首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Adding a Network Coding Extension to CoAP for Large Resource Transfer 为CoAP增加网络编码扩展,实现大资源传输
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.122
Bertram Schütz, N. Aschenbruck
This paper presents a smooth way to include Network Coding in the Constrained Application Protocol (CoAP) for large resource transmissions. Devices in the Internet of Things usually communicate using short messages with little data. In some cases, for example, requesting firmware updates, bigger resources need to be transferred. CoAP's recently finalized blockwise transfer scheme can handle large resources, but is not efficient in lossy environments. Network Coding has proven to be more error resistant. This paper demonstrates the limitations of CoAP's existing blockwise transfer scheme and presents a new approach, based on Network Coding. The evaluation compares CoAP's regular blockwise transfer to the new Network Coding extension. Measurements on an implemented client-server application with simulated losses and delay, confirm the benefits of the extension, resulting in reduced transfer durations.
本文提出了一种将网络编码纳入约束应用协议(CoAP)的方法,用于大型资源传输。物联网中的设备通常使用很少数据的短消息进行通信。在某些情况下,例如,请求固件更新,需要传输更大的资源。CoAP最近完成的块传输方案可以处理大量资源,但在有损环境中效率不高。网络编码已被证明具有更强的抗错误性。本文论证了CoAP现有分组传输方案的局限性,提出了一种基于网络编码的新方法。评估比较了CoAP的常规块传输与新的网络编码扩展。对已实现的客户机-服务器应用程序进行测量,模拟损失和延迟,确认了扩展的好处,从而减少了传输持续时间。
{"title":"Adding a Network Coding Extension to CoAP for Large Resource Transfer","authors":"Bertram Schütz, N. Aschenbruck","doi":"10.1109/LCN.2016.122","DOIUrl":"https://doi.org/10.1109/LCN.2016.122","url":null,"abstract":"This paper presents a smooth way to include Network Coding in the Constrained Application Protocol (CoAP) for large resource transmissions. Devices in the Internet of Things usually communicate using short messages with little data. In some cases, for example, requesting firmware updates, bigger resources need to be transferred. CoAP's recently finalized blockwise transfer scheme can handle large resources, but is not efficient in lossy environments. Network Coding has proven to be more error resistant. This paper demonstrates the limitations of CoAP's existing blockwise transfer scheme and presents a new approach, based on Network Coding. The evaluation compares CoAP's regular blockwise transfer to the new Network Coding extension. Measurements on an implemented client-server application with simulated losses and delay, confirm the benefits of the extension, resulting in reduced transfer durations.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"6 1","pages":"715-722"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91277896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
100 Gbit/s End-to-End Communication: Designing Scalable Protocols with Soft Real-Time Stream Processing 100gbit /s端到端通信:设计具有软实时流处理的可扩展协议
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.25
Steffen Büchner, L. Lopacinski, J. Nolte, R. Kraemer
With the recent roll-out of 100 Gbit Ethernet technology for high-performance computing applications and the technology for 100 Gbit wireless communication emerging on the horizon, it is just a matter of time until non-high performance computing applications will have to utilize these data rates. Since 10 Gbit/s protocol processing is already challenging for current server machines and simply upscaling the computing resources is no solution, new approaches are needed. In this paper, we present a stream processing based design approach for scalable communication protocols. The stream processing paradigm enables us to adapt the communication protocol processing for a certain hardware configuration without touching the protocol's implementation. We use this design technique to develop a prototype communication protocol for ultra-high throughput applications and we demonstrate how to adapt the protocol processing for a Stable Throughput as well as for a Low Latency scenario. Last but not least, we present the evaluation results of the experiments, which show that the measured throughput respectively latency of the adapted protocol, scales nearly linear with the number of provided interfaces.
随着最近推出的用于高性能计算应用的100 Gbit以太网技术和100 Gbit无线通信技术的出现,非高性能计算应用必须利用这些数据速率只是时间问题。由于10gbit /s协议处理对于当前的服务器机器来说已经具有挑战性,简单地升级计算资源并不是解决方案,因此需要新的方法。本文提出了一种基于流处理的可扩展通信协议设计方法。流处理范例使我们能够在不触及协议实现的情况下为特定的硬件配置调整通信协议处理。我们使用这种设计技术为超高吞吐量应用程序开发了一个原型通信协议,并演示了如何为稳定吞吐量和低延迟场景调整协议处理。最后,我们给出了实验的评估结果,结果表明该协议的测量吞吐量和延迟与提供的接口数量呈线性关系。
{"title":"100 Gbit/s End-to-End Communication: Designing Scalable Protocols with Soft Real-Time Stream Processing","authors":"Steffen Büchner, L. Lopacinski, J. Nolte, R. Kraemer","doi":"10.1109/LCN.2016.25","DOIUrl":"https://doi.org/10.1109/LCN.2016.25","url":null,"abstract":"With the recent roll-out of 100 Gbit Ethernet technology for high-performance computing applications and the technology for 100 Gbit wireless communication emerging on the horizon, it is just a matter of time until non-high performance computing applications will have to utilize these data rates. Since 10 Gbit/s protocol processing is already challenging for current server machines and simply upscaling the computing resources is no solution, new approaches are needed. In this paper, we present a stream processing based design approach for scalable communication protocols. The stream processing paradigm enables us to adapt the communication protocol processing for a certain hardware configuration without touching the protocol's implementation. We use this design technique to develop a prototype communication protocol for ultra-high throughput applications and we demonstrate how to adapt the protocol processing for a Stable Throughput as well as for a Low Latency scenario. Last but not least, we present the evaluation results of the experiments, which show that the measured throughput respectively latency of the adapted protocol, scales nearly linear with the number of provided interfaces.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"78 1","pages":"129-137"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90217339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PSCAN: A Port Scanning Network Covert Channel PSCAN:端口扫描网络隐蔽通道
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.109
E. E. Mohamed, A. B. Mnaouer, E. Barka
This paper introduces PSCAN, a port scanning-based network covert channel that violates non-discretionary system security policy that does not allow data transfer from a given process (the sender) to another given process (the receiver). Using PSCAN, the sender opens and closes network ports in a way that encodes covert data. The receiver performs a synchronized port scanning procedure on the sender's host to determine which ports are open and which ones are closed then decodes the data. The paper defines the covert channel and analyzes its data rate, stealthiness, and robustness. In addition, the paper investigates countermeasures against the channel.
本文介绍了一种基于端口扫描的网络隐蔽通道PSCAN,它违反了不允许数据从一个给定进程(发送方)传输到另一个给定进程(接收方)的非任意系统安全策略。使用PSCAN,发送方以一种对隐蔽数据进行编码的方式打开和关闭网络端口。接收方在发送方主机上执行同步端口扫描过程,以确定哪些端口是打开的,哪些端口是关闭的,然后解码数据。定义了隐蔽信道,分析了隐蔽信道的数据速率、隐蔽性和鲁棒性。此外,本文还探讨了应对渠道的对策。
{"title":"PSCAN: A Port Scanning Network Covert Channel","authors":"E. E. Mohamed, A. B. Mnaouer, E. Barka","doi":"10.1109/LCN.2016.109","DOIUrl":"https://doi.org/10.1109/LCN.2016.109","url":null,"abstract":"This paper introduces PSCAN, a port scanning-based network covert channel that violates non-discretionary system security policy that does not allow data transfer from a given process (the sender) to another given process (the receiver). Using PSCAN, the sender opens and closes network ports in a way that encodes covert data. The receiver performs a synchronized port scanning procedure on the sender's host to determine which ports are open and which ones are closed then decodes the data. The paper defines the covert channel and analyzes its data rate, stealthiness, and robustness. In addition, the paper investigates countermeasures against the channel.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"72 1","pages":"631-634"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86288196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Context Aware Multi-Rate Control in Densely Deployed IEEE802.11 WLAN for Avoiding Performance Anomaly 在密集部署的IEEE802.11无线局域网中实现上下文感知多速率控制,避免性能异常
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.64
N. Kumatani, M. Isomura, T. Murase, M. Oguchi, S. Sagari, A. Baid, I. Seskar, D. Raychaudhuri
In this paper, QoS characteristics such as TCP throughput is investigated for densely deployed mobile wireless LANs (WLANs). Factors affecting throughput characteristics are discussed and evaluated by using real machines such as smartphones and portable APs. In IEEE 802.11 WLANs, a rate adaptation mechanism controls the transmission rate and one of the dominant factors for QoS. In order to understand the behavior of the rate adaptation control, 1 to 18 sets mobile WLANs are examined under different parameters. Since a behavior of the rate adaptation control is a vender specific one and it strongly depends on interference, signal strength and etc., the real terminals such as smartphones were used in the experiments. Performance anomaly drastically reduces the throughput not only in the WLAN which has a terminal with low transmission rate but also in the neighboring WLANs that share the same channel. In order to avoid unnecessary transmission rate degradation by the rate adaptation control, Context Aware multi Rate Control (CARC) is proposed and evaluated. In CARC, Turning the rate adaptation control on/off is controlled according to a context, for example, signal strength. The evaluation results show that the CARC can be cost-effectively implemented and improves the throughput performance of whole WLANs by 3.5 times than that without the application of CARC.
本文研究了密集部署的移动无线局域网(wlan)的QoS特性,如TCP吞吐量。通过使用智能手机和便携式ap等真实机器,讨论和评估了影响吞吐量特性的因素。在IEEE 802.11 wlan中,速率自适应机制控制传输速率和QoS的主要因素之一。为了了解速率自适应控制的行为,对1 ~ 18组移动无线局域网在不同参数下进行了研究。由于速率自适应控制的行为是厂商特有的,并且对干扰、信号强度等有很大的依赖性,所以实验采用的是智能手机等真实终端。性能异常不仅会使终端传输速率较低的无线局域网的吞吐量急剧下降,而且会使共享同一信道的相邻无线局域网的吞吐量急剧下降。为了避免速率自适应控制带来的不必要的传输速率下降,提出并评估了上下文感知多速率控制(CARC)。在CARC中,速率自适应控制的打开/关闭是根据上下文控制的,例如,信号强度。评估结果表明,CARC可以经济有效地实现,整个wlan的吞吐量性能比不应用CARC提高3.5倍。
{"title":"Context Aware Multi-Rate Control in Densely Deployed IEEE802.11 WLAN for Avoiding Performance Anomaly","authors":"N. Kumatani, M. Isomura, T. Murase, M. Oguchi, S. Sagari, A. Baid, I. Seskar, D. Raychaudhuri","doi":"10.1109/LCN.2016.64","DOIUrl":"https://doi.org/10.1109/LCN.2016.64","url":null,"abstract":"In this paper, QoS characteristics such as TCP throughput is investigated for densely deployed mobile wireless LANs (WLANs). Factors affecting throughput characteristics are discussed and evaluated by using real machines such as smartphones and portable APs. In IEEE 802.11 WLANs, a rate adaptation mechanism controls the transmission rate and one of the dominant factors for QoS. In order to understand the behavior of the rate adaptation control, 1 to 18 sets mobile WLANs are examined under different parameters. Since a behavior of the rate adaptation control is a vender specific one and it strongly depends on interference, signal strength and etc., the real terminals such as smartphones were used in the experiments. Performance anomaly drastically reduces the throughput not only in the WLAN which has a terminal with low transmission rate but also in the neighboring WLANs that share the same channel. In order to avoid unnecessary transmission rate degradation by the rate adaptation control, Context Aware multi Rate Control (CARC) is proposed and evaluated. In CARC, Turning the rate adaptation control on/off is controlled according to a context, for example, signal strength. The evaluation results show that the CARC can be cost-effectively implemented and improves the throughput performance of whole WLANs by 3.5 times than that without the application of CARC.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"363-370"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90138627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol 我是爱丽丝,我在仙境:安全位置证明生成和验证协议
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.126
C. Javali, G. Revadigar, Kasper Bonne Rasmussen, Wen Hu, Sanjay Jha
In recent years, the proliferation of wireless devices has contributed to the emergence of new set of applications termed as Location Based Services (LBS). LBS provide privileges to mobile users based on their proximity to a facility. In order to gain benefits, users may lie or falsely claim their location. Hence, it is essential to verify the legitimacy of users. In this paper, we propose our novel solution for generating location proof for mobile users and verification of the location claim by application services. Our protocol exploits unique Wi-Fi signal characteristics and employs an information theoretically secure fuzzy vault scheme. We provide a detailed theoretical and experimental evaluation of our protocol. Our solution is faster by an order of magnitude, and the performance of our scheme is independent of the location tag size and distance between the mobile user and location proof provider compared to the state-of-the-art.
近年来,无线设备的激增促成了一系列新的应用程序的出现,这些应用程序被称为基于位置的服务(LBS)。LBS为移动用户提供的特权是基于他们离设施的远近。为了获得利益,用户可能会撒谎或谎报自己的位置。因此,必须验证用户的合法性。在本文中,我们提出了一种新的解决方案,用于为移动用户生成位置证明并通过应用程序服务验证位置声明。我们的协议利用独特的Wi-Fi信号特性,并采用信息理论上安全的模糊保险库方案。我们提供了详细的理论和实验评估我们的方案。我们的解决方案速度快了一个数量级,并且与最先进的方案相比,我们的方案的性能与位置标签大小和移动用户与位置证明提供者之间的距离无关。
{"title":"I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol","authors":"C. Javali, G. Revadigar, Kasper Bonne Rasmussen, Wen Hu, Sanjay Jha","doi":"10.1109/LCN.2016.126","DOIUrl":"https://doi.org/10.1109/LCN.2016.126","url":null,"abstract":"In recent years, the proliferation of wireless devices has contributed to the emergence of new set of applications termed as Location Based Services (LBS). LBS provide privileges to mobile users based on their proximity to a facility. In order to gain benefits, users may lie or falsely claim their location. Hence, it is essential to verify the legitimacy of users. In this paper, we propose our novel solution for generating location proof for mobile users and verification of the location claim by application services. Our protocol exploits unique Wi-Fi signal characteristics and employs an information theoretically secure fuzzy vault scheme. We provide a detailed theoretical and experimental evaluation of our protocol. Our solution is faster by an order of magnitude, and the performance of our scheme is independent of the location tag size and distance between the mobile user and location proof provider compared to the state-of-the-art.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"50 1","pages":"477-485"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79670239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed Approach 辅助包过滤冲突解决:一种迭代松弛方法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.15
A. Yazidi, A. Bouhoula
With the dramatic growth of network attacks, a new set of challenges has raised in the field of electronic security. Undoubtedly, firewalls are core elements in the network security architecture. However, firewalls may include policy anomalies resulting in critical network vulnerabilities. A substantial step towards ensuring network security is resolving packet filter conflicts. Numerous studies have investigated the discovery and analysis of filtering rules anomalies. However, no such emphasis was given to the resolution of these anomalies. Legacy work for correcting anomalies operate with the premise of creating totally disjunctive rules. Unfortunately, such solutions are impractical from implementation point of view as they lead to an explosion of the number of firewall rules. In this paper, we present a new approach for performing assisted corrective actions, which in contrast to the-state-of-the-art family of radically disjunctive approaches, does not lead to a prohibitive increase of the firewall size. In this sense, we allow relaxation in the correction process by clearly distinguishing between constructive anomalies that can be tolerated and destructive anomalies that should be systematically fixed. This distinction between constructive and destructive anomalies is assisted by the network administrator which supports the fact that he has a major role in the heart of the corrective process. To the best of our knowledge, such assisted approach for relaxed resolution of packet filter conflicts was not investigated before. We provide theoretical analysis that demonstrate that our scheme results is sound and indeed result into a conflict-free policy. In addition, we have implemented our solution in a user friendly tool.
随着网络攻击的急剧增长,对电子安全领域提出了一系列新的挑战。毫无疑问,防火墙是网络安全体系结构中的核心元素。但是,防火墙可能包含导致关键网络漏洞的策略异常。确保网络安全的一个重要步骤是解决包过滤器冲突。大量的研究对过滤规则异常的发现和分析进行了研究。然而,对这些异常现象的解决却没有给予这样的重视。纠正异常的遗留工作以创建完全析取规则为前提。不幸的是,从实现的角度来看,这种解决方案是不切实际的,因为它们会导致防火墙规则数量的激增。在本文中,我们提出了一种执行辅助纠正措施的新方法,与最先进的根本分离方法相比,它不会导致防火墙大小的禁忌性增加。从这个意义上说,我们允许在纠正过程中放松,通过清楚地区分可以容忍的建设性异常和应该系统地修复的破坏性异常。这种建设性和破坏性异常之间的区别是由网络管理员协助的,这支持了他在纠正过程的核心中起主要作用的事实。据我们所知,这种辅助的轻松解决包过滤器冲突的方法以前没有研究过。我们提供了理论分析,证明我们的方案结果是合理的,确实导致了一个无冲突的政策。此外,我们已经在一个用户友好的工具中实现了我们的解决方案。
{"title":"On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed Approach","authors":"A. Yazidi, A. Bouhoula","doi":"10.1109/LCN.2016.15","DOIUrl":"https://doi.org/10.1109/LCN.2016.15","url":null,"abstract":"With the dramatic growth of network attacks, a new set of challenges has raised in the field of electronic security. Undoubtedly, firewalls are core elements in the network security architecture. However, firewalls may include policy anomalies resulting in critical network vulnerabilities. A substantial step towards ensuring network security is resolving packet filter conflicts. Numerous studies have investigated the discovery and analysis of filtering rules anomalies. However, no such emphasis was given to the resolution of these anomalies. Legacy work for correcting anomalies operate with the premise of creating totally disjunctive rules. Unfortunately, such solutions are impractical from implementation point of view as they lead to an explosion of the number of firewall rules. In this paper, we present a new approach for performing assisted corrective actions, which in contrast to the-state-of-the-art family of radically disjunctive approaches, does not lead to a prohibitive increase of the firewall size. In this sense, we allow relaxation in the correction process by clearly distinguishing between constructive anomalies that can be tolerated and destructive anomalies that should be systematically fixed. This distinction between constructive and destructive anomalies is assisted by the network administrator which supports the fact that he has a major role in the heart of the corrective process. To the best of our knowledge, such assisted approach for relaxed resolution of packet filter conflicts was not investigated before. We provide theoretical analysis that demonstrate that our scheme results is sound and indeed result into a conflict-free policy. In addition, we have implemented our solution in a user friendly tool.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"117 1","pages":"35-42"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88423566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient MAC Layer Packet Fragmentation Scheme with Priority Queuing for Real-Time Video Streaming 基于优先级排队的实时视频流高效MAC层分组分片方案
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.18
B. Shin, Jalil Abdullayev, Dongman Lee
This paper proposes a novel priority-aware packet fragmentation extension to high throughput WLANs such as IEEE 802.11n for streaming of H264/AVC encoded videos. Unlike existing fragmentation schemes, the proposed scheme fragments IP packets based on the priority of video packets and the characteristics of MPEG-2 TS, where the original IP packet is fragmented into smaller IP packets containing fewer TS packets and prioritizes individual TS packets, allocated to an appropriate priority queue. The proposed scheme is evaluated on a testbed with various network congestion levels and channel conditions. The results show that the proposed scheme achieves higher quality of the streaming video in terms of PSNR than existing schemes as the network congestion level and the bit error rate increase.
本文提出了一种新的优先级感知数据包分片扩展,用于高吞吐量wlan(如IEEE 802.11n)的H264/AVC编码视频流。与现有的分片方案不同,该方案根据视频数据包的优先级和MPEG-2 TS的特性对IP数据包进行分片,其中原始IP数据包被分片为包含较少TS数据包的更小的IP数据包,并对单个TS数据包进行优先级排序,分配到适当的优先级队列。在不同的网络拥塞程度和信道条件下对该方案进行了测试。结果表明,随着网络拥塞程度和误码率的增加,所提方案在PSNR方面比现有方案获得了更高的流视频质量。
{"title":"An Efficient MAC Layer Packet Fragmentation Scheme with Priority Queuing for Real-Time Video Streaming","authors":"B. Shin, Jalil Abdullayev, Dongman Lee","doi":"10.1109/LCN.2016.18","DOIUrl":"https://doi.org/10.1109/LCN.2016.18","url":null,"abstract":"This paper proposes a novel priority-aware packet fragmentation extension to high throughput WLANs such as IEEE 802.11n for streaming of H264/AVC encoded videos. Unlike existing fragmentation schemes, the proposed scheme fragments IP packets based on the priority of video packets and the characteristics of MPEG-2 TS, where the original IP packet is fragmented into smaller IP packets containing fewer TS packets and prioritizes individual TS packets, allocated to an appropriate priority queue. The proposed scheme is evaluated on a testbed with various network congestion levels and channel conditions. The results show that the proposed scheme achieves higher quality of the streaming video in terms of PSNR than existing schemes as the network congestion level and the bit error rate increase.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"46 1","pages":"69-77"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80739226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rapid Deployment Indoor Localization without Prior Human Participation 无需事先人工参与的快速部署室内定位
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.89
Han Xu, Zimu Zhou, Longfei Shangguan
In this work, we propose RAD, a RApid Deployment localization framework without human sampling. The basic idea of RAD is to automatically generate a fingerprint database through space partition, of which each cell is fingerprinted by its maximum influence APs. Based on this robust location indicator, fine-grained localization can be achieved by a discretized particle filter utilizing sensor data fusion. We devise techniques for CIVD-based field division, graph-based particle filter, EM-based individual character learning, and build a prototype that runs on commodity devices. Extensive experiments show that RAD provides a comparable performance to the state-of-the-art RSS-based methods while relieving it of prior human participation.
在这项工作中,我们提出了RAD,一种不需要人工采样的快速部署定位框架。RAD的基本思想是通过空间分区自动生成指纹数据库,每个单元格按其最大影响ap进行指纹识别。基于该鲁棒定位指标,利用传感器数据融合的离散化粒子滤波实现细粒度定位。我们设计了基于civd的领域划分、基于图形的粒子过滤、基于em的个人字符学习等技术,并构建了在商品设备上运行的原型。大量的实验表明,RAD提供了与最先进的基于rss的方法相当的性能,同时减轻了先前的人类参与。
{"title":"Rapid Deployment Indoor Localization without Prior Human Participation","authors":"Han Xu, Zimu Zhou, Longfei Shangguan","doi":"10.1109/LCN.2016.89","DOIUrl":"https://doi.org/10.1109/LCN.2016.89","url":null,"abstract":"In this work, we propose RAD, a RApid Deployment localization framework without human sampling. The basic idea of RAD is to automatically generate a fingerprint database through space partition, of which each cell is fingerprinted by its maximum influence APs. Based on this robust location indicator, fine-grained localization can be achieved by a discretized particle filter utilizing sensor data fusion. We devise techniques for CIVD-based field division, graph-based particle filter, EM-based individual character learning, and build a prototype that runs on commodity devices. Extensive experiments show that RAD provides a comparable performance to the state-of-the-art RSS-based methods while relieving it of prior human participation.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"29 1","pages":"547-550"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81296447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Link Adaptation in IEEE 802.11ac: A Distributed Learning Based Approach IEEE 802.11ac动态链路自适应:一种基于分布式学习的方法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.20
Raja Karmakar, Samiran Chattopadhyay, Sandip Chakraborty
High throughput wireless access networks based on IEEE 802.11ac show a significant challenge in dynamically selecting the link configuration parameters based on channel conditions due to large pool of design set, like number of spatial streams, channel bonding, guard intervals, frame aggregation and different modulation and coding schemes. In this paper, we develop a learning based approach for link adaptation motivated by the multi-armed bandit based distributed learning algorithm. The proposed link adaptation algorithm, BanditLink, explores different possible configuration options based on observing their impact over the network performance at various channel conditions. We analyze the performance of BanditLink from simulation results, and observe that it performs significantly better compared to other competing mechanisms proposed in the literature.
基于IEEE 802.11ac的高吞吐量无线接入网络由于空间流数量、信道绑定、保护间隔、帧聚合以及不同的调制和编码方案等设计集池较大,在根据信道条件动态选择链路配置参数方面存在很大的挑战。在本文中,我们开发了一种基于多臂强盗分布式学习算法的链路自适应学习方法。提出的链路自适应算法BanditLink基于观察它们在各种信道条件下对网络性能的影响,探索了不同可能的配置选项。我们从仿真结果中分析了BanditLink的性能,并观察到与文献中提出的其他竞争机制相比,它的性能明显更好。
{"title":"Dynamic Link Adaptation in IEEE 802.11ac: A Distributed Learning Based Approach","authors":"Raja Karmakar, Samiran Chattopadhyay, Sandip Chakraborty","doi":"10.1109/LCN.2016.20","DOIUrl":"https://doi.org/10.1109/LCN.2016.20","url":null,"abstract":"High throughput wireless access networks based on IEEE 802.11ac show a significant challenge in dynamically selecting the link configuration parameters based on channel conditions due to large pool of design set, like number of spatial streams, channel bonding, guard intervals, frame aggregation and different modulation and coding schemes. In this paper, we develop a learning based approach for link adaptation motivated by the multi-armed bandit based distributed learning algorithm. The proposed link adaptation algorithm, BanditLink, explores different possible configuration options based on observing their impact over the network performance at various channel conditions. We analyze the performance of BanditLink from simulation results, and observe that it performs significantly better compared to other competing mechanisms proposed in the literature.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"8 1","pages":"87-94"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81313593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches 如何信任X.509证书?现有信任方法分析
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.85
A. Wazan, R. Laborde, D. Chadwick, F. Barrère, A. Benzekri
A Public Key Infrastructure (PKI) is based on a trust model defined by the original X.509 standard and is composed of three entities: the Certification Authority, the certificate holder (subject) and the Relying Party. The CA plays the role of a trusted third party between the subject and the RP. A trust evaluation problem is raised when an RP receives a certificate from an unknown subject that is signed by an unknown CA. Different approaches have been proposed to handle this trust problem. We argue that these approaches work only in the closed deployment model where RPs are also subjects, but cannot work in the open deployment model where they are not. Our objective is to identify the deficiencies in the existing trust approaches that try to help RPs to make trust decisions about certificates in the Internet, and to introduce the new X.509 approach based on a trust broker.
公钥基础设施(PKI)基于原始X.509标准定义的信任模型,由三个实体组成:证书颁发机构、证书持有人(主体)和依赖方。CA在主体和RP之间扮演可信第三方的角色。当RP从未知主体接收到由未知CA签名的证书时,会引发信任评估问题。已经提出了不同的方法来处理此信任问题。我们认为这些方法只适用于封闭的部署模型,其中rp也是主体,而不能适用于开放的部署模型,因为它们不是主体。我们的目标是找出现有信任方法中的缺陷,这些方法试图帮助rp对Internet中的证书做出信任决策,并介绍基于信任代理的新X.509方法。
{"title":"How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches","authors":"A. Wazan, R. Laborde, D. Chadwick, F. Barrère, A. Benzekri","doi":"10.1109/LCN.2016.85","DOIUrl":"https://doi.org/10.1109/LCN.2016.85","url":null,"abstract":"A Public Key Infrastructure (PKI) is based on a trust model defined by the original X.509 standard and is composed of three entities: the Certification Authority, the certificate holder (subject) and the Relying Party. The CA plays the role of a trusted third party between the subject and the RP. A trust evaluation problem is raised when an RP receives a certificate from an unknown subject that is signed by an unknown CA. Different approaches have been proposed to handle this trust problem. We argue that these approaches work only in the closed deployment model where RPs are also subjects, but cannot work in the open deployment model where they are not. Our objective is to identify the deficiencies in the existing trust approaches that try to help RPs to make trust decisions about certificates in the Internet, and to introduce the new X.509 approach based on a trust broker.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"49 1","pages":"531-534"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79944475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1