{"title":"Peer-to-peer based intrusion detection modeling and analysis","authors":"Zhang Xiaosong, Chen Ting, M. Yue, Li Hua","doi":"10.1109/ICFIN.2009.5339561","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339561","url":null,"abstract":"This paper proposes a model of intrusion detection based on peer-to-peer (p2p) mechanism. The crux of our research is that quantitatively analyze the response rate of the global intrusion detection system (IDS). The principal approaches are modeling, deduction and numerical simulation. Theoretical proof and experiments demonstrate that our model is reliable and robust. Based on this model, we draw the following conclusions. First, this model is insensitive to network scale so it is adaptable to large-scale network. Second, response rate depends mostly on peer's degree. Third, our model does not care about how many peers are aware of intrusion in the beginning. In a word, with proper parameters our model can achieve an extremely rapid response rate.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed routing algorithm based on available multi-nexthop in IP networks","authors":"Li-an Guan, Binqiang Wang, Xuan-yong Zhu, Dan Li","doi":"10.1109/ICFIN.2009.5339589","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339589","url":null,"abstract":"Traditional routing algorithms have many drawbacks such as worse resource utilization and stability. Present investigations focus on how to mitigate them in traditional algorithms rather than design a new algorithm to terminate them. In this paper, a novel distributed routing algorithm based on available multi-nexthop is proposed. This is different from traditional single-nexthop schemes. The nodes are orderly planned (assign different heights to different nodes based on some node) by improved breadth-first search algorithm(IBFS). Then, the network topology form a directed acyclic graph based on one destination node and other nodes can forward packets to it by available multi-nexthop which is derived from different heights. Simulation results show that the proposed algorithm has low computation complexity and makes network traffic tend to equilibrium due to the reduction of the traffic fluctuation in links. So the algorithm has a high resource utilization rate and can mitigate network congestions greatly.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static throughput optimal scheduling for wireless multicast","authors":"Jiang Yu, Youyun Xu, Wei Xie","doi":"10.1109/ICFIN.2009.5339580","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339580","url":null,"abstract":"wireless multicast can exploit both multiuser diversity and broadcast gain together simultaneously, which are the special virtues of wireless communication. However, we have to adopt appropriate tradeoff between multiuser diversity gain and broadcast gain in order to achieve optimal system throughput. This paper studied the problem of wireless multicast scheduling, and proposed a static optimal wireless scheduling algorithm which achieve optimal throughput in sense of probability. This scheme determines the optimal threshold of the channel gain and the optimal number of active users according to the probability distribution function of the envelope of the fading channel. The system throughput of the scheme can approach the upper bounder of system throughput if the number of the system is large enough. Only when the average SNR (signal to noise ratio) changes the scheme has to adjust the multicast threshold and number of users. It has a very low complexity, and is easy to implement. At last, we prove the proposed algorithm achieve higher system throughput than other multicast algorithms by simulations.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scheme of issuing inter-domain trust certificate based on proxy signature","authors":"Chen Bo, Gu Li-ze, Cui Bao-jiang","doi":"10.1109/ICFIN.2009.5339555","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339555","url":null,"abstract":"To solve the problem of carrying trust value, we use trust certificate which is issued by the Trust Management Center in the Trust Management System to carry it. Each Trust Management Center should only be in charge of auditing and issuing trust certificate in its own domain. Face to the problem of how to get an inter-domain trust certificate, we provide a scheme that apply the proxy signature to generate trust certificate. This scheme can solve the problem of issuing trust certificate in inter-domain efficiently.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huai-En Lian, Chien Chen, Je-Wei Chang, Chien-Chung Shen, R. Jan
{"title":"Shortest path routing with reliability requirement in delay tolerant networks","authors":"Huai-En Lian, Chien Chen, Je-Wei Chang, Chien-Chung Shen, R. Jan","doi":"10.1109/ICFIN.2009.5339556","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339556","url":null,"abstract":"The topology of a delay tolerant network (DTN) over time has been modeled by a space-time graph. However, the mobility of nodes, such as buses, may not be completely predictable due to factors such as traffic load, road condition, the number of passengers getting on and off the buses, and the operations of traffic lights. In this paper, we adapt the space-time graph by augmenting each horizontal edge with a direct contact probability to model the uncertainty of connectivity. With such an augmented space-time graph, our goal is to compute a shortest routing path satisfying a given end-to-end delivery reliability in a DTN. To facilitate such computation, we adapt the Floyd-Warshall algorithm to compute the maximum contact probability matrix at each time interval. By using an iterative matrix multiplication scheme on a maximum contact matrix, we can compute the shortest path satisfying the reliability constraint. Simulation results validate the performance of our solution which achieves a good balance between delay and reliability.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"191 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132570029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hierarchical route optimization scheme in nested mobile network with source routing binding update","authors":"Tianhan Gao, Nan Guo, Zhiliang Zhu","doi":"10.1109/ICFIN.2009.5339569","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339569","url":null,"abstract":"In nested mobile network, traffic should be encapsulated and tunneled for each level of nesting, which leads to increased overhead and sub-optimal routing. In this paper, we investigate a localized mobility management framework and propose a source routing binding update mechanism based on mobile anchor point (MAP) to optimize the route of nested mobile network that supports NEMO basic support protocol (NBS). Following superiority can be achieved with this scheme: 1) An one-way tunnel is built between top level mobile router (TLMR) and its home agent (HA) to accomplish route optimization. 2) The localized framework reduces mobility registration overhead and boosts the mobility management performance. We also builds an analysis model for performance evaluation, through quantitative comparisons with existing schemes, our scheme triumphs in terms of packet delivery overhead and mobility registration costs.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131897142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated key distribution protocol in universal network","authors":"Lijuan Zheng, Zhen Han, Rui Zhang, Tongrang Fan","doi":"10.1109/ICFIN.2009.5339565","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339565","url":null,"abstract":"Universal network and pervasive service is one kind of new network architecture. In this architecture, in order to guarantee the security of access network and terminal, terminal access control and access network authentication must both be implemented. Terminal unified access control method based on identifier realizes unified access control of various terminals, authentication of authentication center, and key negotiation between access switching router and terminal. But it does not consider the authentication of access switching router. So the attacker can impersonate legitimate access switching router to acquire the information of the terminal, thus brings threats to terminal's security. Aiming at this problem, a provably secure authenticated key distribution protocol AKDP is put forward in this paper. This new protocol can effectively protect unauthorized terminal access network, prevent unauthentic authentication center from cheating the terminal, avoid impersonation of illegal access switching router, and guarantee the freshness of the session key. It is provably secure based on BR extended model. Through performance analysis, the protocol has high efficiency.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114783030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poisonedwater: an adaptive approach to reducing the reputation ranking error in P2P networks","authors":"Yufeng Wang, A. Nakao","doi":"10.1109/ICFIN.2009.5339607","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339607","url":null,"abstract":"This paper preliminarily proposes a reputation ranking algorithm called “Poisonedwater” to resist front peer attack—peers that gain high reputation values by always cooperating with other peers and then promote their malicious friends through passing most of their reputation values to those malicious peers. Specifically, we introduce a notion of Poisoned Water (PW) that iteratively floods from identified malicious peers in the reverse direction of the incoming trust links towards other peers. Furthermore, we propose the concept of Spreading Factor (SF) that is logistically correlated to each peer's PW level. Then, we design the new reputation ranking algorithm seamlessly integrated with peers' recommendation ability (represented as SF), to infer the more accurate reputation ranking for each peer. Simulation results show that, in comparison with Eigentrust, Poisonedwater can significantly reduce the ranking error ratio up to 20%, when P2P systems exist many malicious peers and front peers.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rate adapted TCP acceleration for mobile wireless network","authors":"Sungwon Lee","doi":"10.1109/ICFIN.2009.5339568","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339568","url":null,"abstract":"FAST Transmission Control Protocol (TCP) was previously proposed for high capacity with long delay network environments, and ‘FAST TCP with Snoop’ performs better than conventional TCP enhancements within mobile wireless network environments. However, FAST TCP has limitations when dealing with a dynamic mobile wireless link where high Frame Error Ratio (FER) and frequent delay changes due to variable rate. We propose an enhanced TCP acceleration algorithm at the TCP sender side which efficiently adapt to the maximum transmission rate of a mobile wireless link using Round Trip Time (RTT) and virtual Receiver Window (RWND) information. Also, the proposed algorithm provides superior performance over mobile wireless network environments.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123921102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing optimization for inter-domain traffic engineering under separation and mapping architecture","authors":"Nan Yao, Ming Wan, Ke Xiong, Hongke Zhang","doi":"10.1109/ICFIN.2009.5339604","DOIUrl":"https://doi.org/10.1109/ICFIN.2009.5339604","url":null,"abstract":"To resolve the scalability problem in the existing Internet, there are many researches proposing the idea of separating the Internet into two independent evolving spaces, the access network and the core network, respectively. Such separation provides us opportunities to reconsider the methods of implementation of inter-domain traffic engineering under the new network environment. Based on the existing architecture of universal network, we propose a new method for implement traffic engineering and give detailed contrast between the newly proposed method and traditional method being used in current Internet. And we give feasibility analysis of the method.","PeriodicalId":123746,"journal":{"name":"2009 First International Conference on Future Information Networks","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}