{"title":"Idle Times Analysis in a CSMA/CA Network","authors":"R. Bowden, A. Coyle","doi":"10.1109/ICON.2007.4444127","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444127","url":null,"abstract":"Carrier Sense Multiple Access with Collision avoidance (CSMA/CA) is a well known and distributed Medium Access Control (MAC) protocol that enables wireless stations to communicate with one another using a single medium. In this paper an analysis of the times between data transmission in this protocol has been performed and results obtained. Whilst neither analytically nor numerically complex these results lead to an insight of the behavior of a CSMA/CA system that enable a robust and efficient traffic analysis of these systems.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134243955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks","authors":"Yupeng Hu, Yaping Lin, Yonghe Liu, Weini Zeng","doi":"10.1109/ICON.2007.4444086","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444086","url":null,"abstract":"False data injection attacks not only cause user to receive incorrect reports so that make wrong decisions, but also drain out the significant sensor network energy resources. Previous filtering schemes mainly relying on pairwise key based schemes for endorsing the report. In wireless sensor networks, sharing pairwise key with other sensor nodes may be vulnerable as an intermediate node can be compromised and hence keys will be disclosed. As a result, those compromised forwarding nodes can be easily manipulated to inject false data reports by the inside attacker. Based on a pre-designed partition-overlapping key pool scheme, we propose a new robust authentication scheme (RAS) for filtering false data. In RAS, each big event is divided into several small event chunks, every one of which is endorsed by witness nodes both with dynamic authentication tokens from one-way hash chain and their secret keys pre-loaded from the key pool. This way, compromised nodes, even in possession of all endorsement keys for the data reports, will not able to fabricate or modify the reports. Analytical and simulation results show that RAS can filter false reports earlier while maintaining stronger protection against various insider attacks.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114580121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving TCP Performance: Identifying Corruption Based Packet Loss","authors":"Joel Sing, B. Soh","doi":"10.1109/ICON.2007.4444120","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444120","url":null,"abstract":"Most TCP variants suffer a decrease in performance when used over networks that exhibit a high bit error rate, such as those that utilise wireless or satellite links. This is primarily due to TCP's inability to distinguish between congestion and corruption based packet loss. Instead, Jacobson based TCP variants assume that all loss is due to congestion. When packet loss occurs due to corruption the transmission rate is reduced in order to avoid the falsely identified congestion, rather than simply retransmitting the corrupted packets. In this paper we detail research undertaken to model network state, packet state and packet loss, allowing us to identify loss that is due to corruption. Furthermore, we propose an algorithm to identify the cause of packet loss on a probabilistic basis.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Congestion Window Growth in Large Bandwidth Delay Product Networks","authors":"Joel Sing, B. Soh","doi":"10.1109/ICON.2007.4444117","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444117","url":null,"abstract":"TCP performance degrades significantly when used over networks with a large bandwidth delay product. This is primarily due to the exponential and linear congestion window growth algorithms employed by Jacobson based TCP variants. In this paper we present a logarithmic window growth algorithm that is based on bandwidth estimation, allowing it to perform well regardless of the network bandwidth delay product. Implementation details are presented for this algorithm, along with results achieved via simulation.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Collaborative Fault-Tolerance Mechanism for Metadata Server Cluster","authors":"Z. X. Li, Q. Wei, Y. Wang","doi":"10.1109/ICON.2007.4444136","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444136","url":null,"abstract":"In object-based storage system, metadata residing in metadata server (MDS) is crucial to the survival of overall system. Keeping metadata always available is becoming one of the key issues to be addressed for object-based storage system design and implementation. This paper presents a novel cooperative fault-tolerance mechanism for metadata server cluster, called Co-MDS. The Co-MDS consolidates disk space of individual MDS into a global metadata storage space and provides high fault-tolerance by distributing metadata and its parity data across collaborative metadata server cluster environment. With this mechanism, metadata is still available even when a part of metadata servers fail. Our design is transparent for applications and complies with OSD T10 standard. The experiments demonstrate that the proposed collaborative mechanism can offer high fault-tolerance and significant performance.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123581466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Near Optimal Antenna Assignment for MIMO Systems with Low Complexity","authors":"M. Torabzadeh, Yusheng Ji","doi":"10.1109/ICON.2007.4444109","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444109","url":null,"abstract":"High performance, low complexity schedulers are challenging to develop for the downlink of multiple-input multiple-output (MIMO) cellular systems. Selection among available channels between users and the base station in a centralized way makes the problem complex. An approach to solve this problem is combinatorial optimization algorithms. In this case, the scheduling can be done in two different phases. The first phase is the user selection in which the scheduler selects a group of users based on its own criterion. The assignment scheme assigns the selected users to the transmit antennas, taking into consideration the capacity maximization in the second phase of the scheduling. Considerations related to user satisfaction, fairness, physical layer parameters, and/or traffic arrival processes in this kind of scheduler can be implemented with low complexity. For the second phase, we propose a near-optimal, low-complexity, assignment scheme, called the max difference of top two (MDTT). An intensive simulation study taking into account the mobility of users shows the superior performance of our assignment scheme.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127942351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tze Wei Tang, David Philip Green, M. Rumsewicz, N. Bean
{"title":"An Architecture for IEEE 802.16 MAC Scheduler Design","authors":"Tze Wei Tang, David Philip Green, M. Rumsewicz, N. Bean","doi":"10.1109/ICON.2007.4444067","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444067","url":null,"abstract":"The scheduling algorithm for IEEE 802.16 broadband wireless access system has been left open in the standard. In this paper, we consider three criteria that we have identified as important criteria for an 802.16 scheduler: Service Type differentiation, dynamic sub-frame partition and Subscriber Station differentiation. We investigate the scheduler design from a general perspective, based on these three criteria.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of the TKIP Cryptographic DoS Attack","authors":"Steve Glass, V. Muthukkumarasamy","doi":"10.1109/ICON.2007.4444062","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444062","url":null,"abstract":"The contribution of the paper is to study the cryptographic DoS attack in a testbed environment. We have shown the correct mechanism for an 802.11 message modification attack, described the implementation of this attack using a middleperson approach and compared the TKIP and Harkins countermeasures in a controlled environment. The cryptographic DoS attack is demonstrated to be practical and can be mounted by a single adversary with limited resources. This attack requires very little work on behalf of a hostile adversary and will bring TKIP-protected traffic to a complete halt. The threat of this attack being used to accomplish a security-level rollback should not be underestimated. The Harkins countermeasures address this threat by reacting in a more measured manner to active key recovery attacks.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Escalating The War On SPAM Through Practical PoW Exchange","authors":"P. Gardner-Stephen","doi":"10.1109/ICON.2007.4444132","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444132","url":null,"abstract":"Proof-of-work (PoW) schemes have been proposed in the past. One prominent system is HASHCASH which uses cryptographic puzzles. However, work by Laurie and Clayton (2004) has shown that for a uniform PoW scheme on email to have an impact on SPAM, it would also impact on senders of legitimate email. A targeted cost PoW scheme on email is proposed as a potential solution to this problem. By selectively applying the cost to SPAM it has the potential to limit SPAM, without unduly penalizing legitimate senders. Moreover, it is constructed using only current SPAM filter technology, and a small change to the SMTP (simple mail transfer protocol). Specifically, it is argued that such a system can make sending SPAM 1,000 times more expensive than sending legitimate email (so called HAM). Also, unlike the system proposed by Liu and Camp, it does not require the complications of maintaining a reputation system.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130233380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"History-based route selection for reactive ad hoc routing protocols","authors":"S. Medidi, Peter Cappetto","doi":"10.1117/12.719820","DOIUrl":"https://doi.org/10.1117/12.719820","url":null,"abstract":"Ad hoc networks rely on cooperation in order to operate, but in a resource constrained environment not all nodes behave altruistically. Selfish nodes preserve their own resources and do not forward packets not in their own self interest. These nodes degrade the performance of the network, but judicious route selection can help maintain performance despite this behavior. Many route selection algorithms place importance on shortness of the route rather than its reliability. We introduce a light-weight route selection algorithm that uses past behavior to judge the quality of a route rather than solely on the length of the route. It draws information from the underlying routing layer at no extra cost and selects routes with a simple algorithm. This technique maintains this data in a small table, which does not place a high cost on memory. History-based route selection's minimalism suits the needs the portable wireless devices and is easy to implement. We implemented our algorithm and tested it in the ns2 environment. Our simulation results show that history-based route selection achieves higher packet delivery and improved stability than its length-based counterpart.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122222082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}