用10个传统BT piconet,邻近的Wi-Fi网络在1 Mb/s以下的吞吐量下变得无用,而BlueCoDE使Wi-Fi吞吐量始终保持在12 Mb/s以上。我们期待BlueCoDE成为在密集Wi-Fi和BT环境中共存的突破性解决方案。
{"title":"BlueCoDE: Bluetooth coordination in dense environment for better coexistence","authors":"Weiping Sun, Jonghoe Koo, Seongho Byeon, Woojin Park, Sangsoon Lim, Daehyun Ban, Sunghyun Choi","doi":"10.1109/ICNP.2017.8117534","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117534","url":null,"abstract":"Dense Wi-Fi and Bluetooth (BT) environments become increasingly common so that the coexistence issue between Wi-Fi and BT is imperative to solve. In this paper, we propose BlueCoDE, a coordination scheme for multiple neighboring BT piconets, to make them collision-free and less harmful to Wi-Fi. BlueCoDE reuses BT's existing PHY and MAC design, thus making it practically feasible. We implement a prototype of BlueCoDE on Ubertooth One platform and corroborate the performance gain via analysis, NS-3 simulations, and prototype-based experiments. Our experimental results show that with merely 10 legacy BT piconets, neighboring Wi-Fi network becomes useless achieving under 1 Mb/s throughput, while BlueCoDE enables the Wi-Fi throughput always remain above 12 Mb/s. We expect BlueCoDE to be a breakthrough solution for coexistence in dense Wi-Fi and BT environments.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"42 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76048885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Suffering from buffering? Detecting QoE impairments in live video streams 遭受缓冲?检测实时视频流中的QoE损伤
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117561
Adnan Ahmed, Zubair Shafiq, H. Bedi, Amir R. Khakpour
Fueled by increasing network bandwidth and decreasing costs, the popularity of over-the-top large-scale live video streaming has dramatically increased over the last few years. In this paper, we present a measurement study of adaptive bitrate video streaming for a large-scale live event. Using server-side logs from a commercial content delivery network, we study live video delivery for the annual Academy Awards event that was streamed by hundreds of thousands of viewers in the United States. We analyze the relationship between Quality-of-Experience (QoE) and user engagement. We first study the impact of buffering, average bitrate, and bitrate fluctuations on user engagement. To account for interdependencies among QoE metrics and other confounding factors, we use quasi-experiments to quantify the causal impact of different QoE metrics on user engagement. We further design and implement a Principal Component Analysis (PCA) based technique to detect live video QoE impairments in real-time. We then use Hampel filters to detect QoE impairments and report 92% accuracy with 20% improvement in true positive rate as compared to baselines. Our approach allows content providers to detect and mitigate QoE impairments on the fly instead of relying on post-hoc analysis.
在不断增加的网络带宽和不断降低的成本的推动下,在过去几年中,超大规模的实时视频流媒体的普及程度急剧增加。在本文中,我们提出了一种用于大型现场活动的自适应比特率视频流的测量研究。使用来自商业内容交付网络的服务器端日志,我们研究了美国数十万观众观看的年度奥斯卡颁奖典礼的实时视频交付。我们分析了体验质量(QoE)和用户粘性之间的关系。我们首先研究了缓冲、平均比特率和比特率波动对用户粘性的影响。为了解释质量质量指标和其他混杂因素之间的相互依赖关系,我们使用准实验来量化不同质量质量指标对用户参与度的因果影响。我们进一步设计并实现了一种基于主成分分析(PCA)的技术来实时检测实时视频QoE损伤。然后,我们使用Hampel过滤器检测QoE损伤,并报告92%的准确率,与基线相比,真阳性率提高了20%。我们的方法允许内容提供者动态地检测和减轻QoE损害,而不是依赖于事后分析。
{"title":"Suffering from buffering? Detecting QoE impairments in live video streams","authors":"Adnan Ahmed, Zubair Shafiq, H. Bedi, Amir R. Khakpour","doi":"10.1109/ICNP.2017.8117561","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117561","url":null,"abstract":"Fueled by increasing network bandwidth and decreasing costs, the popularity of over-the-top large-scale live video streaming has dramatically increased over the last few years. In this paper, we present a measurement study of adaptive bitrate video streaming for a large-scale live event. Using server-side logs from a commercial content delivery network, we study live video delivery for the annual Academy Awards event that was streamed by hundreds of thousands of viewers in the United States. We analyze the relationship between Quality-of-Experience (QoE) and user engagement. We first study the impact of buffering, average bitrate, and bitrate fluctuations on user engagement. To account for interdependencies among QoE metrics and other confounding factors, we use quasi-experiments to quantify the causal impact of different QoE metrics on user engagement. We further design and implement a Principal Component Analysis (PCA) based technique to detect live video QoE impairments in real-time. We then use Hampel filters to detect QoE impairments and report 92% accuracy with 20% improvement in true positive rate as compared to baselines. Our approach allows content providers to detect and mitigate QoE impairments on the fly instead of relying on post-hoc analysis.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"57 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80208549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Machine learning at the network edge for automated home intrusion monitoring 网络边缘的机器学习用于自动家庭入侵监控
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117594
Aditya Dhakal, K. Ramakrishnan
Monitoring of residences and businesses can be effectively performed using machine learning algorithms. As sensors and devices used for monitoring become more complex, having humans process the information to detect intrusions would be expensive and difficult to scale. We propose an automated home/business monitoring system which resides on edge servers performing online learning on streaming data coming from homes and businesses in the neighborhood. The edge servers run Open-NetVM, a Network Function Virtualization (NFV) platform, and host multiple machine learning applications instantiated on demand. This enables us to serve a set of customers in the neighborhood on a timely basis, permitting customization and learning of the behavior of each home. We combine the results of the multiple classifiers, with each classifier examining a distinct feature related to a distinct sensor, to finally infer whether the entry is a normal one or an intrusion. Our results show that our system is able to classify intrusions better than basing the decision on a single classifier, thus reducing false alarms. We have also shown that our system can effectively scale and monitor thousands of homes.
使用机器学习算法可以有效地对住宅和企业进行监控。随着用于监控的传感器和设备变得越来越复杂,让人类处理信息来检测入侵将是昂贵的,而且难以扩展。我们提出了一种自动化的家庭/企业监控系统,该系统驻留在边缘服务器上,对来自附近家庭和企业的流数据进行在线学习。边缘服务器运行Open-NetVM,一种网络功能虚拟化(NFV)平台,并根据需要托管多个机器学习应用程序。这使我们能够及时为附近的一组客户提供服务,允许定制和了解每个家庭的行为。我们结合多个分类器的结果,每个分类器检查与不同传感器相关的不同特征,最终推断该条目是正常的还是入侵的。我们的结果表明,我们的系统能够比基于单一分类器的决策更好地对入侵进行分类,从而减少误报。我们还展示了我们的系统可以有效地扩展和监控数千个家庭。
{"title":"Machine learning at the network edge for automated home intrusion monitoring","authors":"Aditya Dhakal, K. Ramakrishnan","doi":"10.1109/ICNP.2017.8117594","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117594","url":null,"abstract":"Monitoring of residences and businesses can be effectively performed using machine learning algorithms. As sensors and devices used for monitoring become more complex, having humans process the information to detect intrusions would be expensive and difficult to scale. We propose an automated home/business monitoring system which resides on edge servers performing online learning on streaming data coming from homes and businesses in the neighborhood. The edge servers run Open-NetVM, a Network Function Virtualization (NFV) platform, and host multiple machine learning applications instantiated on demand. This enables us to serve a set of customers in the neighborhood on a timely basis, permitting customization and learning of the behavior of each home. We combine the results of the multiple classifiers, with each classifier examining a distinct feature related to a distinct sensor, to finally infer whether the entry is a normal one or an intrusion. Our results show that our system is able to classify intrusions better than basing the decision on a single classifier, thus reducing false alarms. We have also shown that our system can effectively scale and monitor thousands of homes.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"45 5","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91399497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A customized and cost-efficient backup scheme in software-defined networks 一种在软件定义网络中定制且经济高效的备份方案
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117595
Zhijie Zhu, Qing Li, Mingwei Xu, Ziyan Song, Shutao Xia
Among the schemes proposed for failure recovery in software-defined networks, installing backup paths in advance is considered to be an effective approach to reduce the recovery latency. However, the pre-installation poses undue storage overheads on flow tables. In this paper, we propose a customized and cost-efficient backup scheme, which achieves fast recovery from any single-link failure. We introduce an improved breadth first search algorithm to construct the customized backup paths of flows to accommodate their diverse routing demands. By analyzing the path characteristics carefully, we observe that non-conflicted backup paths can be aggregated with each other to reduce the number of backup rules. We formulate this backup path aggregation as an optimization problem. The challenge is how to aggregate the backup paths without causing routing ambiguity. To this end, we design a two-stage aggregation (2SA) algorithm. At its core, 2SA leverages conflict matrixes to guarantee the correctness of aggregation. We evaluate our scheme comprehensively with both the real-world topologies and generated topologies. Simulation results show that our scheme can pre-install the customized backup paths with much fewer, typically one order of magnitude, backup rules compared to the traditional flow-based protection without aggregation.
在软件定义网络中提出的故障恢复方案中,提前设置备份路径被认为是减少恢复延迟的有效方法。然而,预安装会给流表带来不必要的存储开销。在本文中,我们提出了一种定制的、经济有效的备份方案,可以实现任何单链路故障的快速恢复。提出了一种改进的广度优先搜索算法来构建自定义的流备份路径,以适应流的不同路由需求。通过仔细分析路径特征,我们发现可以将不冲突的备份路径聚合在一起,从而减少备份规则的数量。我们将此备份路径聚合表述为一个优化问题。挑战在于如何聚合备份路径而不引起路由歧义。为此,我们设计了一个两阶段聚合(2SA)算法。2SA的核心是利用冲突矩阵来保证聚合的正确性。我们用实际拓扑和生成的拓扑全面地评估了我们的方案。仿真结果表明,与传统的无聚合的基于流的保护相比,该方案可以预先安装定制的备份路径,备份规则的数量通常为一个数量级。
{"title":"A customized and cost-efficient backup scheme in software-defined networks","authors":"Zhijie Zhu, Qing Li, Mingwei Xu, Ziyan Song, Shutao Xia","doi":"10.1109/ICNP.2017.8117595","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117595","url":null,"abstract":"Among the schemes proposed for failure recovery in software-defined networks, installing backup paths in advance is considered to be an effective approach to reduce the recovery latency. However, the pre-installation poses undue storage overheads on flow tables. In this paper, we propose a customized and cost-efficient backup scheme, which achieves fast recovery from any single-link failure. We introduce an improved breadth first search algorithm to construct the customized backup paths of flows to accommodate their diverse routing demands. By analyzing the path characteristics carefully, we observe that non-conflicted backup paths can be aggregated with each other to reduce the number of backup rules. We formulate this backup path aggregation as an optimization problem. The challenge is how to aggregate the backup paths without causing routing ambiguity. To this end, we design a two-stage aggregation (2SA) algorithm. At its core, 2SA leverages conflict matrixes to guarantee the correctness of aggregation. We evaluate our scheme comprehensively with both the real-world topologies and generated topologies. Simulation results show that our scheme can pre-install the customized backup paths with much fewer, typically one order of magnitude, backup rules compared to the traditional flow-based protection without aggregation.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81663166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework for anonymous routing in delay tolerant networks 容忍延迟网络中的匿名路由框架
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117531
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that can adapt to the different levels of security requirements. In this paper, we first design a set of anonymous routing protocols for DTNs, called anonymous Epidemic and zone-based anonymous routing, based on the original anonymous routing protocols for ad hoc networks. Then, we propose a framework of anonymous routing (FAR) for DTNs, which subsumes all the aforementioned protocols. By tuning its parameters, the proposed FAR is able to outperform onion-based, anonymous Epidemic, and zone-based routing. In addition, numerical analyses for the traceable rate and node anonymity models are built. Extensive simulations using randomly generated graphs as well as real traces are conducted to demonstrate that given appropriate parameter settings, our FAR outperforms all the existing anonymous routing protocols for DTNs.
安全性和隐私问题被认为是使用移动应用程序的组织和个人最关心的两个问题。在本文中,我们寻求解决延迟容忍网络(DTNs)中的匿名通信。虽然针对自组织网络已经提出了许多不同的匿名路由协议,但据我们所知,只有基于洋葱的路由变体为ddn量身定制。由于每种类型的匿名路由协议都有其优点和缺点,因此没有单一的ddn匿名路由协议可以适应不同级别的安全需求。本文首先在原有的ad hoc网络匿名路由协议的基础上,设计了一套用于dtn的匿名路由协议,称为匿名流行病和基于区域的匿名路由。然后,我们提出了一个包含上述所有协议的DTNs匿名路由(FAR)框架。通过调整其参数,所提出的FAR能够优于基于洋葱、匿名流行病和基于区域的路由。此外,还建立了可追踪率和节点匿名模型的数值分析。使用随机生成的图形和真实轨迹进行了广泛的模拟,以证明在适当的参数设置下,我们的FAR优于所有现有的dtn匿名路由协议。
{"title":"A framework for anonymous routing in delay tolerant networks","authors":"Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu","doi":"10.1109/ICNP.2017.8117531","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117531","url":null,"abstract":"Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that can adapt to the different levels of security requirements. In this paper, we first design a set of anonymous routing protocols for DTNs, called anonymous Epidemic and zone-based anonymous routing, based on the original anonymous routing protocols for ad hoc networks. Then, we propose a framework of anonymous routing (FAR) for DTNs, which subsumes all the aforementioned protocols. By tuning its parameters, the proposed FAR is able to outperform onion-based, anonymous Epidemic, and zone-based routing. In addition, numerical analyses for the traceable rate and node anonymity models are built. Extensive simulations using randomly generated graphs as well as real traces are conducted to demonstrate that given appropriate parameter settings, our FAR outperforms all the existing anonymous routing protocols for DTNs.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"9 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87876300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A network-centric TCP for interactive video delivery networks (VDN) 用于交互式视频传输网络(VDN)的以网络为中心的TCP
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117596
Md Iftakharul Islam, J. Khan
Interactive video streaming requires very low latency and high throughput. Traditional latency based congestion control algorithm performs poorly in fairness. This results in very poor video quality to adaptive video streaming. Software defined networks (SDN) enables us to solve the problem by designing a network controller in the routers. This paper presents a SDN-centric TCP where sending rate of the network is calculated from the network rather than the host. Routers along the path uses a proportional integral (PI) controller to calculate the sending rate in order to reduce the queuing delay. The routers also divide the available throughput fairly among the flows. The network based controller is found more effective than the sender/receiver based controller in reducing latency and providing fairness. NC-TCP has been designed for interactive video delivery network (VDN) where the interactive video flows compete among themselves. Such differentiated service obviates the need for TCP-friendliness. We have implemented NC-TCP in Linux kernel. We have evaluated NC-TCP in Mininet for an interactive video streaming application. Our experimental results shows that NC-TCP outperforms delay-based congestion control in an interactive VDN.
交互式视频流要求非常低的延迟和高吞吐量。传统的基于时延的拥塞控制算法公平性较差。这导致自适应视频流的视频质量非常差。软件定义网络(SDN)使我们能够通过在路由器中设计网络控制器来解决这个问题。本文提出了一种以sdn为中心的TCP协议,其中网络的发送速率是从网络而不是主机计算的。路径上的路由器使用比例积分(PI)控制器来计算发送速率,以减少排队延迟。路由器还可以在流之间公平地分配可用的吞吐量。基于网络的控制器在减少延迟和提供公平性方面比基于发送方/接收方的控制器更有效。NC-TCP是为交互式视频传输网络(VDN)设计的,在该网络中,交互式视频流相互竞争。这种差异化的服务消除了对tcp友好性的需求。我们已经在Linux内核中实现了NC-TCP。我们已经评估了NC-TCP在Mininet中的交互式视频流应用。实验结果表明,NC-TCP在交互式VDN中优于基于延迟的拥塞控制。
{"title":"A network-centric TCP for interactive video delivery networks (VDN)","authors":"Md Iftakharul Islam, J. Khan","doi":"10.1109/ICNP.2017.8117596","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117596","url":null,"abstract":"Interactive video streaming requires very low latency and high throughput. Traditional latency based congestion control algorithm performs poorly in fairness. This results in very poor video quality to adaptive video streaming. Software defined networks (SDN) enables us to solve the problem by designing a network controller in the routers. This paper presents a SDN-centric TCP where sending rate of the network is calculated from the network rather than the host. Routers along the path uses a proportional integral (PI) controller to calculate the sending rate in order to reduce the queuing delay. The routers also divide the available throughput fairly among the flows. The network based controller is found more effective than the sender/receiver based controller in reducing latency and providing fairness. NC-TCP has been designed for interactive video delivery network (VDN) where the interactive video flows compete among themselves. Such differentiated service obviates the need for TCP-friendliness. We have implemented NC-TCP in Linux kernel. We have evaluated NC-TCP in Mininet for an interactive video streaming application. Our experimental results shows that NC-TCP outperforms delay-based congestion control in an interactive VDN.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"418 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81948622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure crowdsourced radio environment map construction 安全众包无线电环境地图建设
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117556
Yidan Hu, Rui Zhang
Database-driven Dynamic Spectrum Sharing (DSS) is the de-facto technical paradigm adopted by Federal Communications Commission (FCC) for increasing spectrum efficiency. In such a system, a geo-location database administrator (DBA) maintains spectrum availability information over its service region whereby to determines whether a secondary user can access a licensed spectrum band at his desired location and time. To maintain spectrum availability in its service region, it is desirable for the DBA to periodically collect spectrum measurements whereby to construct and maintain a Radio Environment Map (REM), where the received signal strength at every location of interest is either directly measured or estimated via proper statistical spatial interpolation techniques. Crowdsourcing-based spectrum sensing is a promising approach for periodically collecting spectrum measurements over a large geographic area, which is, unfortunately, vulnerable to false spectrum measurements. How to construct an accurate REM in the presence of false measurements remains an open challenge. This paper introduces SecREM, a novel scheme for securely constructing a REM in the presence of false spectrum measurements. SecREM relies on a small number of trusted spectrum measurements whereby to evaluate the trustworthiness of the measurements from mobile users and gradually incorporate the most trustworthy ones to construct an accurate REM. Extensive simulation studies based on a real spectrum measurement dataset confirm the efficacy and efficiency of SecREM.
数据库驱动的动态频谱共享(DSS)是美国联邦通信委员会(FCC)为提高频谱效率而采用的事实上的技术范式。在这种系统中,地理位置数据库管理员(DBA)维护其服务区域内的频谱可用性信息,从而确定辅助用户是否可以在其期望的位置和时间访问许可频段。为了保持其服务区域的频谱可用性,DBA需要定期收集频谱测量值,从而构建和维护无线电环境图(REM),其中直接测量或通过适当的统计空间插值技术估计每个感兴趣位置的接收信号强度。基于众包的频谱传感是一种很有前途的方法,可以定期收集大范围地理区域的频谱测量数据,但不幸的是,这种方法容易受到虚假频谱测量的影响。如何在存在错误测量的情况下构建准确的REM仍然是一个开放的挑战。本文介绍了一种在存在虚假频谱测量的情况下安全构造REM的新方案SecREM。SecREM依靠少量可信的频谱测量值来评估移动用户测量值的可信度,并逐步纳入最可信的频谱测量值来构建准确的REM。基于真实频谱测量数据集的大量仿真研究证实了SecREM的有效性和效率。
{"title":"Secure crowdsourced radio environment map construction","authors":"Yidan Hu, Rui Zhang","doi":"10.1109/ICNP.2017.8117556","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117556","url":null,"abstract":"Database-driven Dynamic Spectrum Sharing (DSS) is the de-facto technical paradigm adopted by Federal Communications Commission (FCC) for increasing spectrum efficiency. In such a system, a geo-location database administrator (DBA) maintains spectrum availability information over its service region whereby to determines whether a secondary user can access a licensed spectrum band at his desired location and time. To maintain spectrum availability in its service region, it is desirable for the DBA to periodically collect spectrum measurements whereby to construct and maintain a Radio Environment Map (REM), where the received signal strength at every location of interest is either directly measured or estimated via proper statistical spatial interpolation techniques. Crowdsourcing-based spectrum sensing is a promising approach for periodically collecting spectrum measurements over a large geographic area, which is, unfortunately, vulnerable to false spectrum measurements. How to construct an accurate REM in the presence of false measurements remains an open challenge. This paper introduces SecREM, a novel scheme for securely constructing a REM in the presence of false spectrum measurements. SecREM relies on a small number of trusted spectrum measurements whereby to evaluate the trustworthiness of the measurements from mobile users and gradually incorporate the most trustworthy ones to construct an accurate REM. Extensive simulation studies based on a real spectrum measurement dataset confirm the efficacy and efficiency of SecREM.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90184487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A multiple vehicle sensing approach for collision avoidance in progressively deployed vehicle networks 在逐步部署的车辆网络中,多车辆感知避碰方法
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117532
Yi Gao, Xue Liu, Wei Dong
Dedicated Short Range Communications (DSRC), a promising vehicle-to-vehicle communication technology, has been under active research and large scale DSRC deployment is expected to start shortly. However, before all vehicles are deployed with DSRC, there will be a relatively long partial DSRC deployment period where DSRC-equipped vehicles and non-DSRC-equipped vehicles both exist on roads. More importantly, it is reported that the probability a DSRC-equipped vehicle will benefit from a safety application is only of 1% during the initial DSRC deployment. Therefore, we propose MVS, a Multiple Vehicle Sensing approach to improve the collision avoidance effectiveness under partial DSRC deployment. The design of MVS is based on the observation that vehicles are able to sense the kinematic states of its adjacent vehicles by using existing computer vision technologies and/or on-board radar technologies. Therefore, we focus on improving the efficiency of sharing these sensed kinematic states among DSRC-equipped vehicles. By using the sensed data from multiple adjacent vehicles, the kinematic states of a non-DSRC-equipped vehicle can be accurately estimated. MVS is implemented and evaluated through a trace-driven study based on two realistic vehicle mobility traces. Results show that MVS reduces the collision probability by 61.5% and 60.1% in the two traces.
专用短程通信(DSRC)是一种很有前途的车对车通信技术,目前正在积极研究中,预计不久将开始大规模部署。然而,在所有车辆部署DSRC之前,将有一段相对较长的部分DSRC部署期,在这段时间内,道路上既有配备DSRC的车辆,也有没有配备DSRC的车辆。更重要的是,据报道,在最初部署DSRC时,配备DSRC的车辆从安全应用中获益的概率仅为1%。因此,我们提出了MVS,一种多车感知方法来提高部分DSRC部署下的避碰效果。MVS的设计基于这样一种观察,即车辆能够通过使用现有的计算机视觉技术和/或车载雷达技术感知相邻车辆的运动状态。因此,我们的重点是提高这些感知到的运动状态在装备dsrc的车辆之间的共享效率。利用多辆相邻车辆的感知数据,可以准确估计非dsrc车辆的运动状态。MVS通过基于两条真实车辆移动轨迹的轨迹驱动研究来实现和评估。结果表明,MVS在两条轨迹上的碰撞概率分别降低了61.5%和60.1%。
{"title":"A multiple vehicle sensing approach for collision avoidance in progressively deployed vehicle networks","authors":"Yi Gao, Xue Liu, Wei Dong","doi":"10.1109/ICNP.2017.8117532","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117532","url":null,"abstract":"Dedicated Short Range Communications (DSRC), a promising vehicle-to-vehicle communication technology, has been under active research and large scale DSRC deployment is expected to start shortly. However, before all vehicles are deployed with DSRC, there will be a relatively long partial DSRC deployment period where DSRC-equipped vehicles and non-DSRC-equipped vehicles both exist on roads. More importantly, it is reported that the probability a DSRC-equipped vehicle will benefit from a safety application is only of 1% during the initial DSRC deployment. Therefore, we propose MVS, a Multiple Vehicle Sensing approach to improve the collision avoidance effectiveness under partial DSRC deployment. The design of MVS is based on the observation that vehicles are able to sense the kinematic states of its adjacent vehicles by using existing computer vision technologies and/or on-board radar technologies. Therefore, we focus on improving the efficiency of sharing these sensed kinematic states among DSRC-equipped vehicles. By using the sensed data from multiple adjacent vehicles, the kinematic states of a non-DSRC-equipped vehicle can be accurately estimated. MVS is implemented and evaluated through a trace-driven study based on two realistic vehicle mobility traces. Results show that MVS reduces the collision probability by 61.5% and 60.1% in the two traces.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"247 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76283967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SyncCoding: A compression technique exploiting references for data synchronization services SyncCoding:一种利用数据同步服务引用的压缩技术
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117562
Wooseung Nam, Joohyung Lee, Kyunghan Lee
In this work, we raise a question on why the abundant information previously shared between a server and its client is not effectively utilized in the exchange of a new data which may be highly correlated with the shared data. We formulate this question as an encoding problem that is applicable to general data synchronization services including a wide range of Internet services such as cloud data synchronization, web browsing, messaging, and even data streaming. To this problem, we propose a new encoding technique, SyncCoding that maximally replaces subsets of the data to be transmitted with the coordinates pointing to the matching subsets included in the set of relevant shared data, called references. SyncCoding can be easily integrated into a transport layer protocol such as HTTP and enables significant reduction of network traffic. Our experimental evaluations of SyncCoding implemented in Linux shows that it outperforms existing popular encoding techniques, Brotli, LZMA, Deflate, and Deduplication in two practical use networking applications: cloud data sharing and web browsing. The gains of SyncCoding over Brotli, LZMA, Deflate, and Deduplication in the encoded size to be transmitted are shown to be about 12.4%, 20.1%, 29.9%, and 61.2% in the cloud data sharing and about 78.3%, 79.6%, 86.1%, and 92.9% in the web browsing, respectively. The gains of SyncCoding over Brotli, LZMA, and Deflate when Deduplication is applied in advance are about 7.4%, 10.6%, and 17.4% in the cloud data sharing and about 79.4%, 82.0%, and 83.2% in the web browsing, respectively.
在这项工作中,我们提出了一个问题,为什么以前在服务器和客户端之间共享的大量信息在交换可能与共享数据高度相关的新数据时没有得到有效利用。我们将这个问题表述为一个编码问题,它适用于一般的数据同步服务,包括广泛的互联网服务,如云数据同步、网页浏览、消息传递,甚至数据流。针对这个问题,我们提出了一种新的编码技术,SyncCoding,它最大限度地用指向相关共享数据集中包含的匹配子集(称为引用)的坐标替换要传输的数据子集。同步编码可以很容易地集成到传输层协议(如HTTP)中,从而显著减少网络流量。我们对在Linux中实现的SyncCoding的实验评估表明,在云数据共享和网页浏览这两个实际使用的网络应用中,SyncCoding优于现有的流行编码技术,如Brotli、LZMA、Deflate和Deduplication。在传输的编码大小上,SyncCoding相对于Brotli、LZMA、Deflate和Deduplication的增幅分别为12.4%、20.1%、29.9%和61.2%,在云数据共享方面的增幅分别为78.3%、79.6%、86.1%和92.9%。提前应用重复数据删除时,SyncCoding相对于Brotli、LZMA和Deflate在云数据共享方面的增幅分别为7.4%、10.6%和17.4%,在网页浏览方面的增幅分别为79.4%、82.0%和83.2%。
{"title":"SyncCoding: A compression technique exploiting references for data synchronization services","authors":"Wooseung Nam, Joohyung Lee, Kyunghan Lee","doi":"10.1109/ICNP.2017.8117562","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117562","url":null,"abstract":"In this work, we raise a question on why the abundant information previously shared between a server and its client is not effectively utilized in the exchange of a new data which may be highly correlated with the shared data. We formulate this question as an encoding problem that is applicable to general data synchronization services including a wide range of Internet services such as cloud data synchronization, web browsing, messaging, and even data streaming. To this problem, we propose a new encoding technique, SyncCoding that maximally replaces subsets of the data to be transmitted with the coordinates pointing to the matching subsets included in the set of relevant shared data, called references. SyncCoding can be easily integrated into a transport layer protocol such as HTTP and enables significant reduction of network traffic. Our experimental evaluations of SyncCoding implemented in Linux shows that it outperforms existing popular encoding techniques, Brotli, LZMA, Deflate, and Deduplication in two practical use networking applications: cloud data sharing and web browsing. The gains of SyncCoding over Brotli, LZMA, Deflate, and Deduplication in the encoded size to be transmitted are shown to be about 12.4%, 20.1%, 29.9%, and 61.2% in the cloud data sharing and about 78.3%, 79.6%, 86.1%, and 92.9% in the web browsing, respectively. The gains of SyncCoding over Brotli, LZMA, and Deflate when Deduplication is applied in advance are about 7.4%, 10.6%, and 17.4% in the cloud data sharing and about 79.4%, 82.0%, and 83.2% in the web browsing, respectively.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"360 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76435431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MDP modeling of resource provisioning in virtualized content-delivery networks 虚拟化内容交付网络中资源供应的MDP建模
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117600
A. Haghighi, S. Shah-Heydari, S. Shahbazpanahi
In this paper a Markov decision process (MDP) model for virtualized content delivery networks is proposed. We use stochastic optimization to assign cloud site resources to each user group. We propose how quality of experience (QoE) can be included in the modeling and optimization. We then present an optimal solution for a constraint-free version of the problem, and show the improvement in accumulated revenue when our optimization model is used. A sub-optimal algorithm is proposed that would reduce the complexity of the problem. Simulation results are presented to support merits of the proposed algorithm.
本文提出了一种虚拟内容交付网络的马尔可夫决策过程模型。我们使用随机优化方法将云站点资源分配给每个用户组。我们提出了如何将体验质量(QoE)纳入建模和优化。然后,我们提出了该问题的无约束版本的最优解决方案,并展示了使用我们的优化模型时累积收益的改进。提出了一种降低问题复杂度的次优算法。仿真结果支持了该算法的优点。
{"title":"MDP modeling of resource provisioning in virtualized content-delivery networks","authors":"A. Haghighi, S. Shah-Heydari, S. Shahbazpanahi","doi":"10.1109/ICNP.2017.8117600","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117600","url":null,"abstract":"In this paper a Markov decision process (MDP) model for virtualized content delivery networks is proposed. We use stochastic optimization to assign cloud site resources to each user group. We propose how quality of experience (QoE) can be included in the modeling and optimization. We then present an optimal solution for a constraint-free version of the problem, and show the improvement in accumulated revenue when our optimization model is used. A sub-optimal algorithm is proposed that would reduce the complexity of the problem. Simulation results are presented to support merits of the proposed algorithm.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"181 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76395460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE 25th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1