首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks 三mcl:移动Ad-Hoc和无线传感器网络的协同定位
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.61
Arne Bochem, Yali Yuan, D. Hogrefe
Localization is a highly important topic in wireless sensor networks as well as in many Internet of Things applications. Many current localization algorithms are based on the Sequential Monte Carlo Localization method (MCL), the accuracy of which is bounded by the radio range. High computational complexity in the sampling step is another issue of these approaches. We present Tri-MCL which significantly improves on the accuracy of the Monte Carlo Localization algorithm. To do this, we leverage three different distance measurement algorithms based on range-free approaches. Using these, we estimate the distances between unknown nodes and anchor nodes to perform more fine-grained filtering of the particles as well as for weighting the particles in the final estimation step of the algorithm. Simulation results illustrate that the proposed algorithm achieves better accuracy than the MCL and SA-MCL algorithms. Furthermore, it also exhibits high efficiency in the sampling step.
在无线传感器网络以及许多物联网应用中,定位是一个非常重要的话题。目前许多定位算法都是基于顺序蒙特卡罗定位方法(MCL),其精度受无线电距离的限制。采样步骤的高计算复杂度是这些方法的另一个问题。我们提出的Tri-MCL显著提高了蒙特卡罗定位算法的精度。为此,我们利用了三种基于无距离方法的不同距离测量算法。利用这些,我们估计未知节点和锚节点之间的距离,对粒子进行更细粒度的过滤,并在算法的最后估计步骤中对粒子进行加权。仿真结果表明,该算法比MCL和SA-MCL算法具有更好的精度。此外,它在采样步骤中也表现出很高的效率。
{"title":"Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks","authors":"Arne Bochem, Yali Yuan, D. Hogrefe","doi":"10.1109/LCN.2016.61","DOIUrl":"https://doi.org/10.1109/LCN.2016.61","url":null,"abstract":"Localization is a highly important topic in wireless sensor networks as well as in many Internet of Things applications. Many current localization algorithms are based on the Sequential Monte Carlo Localization method (MCL), the accuracy of which is bounded by the radio range. High computational complexity in the sampling step is another issue of these approaches. We present Tri-MCL which significantly improves on the accuracy of the Monte Carlo Localization algorithm. To do this, we leverage three different distance measurement algorithms based on range-free approaches. Using these, we estimate the distances between unknown nodes and anchor nodes to perform more fine-grained filtering of the particles as well as for weighting the particles in the final estimation step of the algorithm. Simulation results illustrate that the proposed algorithm achieves better accuracy than the MCL and SA-MCL algorithms. Furthermore, it also exhibits high efficiency in the sampling step.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"58 1","pages":"333-338"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Revisiting the So-Called Constructive Interference in Concurrent Transmission 再论并发传输中所谓的建设性干扰
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.56
Chun-Hao Liao, Yuki Katsumata, Makoto Suzuki, H. Morikawa
Many works attributed the successful reception of concurrent transmission (CT) to the constructive interference. However, due to the inevitable carrier frequency offset (CFO) and the resulted beating effect, the claim of constructive interference is actually not valid. To clarify the reason behind the successful receptions under CT, we conduct extensive evaluations and identify the following findings. 1) We show that the IEEE 802.15.4 receivers survive the beating effect mainly because of the direct sequence spread spectrum (DSSS), while systems without the protection of DSSS are not applicable to CT. 2) We identify a counterintuitive phenomenon that the IEEE 802.15.4 receiver could survive only the beating results from large CFO, while performing poorly when CFO is small. 3) We demonstrate that, even if the receivers survive, CT links lead to little performance improvements compared to conventional signal transmission links from the SNR point of view.
许多研究将并发传输(CT)的成功接收归结为构造干扰。然而,由于不可避免的载波频率偏移(CFO)和由此产生的跳动效应,构造干扰的主张实际上是无效的。为了阐明CT下成功接待的原因,我们进行了广泛的评估,并确定了以下发现。1)研究表明,IEEE 802.15.4接收机之所以能够抵御冲击效应,主要是由于直接序列扩频(DSSS)的保护,而没有DSSS保护的系统不适用于CT。2)我们发现了一个反直觉的现象,即IEEE 802.15.4接收器只能在大型CFO的击败结果中存活,而在小型CFO时表现不佳。3)我们证明,即使接收器存活下来,从信噪比的角度来看,与传统信号传输链路相比,CT链路的性能改进很小。
{"title":"Revisiting the So-Called Constructive Interference in Concurrent Transmission","authors":"Chun-Hao Liao, Yuki Katsumata, Makoto Suzuki, H. Morikawa","doi":"10.1109/LCN.2016.56","DOIUrl":"https://doi.org/10.1109/LCN.2016.56","url":null,"abstract":"Many works attributed the successful reception of concurrent transmission (CT) to the constructive interference. However, due to the inevitable carrier frequency offset (CFO) and the resulted beating effect, the claim of constructive interference is actually not valid. To clarify the reason behind the successful receptions under CT, we conduct extensive evaluations and identify the following findings. 1) We show that the IEEE 802.15.4 receivers survive the beating effect mainly because of the direct sequence spread spectrum (DSSS), while systems without the protection of DSSS are not applicable to CT. 2) We identify a counterintuitive phenomenon that the IEEE 802.15.4 receiver could survive only the beating results from large CFO, while performing poorly when CFO is small. 3) We demonstrate that, even if the receivers survive, CT links lead to little performance improvements compared to conventional signal transmission links from the SNR point of view.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"58 1","pages":"280-288"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87659272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
User-Centric Network Provisioning in Software Defined Data Center Environment 软件定义数据中心环境中以用户为中心的网络配置
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.57
Taimur Bakhshi, B. Ghita
Present data center (DC) network provisioning schemes primarily utilize conventional load-balancing technologies, offering individual application performance improvement. Diversity in application usage however, makes isolated application prioritization a performance caveat for users with varying application trends. The present paper proposes a user profiling approach to capture application trends based on generic flow measurements (NetFlow) and employs the extracted profiles to create DC traffic forwarding policies. The scheme allows operators to define a global profile and application hierarchy based on extracted profiles to prioritize traffic for individual user classes. The proposed design was tested by extracting user profiles from a realistic enterprise network, and further simulated to dynamically manage DC traffic using the software defined networking paradigm. Compared to conventional traffic management schemes, the frame delivery ratio and effective throughput of our design was significantly higher for high priority north-south user traffic as well as the inter-server east-west application traffic.
目前的数据中心(DC)网络供应方案主要利用传统的负载平衡技术,提供单个应用程序性能改进。但是,应用程序使用的多样性使得孤立的应用程序优先级对于具有不同应用程序趋势的用户来说是一个性能警告。本文提出了一种基于通用流量测量(NetFlow)的用户分析方法来捕获应用趋势,并使用提取的配置文件来创建数据中心流量转发策略。该方案允许运营商根据提取的配置文件定义全局配置文件和应用程序层次结构,以优先考虑各个用户类的流量。通过从实际企业网络中提取用户配置文件,对所提出的设计进行了测试,并使用软件定义网络范式对数据中心流量进行了动态管理仿真。与传统的流量管理方案相比,我们设计的帧交付率和有效吞吐量对于高优先级的南北用户流量以及服务器间的东西应用流量都显着更高。
{"title":"User-Centric Network Provisioning in Software Defined Data Center Environment","authors":"Taimur Bakhshi, B. Ghita","doi":"10.1109/LCN.2016.57","DOIUrl":"https://doi.org/10.1109/LCN.2016.57","url":null,"abstract":"Present data center (DC) network provisioning schemes primarily utilize conventional load-balancing technologies, offering individual application performance improvement. Diversity in application usage however, makes isolated application prioritization a performance caveat for users with varying application trends. The present paper proposes a user profiling approach to capture application trends based on generic flow measurements (NetFlow) and employs the extracted profiles to create DC traffic forwarding policies. The scheme allows operators to define a global profile and application hierarchy based on extracted profiles to prioritize traffic for individual user classes. The proposed design was tested by extracting user profiles from a realistic enterprise network, and further simulated to dynamically manage DC traffic using the software defined networking paradigm. Compared to conventional traffic management schemes, the frame delivery ratio and effective throughput of our design was significantly higher for high priority north-south user traffic as well as the inter-server east-west application traffic.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"225 1","pages":"289-297"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85258809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Organization-Level Control of Excessive Internet Downloads 组织层面对互联网过度下载的控制
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.38
Saad Y. Sait, H. Murthy, K. Sivalingam
The control of excessive downloads by rogue users in organizational LANs is the subject of this work. Two mechanisms have been used in order to accomplish this. The first mechanism, is TCP rate control (TCR), it is a receiver-based flow control technique that can be used to effectively rate limit rogue users' flows, making more bandwidth available to regular users. The second mechanism, admission control reduces the bandwidth wastage due to users disconnecting out of impatience when user goodputs are low. Using simulation-based experiments, it has been demonstrated that the composite technique, exclusive TCP rate and admission control (xTRAC) provides seamless control of rogue users, while improving response times and goodput by upto 58% during overload. In this way regular users are incentivized and rogue users are penalized leading to long-term control of users.
控制组织局域网中恶意用户的过度下载是本工作的主题。为了实现这一目标,使用了两种机制。第一种机制是TCP速率控制(TCP rate control, TCR),它是一种基于接收端的流量控制技术,可以有效地限制恶意用户的流量,为常规用户提供更多的带宽。第二种机制,准入控制减少了由于用户在用户商品价格低时由于不耐烦而断开连接而造成的带宽浪费。通过基于仿真的实验,已经证明了复合技术,独占TCP速率和准入控制(xTRAC)提供了对流氓用户的无缝控制,同时在过载时将响应时间和good - put提高了58%。通过这种方式,常规用户会受到激励,而不守规矩的用户会受到惩罚,从而形成对用户的长期控制。
{"title":"Organization-Level Control of Excessive Internet Downloads","authors":"Saad Y. Sait, H. Murthy, K. Sivalingam","doi":"10.1109/LCN.2016.38","DOIUrl":"https://doi.org/10.1109/LCN.2016.38","url":null,"abstract":"The control of excessive downloads by rogue users in organizational LANs is the subject of this work. Two mechanisms have been used in order to accomplish this. The first mechanism, is TCP rate control (TCR), it is a receiver-based flow control technique that can be used to effectively rate limit rogue users' flows, making more bandwidth available to regular users. The second mechanism, admission control reduces the bandwidth wastage due to users disconnecting out of impatience when user goodputs are low. Using simulation-based experiments, it has been demonstrated that the composite technique, exclusive TCP rate and admission control (xTRAC) provides seamless control of rogue users, while improving response times and goodput by upto 58% during overload. In this way regular users are incentivized and rogue users are penalized leading to long-term control of users.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"34 1","pages":"184-187"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91242585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inferring and Controlling Congestion in CCN via the Pending Interest Table Occupancy 通过待处理兴趣表占用来推断和控制CCN中的拥塞
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.72
Amuda James Abu, B. Bensaou, A. Abdelmoniem
Despite the improvements brought about by content-centric networking's (CCN) in-network caching and interest aggregation, congestion can still take place in such networks due to the dominance of non-reusable content, high cache churn, high delay variations, premature timeouts and interest retransmission. This becomes even more dramatic when multi-path routing is adopted. Identifying that at a given node in CCN, the Pending Interest Table (PIT) occupancy can give a good estimate of the data workload to arrive to the node in the near future, we propose in this paper a novel mechanism to control congestion in CCN based on this idea. Our mechanism uses the average occupancy of the PIT to estimate the anticipated data packet transmission queue length and sends explicit congestion notification signals to the content requesters to reduce their interest sending rates when such anticipated queue size exceeds a threshold. We demonstrate the effectiveness of our proposed mechanism via ns-3 simulation.
尽管以内容为中心的网络(CCN)的网络内缓存和兴趣聚合带来了改进,但由于不可重用内容占主导地位、高速缓存流失、高延迟变化、过早超时和兴趣重传,拥塞仍然可能在此类网络中发生。当采用多路径路由时,这种情况变得更加明显。在CCN的给定节点上,待处理兴趣表(PIT)占用率可以很好地估计在不久的将来到达该节点的数据工作量,我们在本文中基于这一思想提出了一种控制CCN拥塞的新机制。我们的机制使用PIT的平均占用率来估计预期的数据包传输队列长度,并在预期队列大小超过阈值时向内容请求者发送显式拥塞通知信号,以降低其兴趣发送率。我们通过ns-3仿真证明了我们提出的机制的有效性。
{"title":"Inferring and Controlling Congestion in CCN via the Pending Interest Table Occupancy","authors":"Amuda James Abu, B. Bensaou, A. Abdelmoniem","doi":"10.1109/LCN.2016.72","DOIUrl":"https://doi.org/10.1109/LCN.2016.72","url":null,"abstract":"Despite the improvements brought about by content-centric networking's (CCN) in-network caching and interest aggregation, congestion can still take place in such networks due to the dominance of non-reusable content, high cache churn, high delay variations, premature timeouts and interest retransmission. This becomes even more dramatic when multi-path routing is adopted. Identifying that at a given node in CCN, the Pending Interest Table (PIT) occupancy can give a good estimate of the data workload to arrive to the node in the near future, we propose in this paper a novel mechanism to control congestion in CCN based on this idea. Our mechanism uses the average occupancy of the PIT to estimate the anticipated data packet transmission queue length and sends explicit congestion notification signals to the content requesters to reduce their interest sending rates when such anticipated queue size exceeds a threshold. We demonstrate the effectiveness of our proposed mechanism via ns-3 simulation.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"433-441"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81737747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CodePLC: A Network Coding MAC Protocol for Power Line Communication 电力线通信的网络编码MAC协议
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.112
L. M. Silveira, Robert M. Oliveira, Moises Vidal Ribeiro, L. Vieira, M. Vieira, A. Vieira
Power line communication systems face several challenges which degrade data communication quality. To overcome such issues, we propose CodePLC, a network coding Power Line Communication MAC protocol. We use a single relay node to intermediate communication, storing, and forwarding linear combinations of data packets. We evaluate CodePLC performance through simulations of a common topology for a PLC system under a wide range of scenarios. In sum, our results show that in a broadcast like transmission, the use of network coding enhances overall system performance. When compared to a traditional PLC system, we have observed an average of 115% goodput increase. Moreover, our protocol reduces in 112% the average of network occupancy buffers. Finally, CodePLC reduces mean latency by four times.
电力线通信系统面临着降低数据通信质量的诸多挑战。为了克服这些问题,我们提出了一种网络编码电力线通信MAC协议CodePLC。我们使用单个中继节点进行中间通信,存储和转发数据包的线性组合。我们通过在广泛的场景下模拟PLC系统的公共拓扑来评估CodePLC的性能。总之,我们的结果表明,在类似广播的传输中,使用网络编码可以提高系统的整体性能。与传统的PLC系统相比,我们已经观察到平均115%的货物增加。此外,我们的协议减少了112%的平均网络占用缓冲区。最后,CodePLC将平均延迟减少了四倍。
{"title":"CodePLC: A Network Coding MAC Protocol for Power Line Communication","authors":"L. M. Silveira, Robert M. Oliveira, Moises Vidal Ribeiro, L. Vieira, M. Vieira, A. Vieira","doi":"10.1109/LCN.2016.112","DOIUrl":"https://doi.org/10.1109/LCN.2016.112","url":null,"abstract":"Power line communication systems face several challenges which degrade data communication quality. To overcome such issues, we propose CodePLC, a network coding Power Line Communication MAC protocol. We use a single relay node to intermediate communication, storing, and forwarding linear combinations of data packets. We evaluate CodePLC performance through simulations of a common topology for a PLC system under a wide range of scenarios. In sum, our results show that in a broadcast like transmission, the use of network coding enhances overall system performance. When compared to a traditional PLC system, we have observed an average of 115% goodput increase. Moreover, our protocol reduces in 112% the average of network occupancy buffers. Finally, CodePLC reduces mean latency by four times.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"20 1","pages":"643-646"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84022396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming 高速网络流量分析:检测安全大数据流中的VoIP呼叫
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.128
M. Rathore, Anand Paul, Awais Ahmad, M. Imran, M. Guizani
Internet service providers (ISPs) and telecommunication authorities are interested in detecting VoIP calls either to block illegal commercial VoIP or prioritize the paid users VoIP calls. Signature-based, port-based, and pattern-based VoIP detection techniques are not more accurate and not efficient due to complex security and tunneling mechanisms used by VoIP. Therefore, in this paper, we propose a rule-based generic, robust, and efficient statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice) flows using threshold approach. In addition, a system is proposed to efficiently process high-speed real-time network traffic. The accuracy and efficiency evaluation results and the comparative study show that the proposed system outperforms the existing systems with the ability to work in real-time and high-speed Big Data environment.
互联网服务提供商(isp)和电信当局对检测VoIP呼叫感兴趣,要么阻止非法商业VoIP呼叫,要么优先考虑付费用户的VoIP呼叫。基于签名、端口和模式的VoIP检测技术由于VoIP使用复杂的安全性和隧道机制,精度和效率都不高。因此,在本文中,我们提出了一种基于规则的通用、鲁棒和高效的基于统计分析的解决方案,以使用阈值方法识别加密、非加密或隧道式VoIP媒体(语音)流。此外,还提出了一种高效处理高速实时网络流量的系统。准确度和效率评估结果及对比研究表明,该系统优于现有系统,能够在实时、高速的大数据环境下工作。
{"title":"High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming","authors":"M. Rathore, Anand Paul, Awais Ahmad, M. Imran, M. Guizani","doi":"10.1109/LCN.2016.128","DOIUrl":"https://doi.org/10.1109/LCN.2016.128","url":null,"abstract":"Internet service providers (ISPs) and telecommunication authorities are interested in detecting VoIP calls either to block illegal commercial VoIP or prioritize the paid users VoIP calls. Signature-based, port-based, and pattern-based VoIP detection techniques are not more accurate and not efficient due to complex security and tunneling mechanisms used by VoIP. Therefore, in this paper, we propose a rule-based generic, robust, and efficient statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice) flows using threshold approach. In addition, a system is proposed to efficiently process high-speed real-time network traffic. The accuracy and efficiency evaluation results and the comparative study show that the proposed system outperforms the existing systems with the ability to work in real-time and high-speed Big Data environment.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"6 1","pages":"595-598"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85852089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation 证书撤销保护(CRG):一种有效的证书撤销检查机制
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.84
Qinwen Hu, M. R. Asghar, N. Brownlee
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads. CRG is based on OCSP, which caches the status of certificates locally. CRG could be installed on the user's machine, at the organisational proxy or even at the ISP level. Compared to a naive approach (where a client checks the revocation status of all certificates in the chain on every request), CRG decreases the bandwidth overheads and network latencies by 95%. Using CRG incurs 69% lower storage overheads compared to the CRL method. Our results demonstrate the effectiveness of our approach to improve certificate revocation.
在公钥基础设施(Public Key infrastructure, PKI)模型中,数字证书在保证在线通信安全方面起着至关重要的作用。通信各方交换并验证这些证书,如果证书已被撤销,则验证失败。在本文中,我们提出了证书撤销保护(CRG)来有效地检查证书撤销,同时最小化带宽,延迟和存储开销。CRG基于OCSP,将证书的状态缓存到本地。CRG可以安装在用户的机器上,在组织代理上,甚至在ISP级别上。与简单的方法(客户端在每个请求时检查链中所有证书的撤销状态)相比,CRG将带宽开销和网络延迟减少了95%。与CRL方法相比,使用CRG的存储开销降低了69%。我们的结果证明了我们改进证书撤销方法的有效性。
{"title":"Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation","authors":"Qinwen Hu, M. R. Asghar, N. Brownlee","doi":"10.1109/LCN.2016.84","DOIUrl":"https://doi.org/10.1109/LCN.2016.84","url":null,"abstract":"In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads. CRG is based on OCSP, which caches the status of certificates locally. CRG could be installed on the user's machine, at the organisational proxy or even at the ISP level. Compared to a naive approach (where a client checks the revocation status of all certificates in the chain on every request), CRG decreases the bandwidth overheads and network latencies by 95%. Using CRG incurs 69% lower storage overheads compared to the CRL method. Our results demonstrate the effectiveness of our approach to improve certificate revocation.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"139 1","pages":"527-530"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85887796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Opportunistic Geographic Forwarding in Wireless Sensor Networks for Critical Rare Events 关键罕见事件无线传感器网络中的机会地理转发
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.46
David C. Harrison, Winston K.G. Seah, Hang Yu, R. Rayudu
Wireless sensor networks for rarely occurring critical events must maintain sensing coverage and low latency network connectivity to ensure event detection and subsequent rapid propagation of notification messages. Existing geographic forwarding algorithms have proved successful in providing energy efficient network connectivity for arbitrary topologies where sensing coverage is not guaranteed. This paper proposes a location aware algorithm for Swift Opportunistic Forwarding of Infrequent Events (SOFIE) that takes advantage of geometric properties common to sensing networks providing perfect area coverage. The algorithm is shown to deliver more rapid message propagation than two established, general purpose geographic forwarding algorithm in optimally and randomly placed networks of varied sensing node density. Further, the algorithm is shown to maintain this advantage when deployed in a coverage preserving, duty-cycled sensing network where nodes may power down whilst the network is actively forwarding event notification messages.
用于很少发生的关键事件的无线传感器网络必须保持感知覆盖和低延迟网络连接,以确保事件检测和随后的通知消息快速传播。现有的地理转发算法已被证明能够成功地为无法保证传感覆盖的任意拓扑提供高能效的网络连接。本文提出了一种位置感知算法,用于快速机会转发罕见事件(SOFIE),该算法利用传感网络的共同几何特性提供完美的区域覆盖。在不同感知节点密度的最佳和随机放置网络中,该算法比两种已建立的通用地理转发算法提供更快速的消息传播。此外,该算法被证明在部署在覆盖保持、占空比感知网络时保持这一优势,其中节点可能在网络主动转发事件通知消息时断电。
{"title":"Opportunistic Geographic Forwarding in Wireless Sensor Networks for Critical Rare Events","authors":"David C. Harrison, Winston K.G. Seah, Hang Yu, R. Rayudu","doi":"10.1109/LCN.2016.46","DOIUrl":"https://doi.org/10.1109/LCN.2016.46","url":null,"abstract":"Wireless sensor networks for rarely occurring critical events must maintain sensing coverage and low latency network connectivity to ensure event detection and subsequent rapid propagation of notification messages. Existing geographic forwarding algorithms have proved successful in providing energy efficient network connectivity for arbitrary topologies where sensing coverage is not guaranteed. This paper proposes a location aware algorithm for Swift Opportunistic Forwarding of Infrequent Events (SOFIE) that takes advantage of geometric properties common to sensing networks providing perfect area coverage. The algorithm is shown to deliver more rapid message propagation than two established, general purpose geographic forwarding algorithm in optimally and randomly placed networks of varied sensing node density. Further, the algorithm is shown to maintain this advantage when deployed in a coverage preserving, duty-cycled sensing network where nodes may power down whilst the network is actively forwarding event notification messages.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"18 1","pages":"216-219"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89388497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
B. A. T. M. A. N. Handover Extension for Routing Nodes in Infrastructure WMNs B. A. T. M. A. N.基础设施无线网络中路由节点切换扩展
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.118
Patrick Herrmann, Ulrike Meyer
In the past, several proposals to support fast handover in wireless mesh networks have been published. However, most handover extensions are only concerned with moving stations that are unaware of the used routing protocol and assume relatively stationary routing nodes. In this paper we propose an extension to the BATMAN routing protocol to support seamless handover of routing nodes in infrastructure wireless mesh networks. We implement the new extension in our wireless mesh testbed and evaluate its performance in comparison to a standard WLAN handover followed by a route reestablishment using BATMAN. The evaluation shows that route reestablishment is more than 40 times faster with our extension when compared to standard BATMAN.
过去,已经发表了几种支持无线网状网络快速切换的建议。然而,大多数切换扩展只涉及不知道所使用的路由协议的移动站,并假设相对固定的路由节点。本文提出了一种对BATMAN路由协议的扩展,以支持基础设施无线网状网络中路由节点的无缝切换。我们在无线网格测试平台上实现了新的扩展,并将其与使用BATMAN进行路由重建的标准WLAN切换进行了比较,评估了其性能。评估结果表明,与标准的BATMAN相比,我们的扩展可使线路重建速度提高40倍以上。
{"title":"B. A. T. M. A. N. Handover Extension for Routing Nodes in Infrastructure WMNs","authors":"Patrick Herrmann, Ulrike Meyer","doi":"10.1109/LCN.2016.118","DOIUrl":"https://doi.org/10.1109/LCN.2016.118","url":null,"abstract":"In the past, several proposals to support fast handover in wireless mesh networks have been published. However, most handover extensions are only concerned with moving stations that are unaware of the used routing protocol and assume relatively stationary routing nodes. In this paper we propose an extension to the BATMAN routing protocol to support seamless handover of routing nodes in infrastructure wireless mesh networks. We implement the new extension in our wireless mesh testbed and evaluate its performance in comparison to a standard WLAN handover followed by a route reestablishment using BATMAN. The evaluation shows that route reestablishment is more than 40 times faster with our extension when compared to standard BATMAN.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"34 1","pages":"680-687"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86483774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1