首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Towards Real-Time and Temporal Information Services in Vehicular Networks via Multi-Objective Optimization 基于多目标优化的车载网络实时信息服务
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.117
Penglin Dai, Kai Liu, Liang Feng, Qingfeng Zhuge, V. Lee, S. Son
Real-time and temporal information services are intrinsic characteristics in vehicular networks, where the timeliness of data dissemination and the maintenance of data quality interplay with each other and influence overall system performance. In this work, we present the system architecture where multiple road side units (RSUs) are cooperated to provide information services, and the vehicles can upload up-to-date information to RSUs via vehicle-to-infrastructure (V2I) communication. On this basis, we formulate the distributed temporal data management (DTDM) problem as a two-objective problem, which aims to enhance overall system performance on both the service quality and the service ratio simultaneously. Further, we propose a multiobjective evolutionary algorithm called MO-DTDM to obtain a set of pareto solutions and analyze how to fulfill given requirements on system performance with obtained pareto solutions. Finally, we build the simulation model and give a comprehensive performance evaluation, which demonstrates the superiority of the proposed optimization method.
实时性和时效性信息服务是车载网络的内在特征,数据传播的时效性和数据质量的维护相互作用,影响系统的整体性能。在这项工作中,我们提出了一个系统架构,其中多个路侧单元(rsu)合作提供信息服务,车辆可以通过车对基础设施(V2I)通信将最新信息上传到rsu。在此基础上,我们将分布式时序数据管理(DTDM)问题表述为一个双目标问题,旨在同时提高系统的整体性能,包括服务质量和服务比率。在此基础上,我们提出了一种多目标进化算法MO-DTDM来获取一组pareto解,并分析如何利用得到的pareto解来满足给定的系统性能要求。最后,建立了仿真模型并进行了综合性能评价,验证了所提优化方法的优越性。
{"title":"Towards Real-Time and Temporal Information Services in Vehicular Networks via Multi-Objective Optimization","authors":"Penglin Dai, Kai Liu, Liang Feng, Qingfeng Zhuge, V. Lee, S. Son","doi":"10.1109/LCN.2016.117","DOIUrl":"https://doi.org/10.1109/LCN.2016.117","url":null,"abstract":"Real-time and temporal information services are intrinsic characteristics in vehicular networks, where the timeliness of data dissemination and the maintenance of data quality interplay with each other and influence overall system performance. In this work, we present the system architecture where multiple road side units (RSUs) are cooperated to provide information services, and the vehicles can upload up-to-date information to RSUs via vehicle-to-infrastructure (V2I) communication. On this basis, we formulate the distributed temporal data management (DTDM) problem as a two-objective problem, which aims to enhance overall system performance on both the service quality and the service ratio simultaneously. Further, we propose a multiobjective evolutionary algorithm called MO-DTDM to obtain a set of pareto solutions and analyze how to fulfill given requirements on system performance with obtained pareto solutions. Finally, we build the simulation model and give a comprehensive performance evaluation, which demonstrates the superiority of the proposed optimization method.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"21 1","pages":"671-679"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73048390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anonymization Techniques for Preserving Data Quality in Participatory Sensing 参与式感知中保持数据质量的匿名化技术
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.103
Tishna Sabrina, M. Murshed, Anindya Iqbal
Participatory sensing is a revolutionary new paradigm where citizens voluntarily sense their surroundings using readily available sensing devices such as mobile phones and share this information for mutual benefit of community members. To encourage ample participation of users, ensuring their privacy is inevitable. Existing techniques that attempt to protect location privacy with spatial cloaking suffer from irrecoverable data quality degradation. To the best of our knowledge, very few works provided a solution preserving high data quality/utility at the destination server, however, suffered from unacceptable computational overhead. This paper presents an improved deterministic alternative and also a faster variant by exploiting several optimization issues. Theoretical formulations and extensive simulation results are presented to establish the applicability of our proposed techniques.
参与式感知是一种革命性的新模式,公民使用现成的传感设备(如移动电话)自愿感知周围环境,并为社区成员的共同利益分享这些信息。为了鼓励用户的充分参与,确保他们的隐私是不可避免的。现有试图通过空间隐身保护位置隐私的技术存在不可恢复的数据质量下降问题。据我们所知,很少有工作提供了在目标服务器上保持高数据质量/实用性的解决方案,然而,却遭受了不可接受的计算开销。本文利用几个优化问题,提出了一种改进的确定性替代方案和一种更快的变体。提出了理论公式和广泛的仿真结果,以确定我们提出的技术的适用性。
{"title":"Anonymization Techniques for Preserving Data Quality in Participatory Sensing","authors":"Tishna Sabrina, M. Murshed, Anindya Iqbal","doi":"10.1109/LCN.2016.103","DOIUrl":"https://doi.org/10.1109/LCN.2016.103","url":null,"abstract":"Participatory sensing is a revolutionary new paradigm where citizens voluntarily sense their surroundings using readily available sensing devices such as mobile phones and share this information for mutual benefit of community members. To encourage ample participation of users, ensuring their privacy is inevitable. Existing techniques that attempt to protect location privacy with spatial cloaking suffer from irrecoverable data quality degradation. To the best of our knowledge, very few works provided a solution preserving high data quality/utility at the destination server, however, suffered from unacceptable computational overhead. This paper presents an improved deterministic alternative and also a faster variant by exploiting several optimization issues. Theoretical formulations and extensive simulation results are presented to establish the applicability of our proposed techniques.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"8 1","pages":"607-610"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81530624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Silence Coding for RFID Tag Anti-Collision RFID标签防碰撞的沉默编码
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.111
Ming-Kuei Yeh, Yung-Liang Lai, Jehn-Ruey Jiang
This paper proposes a tree-based RFID tag anti-collision protocol, called the silence coding query tree (SCQT) protocol, based on a novel coding scheme, namely the silence coding, to speed up tag identification. The proposed protocol can identify multiple tags at a time even at the appearance of tag signal collisions. Simulation results show that the SCQT protocol significantly outperforms other related tree-based protocols in terms of the number of cycles to identify tags.
本文提出了一种基于树的RFID标签防碰撞协议,称为静默编码查询树(SCQT)协议,该协议基于一种新颖的编码方案,即静默编码,以提高标签的识别速度。该协议可以在出现标签信号冲突的情况下同时识别多个标签。仿真结果表明,SCQT协议在识别标签的循环次数方面明显优于其他相关的基于树的协议。
{"title":"Silence Coding for RFID Tag Anti-Collision","authors":"Ming-Kuei Yeh, Yung-Liang Lai, Jehn-Ruey Jiang","doi":"10.1109/LCN.2016.111","DOIUrl":"https://doi.org/10.1109/LCN.2016.111","url":null,"abstract":"This paper proposes a tree-based RFID tag anti-collision protocol, called the silence coding query tree (SCQT) protocol, based on a novel coding scheme, namely the silence coding, to speed up tag identification. The proposed protocol can identify multiple tags at a time even at the appearance of tag signal collisions. Simulation results show that the SCQT protocol significantly outperforms other related tree-based protocols in terms of the number of cycles to identify tags.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"1097 1","pages":"240-243"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76732051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TAS-IoT: Trust-Based Adaptive Security in the IoT as -IoT:物联网中基于信任的自适应安全
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.101
Hamed Hellaoui, A. Bouabdallah, M. Koudil
Providing efficient security services in dynamic low-power environments as the Internet of Things (IoT) is a challenging task. The deployment of static security services will consume the energy even if it is not required in some situations, so this induces a waste of resources. In this paper, we introduce an efficient model for adaptive security in the IoT based on trust management. Most of existing adaptive security approaches lack of practical means to evaluate threats. On the other hand, trust management systems are designed to deal with selfish behaviors or internal attacks and not to assist cryptographic measures. Our solution evaluates the trust level related to the presence of security threats among nodes, and adapt consequently cryptographic measures. The obtained simulation results show that our solution reduces considerably energy consumption and remains yet secure.
在物联网(IoT)等动态低功耗环境中提供高效的安全服务是一项具有挑战性的任务。即使在某些情况下不需要,静态安全服务的部署也会消耗能源,因此这会导致资源浪费。本文介绍了一种基于信任管理的物联网自适应安全模型。现有的自适应安全方法大多缺乏评估威胁的实用手段。另一方面,信任管理系统旨在处理自私行为或内部攻击,而不是辅助加密措施。我们的解决方案评估与节点之间存在的安全威胁相关的信任级别,并相应地调整加密措施。仿真结果表明,该方案在保证安全的前提下,大大降低了系统能耗。
{"title":"TAS-IoT: Trust-Based Adaptive Security in the IoT","authors":"Hamed Hellaoui, A. Bouabdallah, M. Koudil","doi":"10.1109/LCN.2016.101","DOIUrl":"https://doi.org/10.1109/LCN.2016.101","url":null,"abstract":"Providing efficient security services in dynamic low-power environments as the Internet of Things (IoT) is a challenging task. The deployment of static security services will consume the energy even if it is not required in some situations, so this induces a waste of resources. In this paper, we introduce an efficient model for adaptive security in the IoT based on trust management. Most of existing adaptive security approaches lack of practical means to evaluate threats. On the other hand, trust management systems are designed to deal with selfish behaviors or internal attacks and not to assist cryptographic measures. Our solution evaluates the trust level related to the presence of security threats among nodes, and adapt consequently cryptographic measures. The obtained simulation results show that our solution reduces considerably energy consumption and remains yet secure.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"51 12 1","pages":"599-602"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76889250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Improving the Fairness of Alternative Backoff with ECN (ABE) 利用ECN (ABE)提高可选退让的公平性
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.19
Naeem Khademi, M. Welzl, G. Armitage, S. Gjessing
Explicit Congestion Notification (ECN) lets a bottleneck's Active Queue Management (AQM) mechanism inform an endpoint about congestion without having to drop a packet. A recently proposed sender-side modification called Alternative Backoff with ECN (ABE) enables reduced latency while maintaining good utilization with ECN. However, under certain circumstances ABE can produce a degree of unfair behavior between ABE-enabled TCP senders and conventional TCP senders. We propose specific guidance for configuring bottleneck AQMs to assist in fairness between ABE-enabled and conventional TCP flows. We evaluate our proposal using RED, then describe how it can be applied to other AQM mechanisms and incrementally introduced into the Internet.
显式拥塞通知(ECN)允许瓶颈的活动队列管理(AQM)机制通知端点有关拥塞的信息,而不必丢弃数据包。最近提出的一种名为ECN的备选回退(ABE)的发送端修改可以减少延迟,同时保持ECN的良好利用率。然而,在某些情况下,ABE可能会在启用ABE的TCP发送方和传统TCP发送方之间产生一定程度的不公平行为。我们提出了配置瓶颈aqm的具体指导,以帮助实现启用abe和传统TCP流之间的公平性。我们使用RED评估我们的建议,然后描述如何将其应用于其他AQM机制并逐步引入Internet。
{"title":"Improving the Fairness of Alternative Backoff with ECN (ABE)","authors":"Naeem Khademi, M. Welzl, G. Armitage, S. Gjessing","doi":"10.1109/LCN.2016.19","DOIUrl":"https://doi.org/10.1109/LCN.2016.19","url":null,"abstract":"Explicit Congestion Notification (ECN) lets a bottleneck's Active Queue Management (AQM) mechanism inform an endpoint about congestion without having to drop a packet. A recently proposed sender-side modification called Alternative Backoff with ECN (ABE) enables reduced latency while maintaining good utilization with ECN. However, under certain circumstances ABE can produce a degree of unfair behavior between ABE-enabled TCP senders and conventional TCP senders. We propose specific guidance for configuring bottleneck AQMs to assist in fairness between ABE-enabled and conventional TCP flows. We evaluate our proposal using RED, then describe how it can be applied to other AQM mechanisms and incrementally introduced into the Internet.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"4 1","pages":"78-86"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78579413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Concurrent IEEE 802.11 Systems in the Automotive Domain 汽车领域并发IEEE 802.11系统的性能评估
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.115
A. Mourad, F. Heigl, P. Hoeher
Wireless systems have migrated into the automotive domain very fast in the recent years. Car passengers expect to have seamless integration of their consumer electronic devices in their cars. IEEE 802.11 systems are popular for entertainment services inside the car, however due to the fact that IEEE 802.11 use the unlicensed industrial, scientific and medical (ISM) radio bands, the wireless coexistence problem will lead to dramatic decrease of throughput. This can affect the performance of different applications in cars. This paper presents both test drives and measurements in the lab. The target is to have an impression on the influence of the surrounding systems on 802.11 systems inside the cars. The results show that the WLAN signals from the surrounding strongly affect the throughput of the systems inside the cars. A throughput drop by 80% compared to maximum was observed in one test drive in the city center.
近年来,无线系统以极快的速度进入汽车领域。汽车乘客希望将他们的消费电子设备无缝集成到他们的汽车中。IEEE 802.11系统在车载娱乐服务中很受欢迎,但由于IEEE 802.11使用未经许可的工业、科学和医疗(ISM)无线电频段,无线共存问题将导致吞吐量急剧下降。这可能会影响汽车中不同应用程序的性能。本文介绍了测试驱动和实验室测量。目标是了解周围系统对车内802.11系统的影响。结果表明,来自周围环境的无线局域网信号对车内系统的吞吐量有很大影响。与最大值相比,在市中心的一次试驾中观察到吞吐量下降了80%。
{"title":"Performance Evaluation of Concurrent IEEE 802.11 Systems in the Automotive Domain","authors":"A. Mourad, F. Heigl, P. Hoeher","doi":"10.1109/LCN.2016.115","DOIUrl":"https://doi.org/10.1109/LCN.2016.115","url":null,"abstract":"Wireless systems have migrated into the automotive domain very fast in the recent years. Car passengers expect to have seamless integration of their consumer electronic devices in their cars. IEEE 802.11 systems are popular for entertainment services inside the car, however due to the fact that IEEE 802.11 use the unlicensed industrial, scientific and medical (ISM) radio bands, the wireless coexistence problem will lead to dramatic decrease of throughput. This can affect the performance of different applications in cars. This paper presents both test drives and measurements in the lab. The target is to have an impression on the influence of the surrounding systems on 802.11 systems inside the cars. The results show that the WLAN signals from the surrounding strongly affect the throughput of the systems inside the cars. A throughput drop by 80% compared to maximum was observed in one test drive in the city center.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"29 1 1","pages":"655-661"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77913690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid Approach for Mobile Couriers Election in Smart-Cities 智能城市中移动快递员选举的混合方法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.79
F. Al-turjman
In this paper we propose a hybrid heuristic approach for public data delivery under ultra-large-scale smart-city settings. In this approach, public transportation vehicles are going into election process to be utilized as Mobile Couriers (MCs) that read public Access Points (APs) data loads and relay it back to a central processing base-station. We also introduce a cost-based fitness function for the MCs election in the smart-city project which forms a real implementation for the Internet of Things (IoT) paradigm. Our cost-based function considers mobile resource limitations in terms count, storage and energy. Extensive simulations are performed and the results confirm the effectiveness of the proposed approach in comparison to other heuristic approaches with identical objectives.
在本文中,我们提出了一种混合启发式方法,用于超大规模智慧城市环境下的公共数据交付。在这种方法中,公共交通工具进入选举过程,被用作移动信使(mc),读取公共接入点(ap)的数据负载,并将其中继回中央处理基站。我们还为智慧城市项目中的mc选举引入了基于成本的适应度函数,从而形成了物联网(IoT)范式的真正实现。我们基于成本的函数考虑了移动资源在数量、存储和能量方面的限制。进行了大量的仿真,结果证实了所提出的方法与具有相同目标的其他启发式方法的有效性。
{"title":"Hybrid Approach for Mobile Couriers Election in Smart-Cities","authors":"F. Al-turjman","doi":"10.1109/LCN.2016.79","DOIUrl":"https://doi.org/10.1109/LCN.2016.79","url":null,"abstract":"In this paper we propose a hybrid heuristic approach for public data delivery under ultra-large-scale smart-city settings. In this approach, public transportation vehicles are going into election process to be utilized as Mobile Couriers (MCs) that read public Access Points (APs) data loads and relay it back to a central processing base-station. We also introduce a cost-based fitness function for the MCs election in the smart-city project which forms a real implementation for the Internet of Things (IoT) paradigm. Our cost-based function considers mobile resource limitations in terms count, storage and energy. Extensive simulations are performed and the results confirm the effectiveness of the proposed approach in comparison to other heuristic approaches with identical objectives.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"6 1","pages":"507-510"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76046261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
ANOTEL: Cellular Networks with Location Privacy 带位置隐私的蜂窝网络
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.110
Tim Dittler, Florian Tschorsch, S. Dietzel, B. Scheuermann
While location management is a key component of cellular networks, it is also a major privacy issue: location management empowers the network operator to track users. In today's public and scientific discussion, the centralized storage of location data is mostly taken as a fact, and users are expected to trust the network operator. With ANOTEL we present a novel, clean-slate approach of location management in cellular networks that challenges this assumption. The design is able to route calls to users who move through cellular networks, without violating their location privacy.
虽然位置管理是蜂窝网络的关键组成部分,但它也是一个主要的隐私问题:位置管理使网络运营商能够跟踪用户。在公众和科学讨论的今天,位置数据的集中存储大多被视为事实,并期望用户信任网络运营商。通过ANOTEL,我们提出了一种新颖的、全新的蜂窝网络位置管理方法,挑战了这一假设。这种设计能够将呼叫路由到通过蜂窝网络移动的用户,而不会侵犯他们的位置隐私。
{"title":"ANOTEL: Cellular Networks with Location Privacy","authors":"Tim Dittler, Florian Tschorsch, S. Dietzel, B. Scheuermann","doi":"10.1109/LCN.2016.110","DOIUrl":"https://doi.org/10.1109/LCN.2016.110","url":null,"abstract":"While location management is a key component of cellular networks, it is also a major privacy issue: location management empowers the network operator to track users. In today's public and scientific discussion, the centralized storage of location data is mostly taken as a fact, and users are expected to trust the network operator. With ANOTEL we present a novel, clean-slate approach of location management in cellular networks that challenges this assumption. The design is able to route calls to users who move through cellular networks, without violating their location privacy.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"69 1","pages":"635-638"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86440536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks 软件定义网络中端到端服务安全体系结构的设计与实现
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.82
K. Karmakar, V. Varadharajan, U. Tupakula
In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies in the SDN Controller is described.
在本文中,我们提出了一种策略驱动的安全架构,用于跨多个自治域的SDN环境保护端到端服务。我们开发了一种基于语言的方法来设计一系列与SDN服务和通信相关的安全策略。介绍了一种基于SDN控制器中指定的安全策略实现报文安全路由的安全架构设计。
{"title":"On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks","authors":"K. Karmakar, V. Varadharajan, U. Tupakula","doi":"10.1109/LCN.2016.82","DOIUrl":"https://doi.org/10.1109/LCN.2016.82","url":null,"abstract":"In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies in the SDN Controller is described.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"60 1","pages":"519-522"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90214164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Of Strategies and Structures: Motif-Based Fingerprinting Analysis of Online Reputation Networks 策略与结构:基于主题的在线声誉网络指纹分析
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.76
M. Wichtlhuber, Sebastian Bücker, R. Kluge, Mahdi Mousavi, D. Hausheer
Reputation networks are an important building block of distributed systems whenever reliability of nodes is an issue. However, reputation ratings can easily be undercut: colluding nodes can spread good ratings for each other while third parties are hardly able to detect the fraud. There is strong analytical evidence that reputation networks cannot be constructed in a way to guarantee security. Consequently, only statistical approaches are promising. This work pursues a statistical approach inspired by the idea that colluding node's behavior changes the local structure of a reputation network. To measure these structural changes, we extend a graph analysis method originating from molecular biology and combine it with a machine learning approach to analyze fingerprints of node's interactions. We evaluate our method using an adaptive Peer-to-Peer (P2P) streaming system and show that a correct classification of up to 98% is possible.
当节点的可靠性成为一个问题时,信誉网络是分布式系统的重要组成部分。然而,信誉评级很容易被削弱:串通的节点可以互相传播良好的评级,而第三方几乎无法检测到欺诈行为。有强有力的分析证据表明,信誉网络不能以保证安全的方式构建。因此,只有统计方法才有希望。这项工作采用了一种统计方法,其灵感来自于串通节点的行为改变了声誉网络的局部结构。为了测量这些结构变化,我们扩展了源自分子生物学的图分析方法,并将其与机器学习方法相结合来分析节点相互作用的指纹。我们使用自适应点对点(P2P)流系统评估了我们的方法,并表明正确分类率高达98%是可能的。
{"title":"Of Strategies and Structures: Motif-Based Fingerprinting Analysis of Online Reputation Networks","authors":"M. Wichtlhuber, Sebastian Bücker, R. Kluge, Mahdi Mousavi, D. Hausheer","doi":"10.1109/LCN.2016.76","DOIUrl":"https://doi.org/10.1109/LCN.2016.76","url":null,"abstract":"Reputation networks are an important building block of distributed systems whenever reliability of nodes is an issue. However, reputation ratings can easily be undercut: colluding nodes can spread good ratings for each other while third parties are hardly able to detect the fraud. There is strong analytical evidence that reputation networks cannot be constructed in a way to guarantee security. Consequently, only statistical approaches are promising. This work pursues a statistical approach inspired by the idea that colluding node's behavior changes the local structure of a reputation network. To measure these structural changes, we extend a graph analysis method originating from molecular biology and combine it with a machine learning approach to analyze fingerprints of node's interactions. We evaluate our method using an adaptive Peer-to-Peer (P2P) streaming system and show that a correct classification of up to 98% is possible.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"220 ","pages":"469-476"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91449631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1