首页 > 最新文献

2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
A Case Study and Design of Transformation Architecture in BSS BSS中转换体系结构的案例研究与设计
Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng
Recently due to the rapidly changing and strictly competitive in telecom market, there are a variety kinds of products and convergent services to be promoted such as ICT services. There are a serial of conventional BSS constantly face stringent challenges such as time to market as well as quality and cost expectations. Systematic think that if there is a well-established system architect as a strong fundamental infrastructure as a right direction to transform the conventional BSS and to develop a new system. This paper introduces a BSS reengineering framework project include architecture design techniques and processes to produce a well-established architecture as strategy reuse and more flexible one than before. Also this study employs some real world BSS as case study to practice and examine those techniques then derive a BSS transformation to-be architecture.
最近,由于电信市场的快速变化和激烈竞争,出现了各种各样的产品和融合服务,如ICT服务。有一系列传统的BSS不断面临严峻的挑战,如上市时间以及质量和成本预期。系统认为如果有一个完善的系统架构师作为强大的基础设施作为正确的方向,可以改造传统的BSS并开发出新的系统。本文介绍了一个BSS再工程框架项目,包括体系结构设计技术和过程,以产生一个完善的体系结构作为策略重用和比以前更灵活的体系结构。此外,本研究还使用了一些现实世界的BSS作为案例研究来实践和检查这些技术,然后得出BSS转换为体系结构。
{"title":"A Case Study and Design of Transformation Architecture in BSS","authors":"Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng","doi":"10.1109/WAINA.2015.67","DOIUrl":"https://doi.org/10.1109/WAINA.2015.67","url":null,"abstract":"Recently due to the rapidly changing and strictly competitive in telecom market, there are a variety kinds of products and convergent services to be promoted such as ICT services. There are a serial of conventional BSS constantly face stringent challenges such as time to market as well as quality and cost expectations. Systematic think that if there is a well-established system architect as a strong fundamental infrastructure as a right direction to transform the conventional BSS and to develop a new system. This paper introduces a BSS reengineering framework project include architecture design techniques and processes to produce a well-established architecture as strategy reuse and more flexible one than before. Also this study employs some real world BSS as case study to practice and examine those techniques then derive a BSS transformation to-be architecture.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"700-705"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89437044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks 基于一类主成分分类器的无线传感器网络离群点检测模型
Oussama Ghorbel, M. Abid, H. Snoussi
Wireless sensor networks (WSNs) are important platforms for collecting environmental data and monitoring phenomena. So, outlier detection process is a necessary step in building sensor network systems to assure data quality for perfect decision making. Over the last few years Kernel Principal Component Analysis (KPCA) is considered as a natural nonlinear generalization of PCA, which extracts nonlinear structure from the data. Wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. Then, the key challenge is to extract high level knowledge from such raw data. So, the accuracy of sensor readings is without a doubt one of the most important measures to evaluate the quality of a sensor and its network. For this case, the task amounts to create a useful model based on KPCA to recognize data as normal or outliers. However, KPCA based reconstruction error (RE) has found several applications in outlier detection but is not perfect to detect outlier. Within this setting, we propose Kernel Principal Component Analysis based Mahalanobis kernel as a new outlier detection method using mahalanobis distance to implicitly calculate the mapping of the data points in the feature space so that we can separate outlier points from normal pattern of data distribution. The use of KPCA based mahalanobis kernel on real word data obtained from three real datasets are reported showing that the proposed method performs better in finding outliers in wireless sensor networks when compared to the original RE based variant and the One-Class SVM detection approach.
无线传感器网络是采集环境数据和监测环境现象的重要平台。因此,异常点检测过程是构建传感器网络系统的必要步骤,以保证数据质量,实现完善的决策。近年来,核主成分分析(KPCA)被认为是主成分分析的自然非线性推广,它从数据中提取非线性结构。无线传感器网络已经部署在现实世界中,以收集大量的原始传感数据。然后,关键的挑战是从这些原始数据中提取高层次的知识。因此,传感器读数的准确性无疑是评价传感器及其网络质量的最重要的指标之一。对于这种情况,该任务相当于创建一个基于KPCA的有用模型,以识别正常数据或异常数据。然而,基于KPCA的重构误差(RE)在离群点检测中已经有了一些应用,但在离群点检测中还不够完善。在此背景下,我们提出了基于核主成分分析的Mahalanobis核作为一种新的异常点检测方法,利用Mahalanobis距离隐式计算数据点在特征空间中的映射,从而将异常点从数据分布的正态模式中分离出来。将基于KPCA的mahalanobis核用于从三个真实数据集获得的真实单词数据,结果表明,与原始的基于正则的变体和一类支持向量机检测方法相比,所提出的方法在无线传感器网络中发现异常点方面表现更好。
{"title":"A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks","authors":"Oussama Ghorbel, M. Abid, H. Snoussi","doi":"10.1109/AINA.2015.168","DOIUrl":"https://doi.org/10.1109/AINA.2015.168","url":null,"abstract":"Wireless sensor networks (WSNs) are important platforms for collecting environmental data and monitoring phenomena. So, outlier detection process is a necessary step in building sensor network systems to assure data quality for perfect decision making. Over the last few years Kernel Principal Component Analysis (KPCA) is considered as a natural nonlinear generalization of PCA, which extracts nonlinear structure from the data. Wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. Then, the key challenge is to extract high level knowledge from such raw data. So, the accuracy of sensor readings is without a doubt one of the most important measures to evaluate the quality of a sensor and its network. For this case, the task amounts to create a useful model based on KPCA to recognize data as normal or outliers. However, KPCA based reconstruction error (RE) has found several applications in outlier detection but is not perfect to detect outlier. Within this setting, we propose Kernel Principal Component Analysis based Mahalanobis kernel as a new outlier detection method using mahalanobis distance to implicitly calculate the mapping of the data points in the feature space so that we can separate outlier points from normal pattern of data distribution. The use of KPCA based mahalanobis kernel on real word data obtained from three real datasets are reported showing that the proposed method performs better in finding outliers in wireless sensor networks when compared to the original RE based variant and the One-Class SVM detection approach.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"70-76"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90428499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies 流行病学研究中隐私保护线性回归的可扩展性
Hiroaki Kikuchi, H. Hashimoto, H. Yasunaga, Takamichi Saito
In many hospitals, data related to patients are observed and collected to a central database for medical research. For instance, DPC dataset, which stands for Disease, Procedure and Combination, covers medical records for more than 7 million patients in more than 1000 hospitals. Using the distributed DPC data set, a number of epidemiological studied are feasible to reveal useful knowledge on medical treatments. Hence, cryptography helps to preserve the privacy of personal data. The study called as Privacy-Preserving Data Mining (PPDM) aims to perform a data mining algorithm with preserving confidentiality of datasets. This paper studies the scalability of privacy-preserving data mining in epidemiological study. As for the data-mining algorithm, we focus to a linear regression since it is used in many applications and simple to be evaluated. We try to identify the linear model to estimate a length of hospital stay from distributed dataset related to the patient and the disease information. Our contributions of this paper include (1) to propose privacy-preserving protocols for linear regression with horizontally or vertically partitioned datasets, and (2) to clarify the limitation of size of problem to be performed. These information are useful to determine the dominant element in PPDM and to figure out the direction of study for further improvement.
在许多医院,与病人有关的数据被观察并收集到一个中央数据库,用于医学研究。例如,DPC数据集(代表疾病,程序和组合)涵盖了1000多家医院的700多万患者的医疗记录。利用分布式DPC数据集,许多流行病学研究是可行的,可以揭示有用的医疗知识。因此,密码学有助于保护个人数据的隐私。该研究被称为隐私保护数据挖掘(PPDM),旨在执行一种数据挖掘算法,以保护数据集的机密性。本文研究了流行病学研究中隐私保护数据挖掘的可扩展性。至于数据挖掘算法,我们主要关注线性回归,因为它在许多应用中使用,并且易于评估。我们尝试从与患者和疾病信息相关的分布式数据集中识别线性模型来估计住院时间。本文的贡献包括:(1)提出了水平或垂直分割数据集的线性回归的隐私保护协议,以及(2)阐明了要执行的问题的大小限制。这些信息有助于确定PPDM的主导因素,并为进一步改进研究指明方向。
{"title":"Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies","authors":"Hiroaki Kikuchi, H. Hashimoto, H. Yasunaga, Takamichi Saito","doi":"10.1109/AINA.2015.229","DOIUrl":"https://doi.org/10.1109/AINA.2015.229","url":null,"abstract":"In many hospitals, data related to patients are observed and collected to a central database for medical research. For instance, DPC dataset, which stands for Disease, Procedure and Combination, covers medical records for more than 7 million patients in more than 1000 hospitals. Using the distributed DPC data set, a number of epidemiological studied are feasible to reveal useful knowledge on medical treatments. Hence, cryptography helps to preserve the privacy of personal data. The study called as Privacy-Preserving Data Mining (PPDM) aims to perform a data mining algorithm with preserving confidentiality of datasets. This paper studies the scalability of privacy-preserving data mining in epidemiological study. As for the data-mining algorithm, we focus to a linear regression since it is used in many applications and simple to be evaluated. We try to identify the linear model to estimate a length of hospital stay from distributed dataset related to the patient and the disease information. Our contributions of this paper include (1) to propose privacy-preserving protocols for linear regression with horizontally or vertically partitioned datasets, and (2) to clarify the limitation of size of problem to be performed. These information are useful to determine the dominant element in PPDM and to figure out the direction of study for further improvement.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"29 1","pages":"510-514"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76550421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Processing and Analytics of Big Data Streams with Yahoo!S4 雅虎大数据流处理与分析S4
F. Xhafa, V. Naranjo, S. Caballé
Many Internet-based applications generate huge data streams, which are known as Big Data Streams. Such applications comprise IoT-based monitoring systems, data analytics from monitoring online learning workspaces and MOOCs, global flight monitoring systems, etc. Differently from Big Data processing in which the data is available in databases, file systems, etc., before processing, in Big Data Streams the data stream is unbounded and it is to be processed as it becomes available. Besides the challenges of processing huge amount of data, the Big Data Stream processing adds further challenges of coping with scalability and high throughput to enable real time decision taking. While for Big Data processing the MapReduce framework has resulted successful, its batch mode processing shows limitations to process Big Data Streams. Therefore there have been proposed alternative frameworks such as Yahoo!S4, Twitter Storm, etc., to Big Data Stream processing. In this paper we implement and evaluate the Yahoo!S4 for Big Data Stream processing and exemplify through the Big Data Stream from global flight monitoring system.
许多基于互联网的应用程序产生巨大的数据流,这被称为大数据流。这些应用包括基于物联网的监测系统、监测在线学习工作空间和mooc的数据分析、全球飞行监测系统等。与大数据处理不同的是,在处理之前,数据在数据库、文件系统等中是可用的,而在大数据流中,数据流是无限的,当数据可用时才进行处理。除了处理大量数据的挑战之外,大数据流处理还增加了应对可扩展性和高吞吐量的挑战,以实现实时决策。虽然MapReduce框架在处理大数据方面取得了成功,但它的批处理模式在处理大数据流方面存在局限性。因此,有人提出了替代框架,如Yahoo!S4、Twitter Storm等,对大数据流进行处理。本文对Yahoo!S4用于大数据流处理,并通过来自全球飞行监控系统的大数据流举例说明。
{"title":"Processing and Analytics of Big Data Streams with Yahoo!S4","authors":"F. Xhafa, V. Naranjo, S. Caballé","doi":"10.1109/AINA.2015.194","DOIUrl":"https://doi.org/10.1109/AINA.2015.194","url":null,"abstract":"Many Internet-based applications generate huge data streams, which are known as Big Data Streams. Such applications comprise IoT-based monitoring systems, data analytics from monitoring online learning workspaces and MOOCs, global flight monitoring systems, etc. Differently from Big Data processing in which the data is available in databases, file systems, etc., before processing, in Big Data Streams the data stream is unbounded and it is to be processed as it becomes available. Besides the challenges of processing huge amount of data, the Big Data Stream processing adds further challenges of coping with scalability and high throughput to enable real time decision taking. While for Big Data processing the MapReduce framework has resulted successful, its batch mode processing shows limitations to process Big Data Streams. Therefore there have been proposed alternative frameworks such as Yahoo!S4, Twitter Storm, etc., to Big Data Stream processing. In this paper we implement and evaluate the Yahoo!S4 for Big Data Stream processing and exemplify through the Big Data Stream from global flight monitoring system.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"51 1","pages":"263-270"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76589970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Survey on Interfaces to Network Security Functions in Network Virtualization 网络虚拟化中网络安全功能接口研究
H. Jang, J. Jeong, Hyoungshick Kim, Jungsoo Park
Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet service providers are trying to define common interfaces for NFV-based security services through the analysis of use cases and related technologies. This activity is currently lead by Internet Engineering Task Force (IETF) that is an international Internet standardization organization.
网络功能虚拟化(NFV)为安全界带来了新的机遇和挑战。与现有的物理网络基础设施不同,在虚拟网络平台中,可以动态部署和维护安全服务,以应对随着时间的推移而增加的复杂网络攻击的威胁。本文调查了许多安全供应商和Internet服务提供商试图通过分析用例和相关技术来定义基于nfv的安全服务的公共接口的活动。这项活动目前由互联网工程任务组(IETF)领导,它是一个国际互联网标准化组织。
{"title":"A Survey on Interfaces to Network Security Functions in Network Virtualization","authors":"H. Jang, J. Jeong, Hyoungshick Kim, Jungsoo Park","doi":"10.1109/WAINA.2015.103","DOIUrl":"https://doi.org/10.1109/WAINA.2015.103","url":null,"abstract":"Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet service providers are trying to define common interfaces for NFV-based security services through the analysis of use cases and related technologies. This activity is currently lead by Internet Engineering Task Force (IETF) that is an international Internet standardization organization.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"160-163"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78320782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN) 软件定义网络(SDN)中可扩展的as间QoS路由体系结构
Murat Karakus, A. Durresi
All new networking architectures come with their own problems. Software Defined Networking (SDN) has its own challenges which are needed to be addressed by researchers as well. One of the crucial problems with SDN is the control plane scalability since it is a bottleneck for its evolution. As the network grows, the number of messages a controller receives also increases. This increase puts the controller scalability in the heart of problems of SDN. In this paper, we propose a hierarchy-based network architecture along with an inter-AS routing approach with QoS. We exploit idea of levels in which networks with controllers reside and a main controller, which works like a broker, is on top of them to keep the global network state and view. Our experiment results indicate that a controller in a hierarchic setting handles 50% less number of traffic than a controller in a non-hierarchic environment.
所有新的网络架构都有自己的问题。软件定义网络(SDN)也有其自身的挑战,需要研究人员加以解决。SDN的关键问题之一是控制平面的可扩展性,因为它是其发展的瓶颈。随着网络的增长,控制器接收到的消息数量也会增加。这种增加使控制器的可扩展性成为SDN的核心问题。在本文中,我们提出了一种基于层次结构的网络架构以及具有QoS的as间路由方法。我们利用了带有控制器的网络所驻留的层次的概念,并且像代理一样工作的主控制器位于它们之上,以保持全局网络状态和视图。我们的实验结果表明,分层设置中的控制器处理的流量比非分层环境中的控制器少50%。
{"title":"A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN)","authors":"Murat Karakus, A. Durresi","doi":"10.1109/AINA.2015.179","DOIUrl":"https://doi.org/10.1109/AINA.2015.179","url":null,"abstract":"All new networking architectures come with their own problems. Software Defined Networking (SDN) has its own challenges which are needed to be addressed by researchers as well. One of the crucial problems with SDN is the control plane scalability since it is a bottleneck for its evolution. As the network grows, the number of messages a controller receives also increases. This increase puts the controller scalability in the heart of problems of SDN. In this paper, we propose a hierarchy-based network architecture along with an inter-AS routing approach with QoS. We exploit idea of levels in which networks with controllers reside and a main controller, which works like a broker, is on top of them to keep the global network state and view. Our experiment results indicate that a controller in a hierarchic setting handles 50% less number of traffic than a controller in a non-hierarchic environment.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"148-154"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78456750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Multi-path TCP in Real-World Setups -- An Evaluation in the NORNET CORE Testbed 多路径TCP在现实世界的设置——在NORNET CORE测试平台的评估
T. Dreibholz, Xing Zhou, Fu Fa
Nowadays, cloud applications are becoming more and more popular. However, in order for such applications to work, they need a stable Internet connectivity. To avoid the Internet access becoming a single point of failure, redundancy by multi-homing -- i.e. Simultaneous access to multiple Internet service providers (ISP) -- is becoming increasingly common as well. Multi-homing leads to the desire to utilise all network attachment points simultaneously, which is e.g. Provided by the Multi-Path TCP (MPTCP) extension for TCP. MPTCP is still under development by researchers and standardisation in the IETF. Particularly, it is necessary to evaluate MPTCP under realistic Internet conditions. NORNET CORE is the world's first, large-scale Internet test bed for multi-homed systems and applications. It is therefore a useful platform for evaluating MPTCP. In this paper, we therefore present our NORNET CORE extension that adds MPTCP support to the test bed. Particularly, our extension is now available to all users of NORNET CORE as well, which significantly reduces the effort of MPTCP researchers to evaluate MPTCP and its improvements. In a proof of concept, we furthermore show the strengths and weaknesses of state-of-the-art MPTCP in NORNET CORE, in a configuration covering 29 ISP connections at 14 sites in 5 different countries.
如今,云应用程序正变得越来越流行。然而,为了使这些应用程序工作,它们需要稳定的互联网连接。为了避免互联网接入成为单点故障,多归巢冗余——即同时访问多个互联网服务提供商(ISP)——也变得越来越普遍。多归巢导致同时利用所有网络附着点的愿望,例如由TCP的多路径TCP (MPTCP)扩展提供。MPTCP仍处于研究人员的开发和IETF的标准化阶段。特别是,有必要在现实的网络条件下对MPTCP进行评估。NORNET CORE是世界上第一个多家庭系统和应用的大型互联网测试平台。因此,它是评估MPTCP的一个有用的平台。因此,在本文中,我们提出了我们的NORNET CORE扩展,该扩展为测试平台增加了MPTCP支持。特别是,我们的扩展现在可供NORNET CORE的所有用户使用,这大大减少了MPTCP研究人员评估MPTCP及其改进的努力。在概念验证中,我们进一步展示了NORNET CORE中最先进的MPTCP的优点和缺点,该配置涵盖了5个不同国家14个站点的29个ISP连接。
{"title":"Multi-path TCP in Real-World Setups -- An Evaluation in the NORNET CORE Testbed","authors":"T. Dreibholz, Xing Zhou, Fu Fa","doi":"10.1109/WAINA.2015.74","DOIUrl":"https://doi.org/10.1109/WAINA.2015.74","url":null,"abstract":"Nowadays, cloud applications are becoming more and more popular. However, in order for such applications to work, they need a stable Internet connectivity. To avoid the Internet access becoming a single point of failure, redundancy by multi-homing -- i.e. Simultaneous access to multiple Internet service providers (ISP) -- is becoming increasingly common as well. Multi-homing leads to the desire to utilise all network attachment points simultaneously, which is e.g. Provided by the Multi-Path TCP (MPTCP) extension for TCP. MPTCP is still under development by researchers and standardisation in the IETF. Particularly, it is necessary to evaluate MPTCP under realistic Internet conditions. NORNET CORE is the world's first, large-scale Internet test bed for multi-homed systems and applications. It is therefore a useful platform for evaluating MPTCP. In this paper, we therefore present our NORNET CORE extension that adds MPTCP support to the test bed. Particularly, our extension is now available to all users of NORNET CORE as well, which significantly reduces the effort of MPTCP researchers to evaluate MPTCP and its improvements. In a proof of concept, we furthermore show the strengths and weaknesses of state-of-the-art MPTCP in NORNET CORE, in a configuration covering 29 ISP connections at 14 sites in 5 different countries.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"617-622"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75254365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing ToR会在“未来互联网”中实现其目标吗?基于云计算的ToR应用实证研究
A. Carnielli, Mahdi Aiash
With the wide development and deployment of mobile devices and gadgets, a larger number of users go online in so many aspects of their daily lives. The challenge is to enjoy the conveniences of online activities while limiting privacy scarifies. In response to the increasing number of online-hacking scandals, mechanisms for protecting users privacy continue to evolve. An example of such mechanisms is the Onion Router (ToR), a free software for enabling online anonymity and resisting censorship. Despite the fact that ToR is a dominant anonymizerin the current Internet, the emergence of new communication and inter-networking trends such as Cloud Computing, Software Defined Networks and Information Centric Networks places a question mark whether ToR will fulfil its promises with these trend of the "Future Internet". This paper aims at answering the question by implementing ToR on a number of Cloud platforms and discussing the security properties of ToR.
随着移动设备和小工具的广泛发展和部署,越来越多的用户在他们日常生活的许多方面上网。我们面临的挑战是,在享受网络活动的便利的同时,限制隐私风险。为了应对越来越多的网络黑客丑闻,保护用户隐私的机制也在不断发展。这种机制的一个例子是洋葱路由器(ToR),这是一个实现在线匿名和抵制审查的免费软件。尽管ToR在当前的互联网中是一个占主导地位的匿名化工具,但云计算、软件定义网络和信息中心网络等新的通信和网络内部趋势的出现,给ToR能否在这些“未来互联网”的趋势中履行其承诺打上了问号。本文旨在通过在多个云平台上实现ToR并讨论ToR的安全特性来回答这个问题。
{"title":"Will ToR Achieve Its Goals in the \"Future Internet\"? An Empirical Study of Using ToR with Cloud Computing","authors":"A. Carnielli, Mahdi Aiash","doi":"10.1109/WAINA.2015.78","DOIUrl":"https://doi.org/10.1109/WAINA.2015.78","url":null,"abstract":"With the wide development and deployment of mobile devices and gadgets, a larger number of users go online in so many aspects of their daily lives. The challenge is to enjoy the conveniences of online activities while limiting privacy scarifies. In response to the increasing number of online-hacking scandals, mechanisms for protecting users privacy continue to evolve. An example of such mechanisms is the Onion Router (ToR), a free software for enabling online anonymity and resisting censorship. Despite the fact that ToR is a dominant anonymizerin the current Internet, the emergence of new communication and inter-networking trends such as Cloud Computing, Software Defined Networks and Information Centric Networks places a question mark whether ToR will fulfil its promises with these trend of the \"Future Internet\". This paper aims at answering the question by implementing ToR on a number of Cloud platforms and discussing the security properties of ToR.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"48 1","pages":"135-140"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74806184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Usable and Secure Crime Reporting System for Technology Resource Constrained Context 技术资源受限环境下可用且安全的犯罪报告系统
A. Sakpere, Anne Kayem, T. Ndlovu
Crime in technology resource constrained environments has been shown to adversely affect economic growth by deterring investment and triggering emigration. To address this secure reporting channels are being investigated to encouraging anonymous crime reporting. In this paper, we present a system (Cry Help App) developed to enable residents of a university community situated in technology resource constrained environment to facilitate secure and covert crime reporting. We focus primarily on the usability of the application. The system was developed on the basis of user centric iterative approach. Deployment and evaluation results of our prototype system demonstrate that overall the system scored a 77.06% usability rating with a standard deviation of 0.05 for contributing scores on System Use, Information Quality and Interface Quality. This is indicative of the fact that users found the system to be very usable.
技术资源受限环境中的犯罪已被证明会通过阻止投资和引发移民而对经济增长产生不利影响。为了解决这个问题,正在调查安全的举报渠道,以鼓励匿名举报犯罪。在本文中,我们提出了一个系统(Cry Help App),该系统旨在使位于技术资源受限环境中的大学社区居民能够方便地安全和隐蔽地报告犯罪。我们主要关注应用程序的可用性。该系统是基于以用户为中心的迭代方法开发的。我们的原型系统的部署和评估结果表明,总体而言,系统在系统使用、信息质量和界面质量方面的贡献得分为77.06%,标准差为0.05。这表明用户发现系统非常有用。
{"title":"A Usable and Secure Crime Reporting System for Technology Resource Constrained Context","authors":"A. Sakpere, Anne Kayem, T. Ndlovu","doi":"10.1109/WAINA.2015.97","DOIUrl":"https://doi.org/10.1109/WAINA.2015.97","url":null,"abstract":"Crime in technology resource constrained environments has been shown to adversely affect economic growth by deterring investment and triggering emigration. To address this secure reporting channels are being investigated to encouraging anonymous crime reporting. In this paper, we present a system (Cry Help App) developed to enable residents of a university community situated in technology resource constrained environment to facilitate secure and covert crime reporting. We focus primarily on the usability of the application. The system was developed on the basis of user centric iterative approach. Deployment and evaluation results of our prototype system demonstrate that overall the system scored a 77.06% usability rating with a standard deviation of 0.05 for contributing scores on System Use, Information Quality and Interface Quality. This is indicative of the fact that users found the system to be very usable.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"110 1","pages":"424-429"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72936235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Investigation of Message Suppression Method Considering TCP in Vehicular-DTN 考虑TCP的车载dtn报文抑制方法研究
S. Ishikawa, Taiki Honda, Makoto Ikeda, L. Barolli
The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In previous work, we proposed a message suppression method for Vehicular-DTN (VDTN) considering UDP traffic. In this paper, we evaluate the proposed method for VDTN considering TCP traffic. The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road side units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in urban scenario. We use the packet delivery ratio, duplicated bundle received and end-to-end delay as evaluation metrics. We can found that our proposed method can reduce the duplicated bundle messages, even if vehicles send a bundle message using TCP to other vehicles. Also, our proposed method have a good performance compared with Epidemic conventional method for all cases.
延迟/中断容忍网络(DTN)旨在为性能较差的大范围网络提供可互操作的通信。在之前的工作中,我们提出了一种考虑UDP流量的车载dtn (VDTN)消息抑制方法。在本文中,我们对考虑TCP流量的VDTN方法进行了评估。两种场景的模拟是考虑障碍物(建筑物),其中存在或不存在带有路边单元(msr)的消息抑制。我们考虑802.11p标准,在城市场景中发送捆绑报文。我们使用包传送率、接收到的重复包和端到端延迟作为评估指标。我们发现,即使车辆使用TCP向其他车辆发送捆绑包消息,我们提出的方法也可以减少重复的捆绑包消息。与传统的流行病方法相比,该方法在所有情况下都具有良好的性能。
{"title":"Investigation of Message Suppression Method Considering TCP in Vehicular-DTN","authors":"S. Ishikawa, Taiki Honda, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2015.60","DOIUrl":"https://doi.org/10.1109/WAINA.2015.60","url":null,"abstract":"The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In previous work, we proposed a message suppression method for Vehicular-DTN (VDTN) considering UDP traffic. In this paper, we evaluate the proposed method for VDTN considering TCP traffic. The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road side units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in urban scenario. We use the packet delivery ratio, duplicated bundle received and end-to-end delay as evaluation metrics. We can found that our proposed method can reduce the duplicated bundle messages, even if vehicles send a bundle message using TCP to other vehicles. Also, our proposed method have a good performance compared with Epidemic conventional method for all cases.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"370-375"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74314918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1