2011 31st International Conference on Distributed Computing Systems Workshops最新文献

筛选
英文 中文
Cooperative File Sharing in Hybrid Delay Tolerant Networks 混合容延迟网络中的协同文件共享
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.68
Cong Liu, Jie Wu, X. Guan, Li Chen
{"title":"Cooperative File Sharing in Hybrid Delay Tolerant Networks","authors":"Cong Liu, Jie Wu, X. Guan, Li Chen","doi":"10.1109/ICDCSW.2011.68","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.68","url":null,"abstract":"Peer-to-peer file sharing techniques are efficient and popular ways to distribute network media contents. Aiming to improve the accessibility of media contents from mobile devices, we introduce peer-to-peer file sharing technique into delay tolerant networks (DTNs), which are formed solely by highly mobile devices and which distribute files utilizing the mobility of humans and vehicles. We first investigate two important implementation issues in a DTN environment: cooperative file discovery and cooperative file download. We then propose several distributed file discovery and file download protocols under different levels of user cooperation. Finally, we conduct extensive simulations using both real and synthetic DTN traces to evaluate the proposed protocols.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Understanding Graph Sampling Algorithms for Social Network Analysis 理解社会网络分析的图采样算法
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.34
Tianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, Xing Li
{"title":"Understanding Graph Sampling Algorithms for Social Network Analysis","authors":"Tianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, Xing Li","doi":"10.1109/ICDCSW.2011.34","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.34","url":null,"abstract":"Being able to keep the graph scale small while capturing the properties of the original social graph, graph sampling provides an efficient, yet inexpensive solution for social network analysis. The challenge is how to create a small, but representative sample out of the massive social graph with millions or even billions of nodes. Several sampling algorithms have been proposed in previous studies, but there lacks fair evaluation and comparison among them. In this paper, we analyze the state-of art graph sampling algorithms and evaluate their performance on some widely recognized graph properties on directed graphs using large-scale social network datasets. We evaluate not only the commonly used node degree distribution, but also clustering coefficient, which quantifies how well connected are the neighbors of a node in a graph. Through the comparison we have found that none of the algorithms is able to obtain satisfied sampling results in both of these properties, and the performance of each algorithm differs much in different kinds of datasets.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Link-Level Network Topology Generation 链路级网络拓扑生成
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.25
Mehmet Burak Akgün, M. H. Gunes
{"title":"Link-Level Network Topology Generation","authors":"Mehmet Burak Akgün, M. H. Gunes","doi":"10.1109/ICDCSW.2011.25","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.25","url":null,"abstract":"Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed network protocols or algorithms do not considerably depend on the underlying topology, the performance generally depends on the topology. As a result, synthetic topologies are widely utilized by network researchers to analyze performance of their design in simulation or emulation environments. Previous studies on the Internet topology generation have ignored the major building block of the networks, i.e., subnetworks. Generated topologies are composed of point to point links. These networks do not ref ect some crucial characteristics of the Internet such as the clustering of the Internet backbone. In this study, we propose subnet based Internet topology generation to better ref ect the underlying building blocks of the Internet. Subnet based synthetic topologies capture both the degree distribution and the subnet distribution characteristics of sample Internet topologies.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"785 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116132219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
ID-based Safety Message Authentication for Security and Trust in Vehicular Networks 基于id的车载网络安全与信任安全消息认证
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.38
S. Biswas, J. Misic, V. Mišić
{"title":"ID-based Safety Message Authentication for Security and Trust in Vehicular Networks","authors":"S. Biswas, J. Misic, V. Mišić","doi":"10.1109/ICDCSW.2011.38","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.38","url":null,"abstract":"We present a safety message authentication scheme for vehicular ad hoc networks using an ID-based signature and verification mechanism. An ID-based technique offers a certificate-less public key verification, while a proxy signature provides flexibilities in message authentication and trust management. In this scheme, we incorporate an ID-based proxy signature framework with the standard ECDSA for VANET's road-side unit (RSU) originated safety application messages. Also, forwarding of signed messages are specially handled to ensure the trust and authentication of RSU's application messages. We claim that this scheme is resilient against all major security threats and also efficient in terms of computation complexity.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Performance Analysis of DSR Protocol under the Influence of RPGM Model in Mobile Ad-hoc Networks 移动自组网中RPGM模型影响下的DSR协议性能分析
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.57
K. Amjad
{"title":"Performance Analysis of DSR Protocol under the Influence of RPGM Model in Mobile Ad-hoc Networks","authors":"K. Amjad","doi":"10.1109/ICDCSW.2011.57","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.57","url":null,"abstract":"In this paper, we have analyzed the performance of a Mobile Ad-hoc Network (MANET) using the Dynamic Source Routing (DSR) protocol with groups of nodes moving according to the Reference Point Group Mobility (RPGM) model. Four different random mobility models, Levy-Walk, Probabilistic Random Way point, Random Direction and Random Walk were selected for group leader's mobility and the effects of changing communication load and transmission ranges were investigated. The results indicate that the performance of DSR is better if group leaders follow Levy-Walk mobility pattern regardless of load and range. The performance of DSR is worse if the leader's mobility behaves like Rand-Dir or Rand Walk mobility models. This study concludes that the behaviour of leaders mobility may have significant impact on the network performance in MANETS.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fine-Grained Localization with Pairwise Nodes Coverage 具有成对节点覆盖的细粒度定位
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.19
Xiaoguang Li, Jie Wu
{"title":"Fine-Grained Localization with Pairwise Nodes Coverage","authors":"Xiaoguang Li, Jie Wu","doi":"10.1109/ICDCSW.2011.19","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.19","url":null,"abstract":"Localization is an important design issue in wireless sensor networks. In this paper, we will focus on the sensor deployment for localization with the consideration of coverage and accuracy. Our pairwise localization pattern requires the information of only two coverages for the target. With this information, there are two possibilities of the position. In order to determine the correct location, we design minimum node deployment with regular pattern and an adaptive sequence based localization algorithm (ASL). The proposed ASL algorithm could accurately localize the node in the monitoring area with minimum cost. Also, we extend our results with the noisy model and provide an analysis of the deployment issue. The simulation results show that compared with the traditional triangular and other localization methods, our strategy can achieve the minimum energy, and maximum lifetime.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117298004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation SenSec:无线传感器网络安全评估的可扩展和精确框架
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.26
Yi-Tao Wang, R. Bagrodia
{"title":"SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation","authors":"Yi-Tao Wang, R. Bagrodia","doi":"10.1109/ICDCSW.2011.26","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.26","url":null,"abstract":"Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful evaluation of the impact of the attack and performance of the countermeasure. In this paper, we present the design and implementation of Sen Sec, a scalable framework that facilitates the development and evaluation of secure WSNs, protocols, and applications. We also demonstrate key benefits of Sen Sec: (1) it allows security evaluation of real sensor applications, (2) it can be easily extended to any real application simulator, (3) it provides a modular structure for defining attack cases and supports extensibility to a broad set of attacks, (4) it supports automatic generation of sophisticated and previously unconsidered attack cases, and (5) it facilitates the analysis and identification of vulnerabilities in security systems and a quantitative evaluation of the impact of attacks and countermeasures in WSNs.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Localized Energy-Aware Fault Management in Relay Based Sensor Networks 基于中继的传感器网络局部能量感知故障管理
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.21
A. Bari, S. Bandyopadhyay, A. Jaekel
{"title":"Localized Energy-Aware Fault Management in Relay Based Sensor Networks","authors":"A. Bari, S. Bandyopadhyay, A. Jaekel","doi":"10.1109/ICDCSW.2011.21","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.21","url":null,"abstract":"In a relay based two-tier sensor network the individual sensor nodes, constituting the lower tier of the network, are partitioned into clusters and transmit their data directly to their respective cluster heads. Higher-powered relay nodes act as cluster heads and form the upper tier of the sensor network, that communicates received data to the base station. In this model, if a relay node becomes faulty, all data from the cluster of the faulty node, as well as data from other clusters that is routed through the faulty node will be lost. To avoid this potentially large data loss, it is critical that, after a failure is detected, data is rerouted as quickly as possible to avoid the failed relay node. This is best achieved by allowing each individual relay node to take corrective action immediately after discovering that a relay node is faulty, without any directive from the base station. Furthermore, it is also important to ensure that the energy dissipation of the relay nodes, using the new route, is as low as possible. In this paper, we propose a novel approach, where only the nodes originally transmitting to the failed node has to change their routing information, and all other nodes continue to operate as before. This greatly simplifies the coordination and synchronization required to establish a new routing scheme, resulting in a faster response time and reduced data loss. We have proposed an integer linear program (ILP) formulation that determines a routing scheme using this approach. We also present a simple but effective heuristic, capable of handling much larger networks. Our simulation results clearly demonstrate that the proposed approach can lead to significant improvements in the lifetime of a two tier network, compared to existing techniques.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114189520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Location Verification with Randomly-Selected Base Stations 随机选择基站的安全位置验证
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.44
Matthew Holiday, N. Mittal, S. Venkatesan
{"title":"Secure Location Verification with Randomly-Selected Base Stations","authors":"Matthew Holiday, N. Mittal, S. Venkatesan","doi":"10.1109/ICDCSW.2011.44","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.44","url":null,"abstract":"In some networks, a mobile node must be located securely as well as accurately. One way to locate is for base stations to use time-difference-of-arrival multilateration. An attacker that can transmit at different times in different directions may falsify its position with respect to known base stations. Previous work proposed hiding the base stations, following a model of \"security through obscurity.\" We propose randomly selecting a set of base stations such that even if their locations are known, the attacker has at most a 50% chance of succeeding in one trial. Through iteration we reduce the likelihood of success to an arbitrarily small probability.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123645961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Low Energy and Adaptive Architecture for Efficient Routing and Robust Mobility Management in Wireless Sensor Networks 无线传感器网络中高效路由和鲁棒移动管理的低能量自适应架构
2011 31st International Conference on Distributed Computing Systems Workshops Pub Date : 2011-06-20 DOI: 10.1109/ICDCSW.2011.39
F. J. Atero, J. J. Vinagre-Díaz, E. Morgado, M. Wilby
{"title":"A Low Energy and Adaptive Architecture for Efficient Routing and Robust Mobility Management in Wireless Sensor Networks","authors":"F. J. Atero, J. J. Vinagre-Díaz, E. Morgado, M. Wilby","doi":"10.1109/ICDCSW.2011.39","DOIUrl":"https://doi.org/10.1109/ICDCSW.2011.39","url":null,"abstract":"Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes which are scattered over a region forming multi-hop and self organized networks, making energy consumption a crucial design issue. These networks are used for various applications such as field monitoring, home automation, seismic and medical data collection or surveillance. Research has shown that clustering sensor nodes is an efficient method to manage energy consumption for prolonging the network lifetime. In this paper we propose a new architecture called HARP, a emph{Hierarchical Adaptive and Reliable Routing Protocol}, a clustering algorithm which builds inter-cluster and intra-cluster hierarchical trees, which are optimized to save power. This architecture is scalable and can be used in both homogeneous and heterogeneous wireless sensor networks. By means of the addition of a emph{recovery slot} in the scheduling scheme, HARP provides efficient link fault tolerance and also supports node mobility management. The same process can additionally function as a joining mechanism for newly deployed nodes. This architecture is highly adaptive to specific application requirements and provides bounded-time data transmissions. Furthermore, a new cluster head election formulation and its associated data gathering protocol (s-HARP) is proposed. This protocol optimizes and balances the energy consumption in the network. Our performance evaluation has shown that HARP and s-HARP can significantly reduce the energy consumption and prolong the useful lifetime of the network in typical applications as compared with the most popular wireless sensor network protocol.","PeriodicalId":133514,"journal":{"name":"2011 31st International Conference on Distributed Computing Systems Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信