{"title":"Back to the future: A need for multi-drop Ethernet for cost-effective power distribution","authors":"Kenneth J. Christensen, B. Nordman","doi":"10.1109/LCN.2014.6925796","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925796","url":null,"abstract":"Local renewable DC electricity sources, such as solar, have become cost competitive. In this position paper, we argue that an Ethernet LAN with Power-over-Ethernet (PoE) is a nanogrid where the physical layer infrastructure is used for DC electricity distribution and the link-layer capabilities can be used to match electricity supply and demand. To be cost effective with respect to wiring, many of these nanogrids must be multi-drop where each drop may be a power socket. Open challenges to employing PoE as a multi-drop managed nanogrid include 1) extending LLDP for multi-drop, 2) adapting LLDP to support the use of price signals for modulating power demand, 3) achieving efficient PoE power flow in a multi-drop circuit, and 4) implementing low-cost and fair scheduling for packet transmission. We explore how multi-drop Ethernet can be implemented with fair access to all devices by employing at each drop a mini-switch with packet scheduling.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128543953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Carmo, Justus Hoffmann, Volker Willert, M. Hollick
{"title":"Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection","authors":"R. Carmo, Justus Hoffmann, Volker Willert, M. Hollick","doi":"10.1109/LCN.2014.6925790","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925790","url":null,"abstract":"Practical intrusion detection in Wireless Multihop Networks (WMNs) is a hard challenge. The distributed nature of the network makes centralized intrusion detection difficult, while resource constraints of the nodes and the characteristics of the wireless medium often render decentralized, node-based approaches impractical. We demonstrate that an active-probing-based network intrusion detection system (AP-NIDS) is practical for WMNs. The key contribution of this paper is to optimize the active probing process: we introduce a general Bayesian model and design a probe selection algorithm that reduces the number of probes while maximizing the insights gathered by the AP-NIDS. We validate our model by means of testbed experimentation. We integrate it to our open source AP-NIDS DogoIDS and run it in an indoor wireless mesh testbed utilizing the IEEE 802.11s protocol. For the example of a selective packet dropping attack, we develop the detection states for our Bayes model, and show its feasibility. We demonstrate that our approach does not need to execute the complete set of probes, yet we obtain good detection rates.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132272792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Comsa, Mehmet Emin Aydin, Sijing Zhang, P. Kuonen, J. Wagen, Yao Lu
{"title":"Scheduling policies based on dynamic throughput and fairness tradeoff control in LTE-A networks","authors":"I. Comsa, Mehmet Emin Aydin, Sijing Zhang, P. Kuonen, J. Wagen, Yao Lu","doi":"10.1109/LCN.2014.6925806","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925806","url":null,"abstract":"In LTE-A cellular networks there is a fundamental trade-off between the cell throughput and fairness levels for preselected users which are sharing the same amount of resources at one transmission time interval (TTI). The static parameterization of the Generalized Proportional Fair (GPF) scheduling rule is not able to maintain a satisfactory level of fairness at each TTI when a very dynamic radio environment is considered. The novelty of the current paper aims to find the optimal policy of GPF parameters in order to respect the fairness criterion. From sustainability reasons, the multi-layer perceptron neural network (MLPNN) is used to map at each TTI the continuous and multidimensional scheduler state into a desired GPF parameter. The MLPNN non-linear function is trained TTI-by-TTI based on the interaction between LTE scheduler and the proposed intelligent controller. The interaction is modeled by using the reinforcement learning (RL) principle in which the LTE scheduler behavior is modeled based on the Markov Decision Process (MDP) property. The continuous actor-critic learning automata (CACLA) RL algorithm is proposed to select at each TTI the continuous and optimal GPF parameter for a given MDP problem. The results indicate that CACLA enhances the convergence speed to the optimal fairness condition when compared with other existing methods by minimizing in the same time the number of TTIs when the scheduler is declared unfair.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134341265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing information propagation in a transoceanic aircraft delay tolerant network","authors":"R. Martínez-Vidal, Ramon Martí, J. Borrell","doi":"10.1109/LCN.2014.6925763","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925763","url":null,"abstract":"In this paper we analyze information propagation inside a large scale delay tolerant network (DTN) of transoceanic aircraft. We characterized this network at LCN 2013, a scenario constructed from more than 2,500 traces of trans-Atlantic flights in which communications rely on the sporadic contacts between airplanes. We observe the traffic of this network and analyze how two epidemic based routing protocols behave in this scenario. We use simulations to compare their performance through metrics such as the network traffic per packet, end-to-end-delay and delivery ratio. The analysis of data propagation inside this DTN aims to evaluate the feasibility of using this network as a reliable way to deliver on-flight generated data (either from passengers or company) to the ground. This approach seeks to provide applications with a cheaper alternative to other communication systems.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133562981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dung Vu Ba Tien, M. Komu, M. Siekkinen, Antti Ylä-Jääski
{"title":"H-box: Interconnecting devices across local networks","authors":"Dung Vu Ba Tien, M. Komu, M. Siekkinen, Antti Ylä-Jääski","doi":"10.1109/LCN.2014.6925778","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925778","url":null,"abstract":"Sharing of devices across separate networks is currently challenging. Users may want to give their friends remote access to their home entertainment devices, but a secure and easy-to-use solution has not yet emerged. While service discovery frameworks provide a uniform interface for different networked devices to interact, most of them, especially the widely adopted Universal Plug and Play, fail to connect devices in separate networks. This paper proposes a proxy-based architecture H-box that bridges different UPnP-based networks. We integrate a number of standardized protocols, namely XMPP, HIP and Teredo in a novel way to achieve our goal. The prototype runs on Raspberry Pi, bridging commodity UPnP devices located in remote networks. The performance evaluation shows that the approach is feasible even for media streaming between homes. Further, we envision the H-box architecture to be adopted for car entertainment systems and extended to support device sharing and collaboration between separate networks.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124758222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approximation to rate-equalization fairness with logarithmic complexity for QoS","authors":"J. Cobb, Suparn Gupta","doi":"10.1109/LCN.2014.6925808","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925808","url":null,"abstract":"Rate-guaranteed scheduling protocols ensure that packets from each input flow are forwarded at a rate no less than the rate reserved by the flow. WFQ is the classical example. Many of these protocols, including WFQ, provide both rate and fairness guarantees. In particular, they distribute unused capacity among among the flows in proportion to the reserved rate of each flow. In earlier work, we presented a scheduling algorithm that distributes unused capacity to flows whose reserved rate is the least. However, the per-packet complexity of this algorithm, known as rate-equalization fairness, is linear in the number of flows. Here, we present an algorithm that approximates rate-equalization fairness, but with only logarithmic complexity per packet.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogita Chapre, A. Ignjatović, A. Seneviratne, Sanjay Jha
{"title":"CSI-MIMO: Indoor Wi-Fi fingerprinting system","authors":"Yogita Chapre, A. Ignjatović, A. Seneviratne, Sanjay Jha","doi":"10.1109/LCN.2014.6925773","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925773","url":null,"abstract":"Wi-Fi based fingerprinting systems, mostly utilize the Received Signal Strength Indicator (RSSI), which is known to be unreliable due to environmental and hardware effects. In this paper, we present a novel Wi-Fi fingerprinting system, exploiting the fine-grained information known as Channel State Information (CSI). The frequency diversity of CSI can be effectively utilized to represent a location in both frequency and spatial domain resulting in more accurate indoor localization. We propose a novel location signature CSI-MIMO that incorporates Multiple Input Multiple Output (MIMO) information and use both the magnitude and the phase of CSI of each sub-carrier. We experimentally evaluate the performance of CSI-MIMO fingerprinting using the k-nearest neighbor and the Bayes algorithm. The accuracy of the proposed CSI-MIMO is compared with Finegrained Indoor Fingerprinting System (FIFS) and a simple CSI-based system. The experimental result shows an accuracy improvement of 57% over FIFS with an accuracy of 0.95 meters.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"R-28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Efficient Framework for Localization and Coverage in Participatory Urban Sensing","authors":"Adnan Khan, S. Imon, Sajal K. Das","doi":"10.1109/LCN.2014.6925772","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925772","url":null,"abstract":"Participatory sensing is an approach to data collection where individuals use their smartphones to capture different scenarios, and upload to a server to create knowledge. A fundamental issue in such data collection process is the coverage of the collected data that reflects how well the targeted area is monitored. To ensure coverage requirements, the traditional approaches require the server to know the location of the participating mobile devices that takes significant amount of energy. In this paper, we propose a novel framework called PLUS for data collection in participatory sensing ensuring partial coverage, where a mobile device does not send location updates to the server. We also propose an energy efficient localization scheme called sLoc, designed for a mobile device to participate in the data collection process with PLUS. Finally, simulating a continuous monitoring application, we show that PLUS can save significant amount of energy, as compared to traditional approaches.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"63 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133935069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical passive shared bottleneck detection using shape summary statistics","authors":"D. Hayes, Simone Ferlin Oliveira, M. Welzl","doi":"10.1109/LCN.2014.6925767","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925767","url":null,"abstract":"Practical shared bottleneck detection has proved to be a difficult problem. We present a novel passive approach using efficient estimates of time and frequency domain summary statistics. The approach is not CPU nor network intensive, and has numerous potential applications in the Internet. Simulations and tests over the Internet and 3G cellular network show its efficacy in grouping flows correctly.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127610137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Anomaly Detection in the presence of P2P traffic","authors":"Sardar Ali, Kui Wu, Hassan Khan","doi":"10.1109/LCN.2014.6925822","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925822","url":null,"abstract":"Recent estimates suggest that p2p traffic comprises a significant fraction of today's Internet traffic. Previous work has shown that p2p traffic can have a considerable adverse impact on the accuracy (detection and false alarm rates) of Anomaly Detection Systems (ADSs). In this paper, we propose a solution to mitigate this accuracy degradation by identifying novel traffic features which can accurately discriminate between p2p and attack traffic. Using these features, we develop a traffic preprocessor which compensates for the negative effects of p2p traffic on anomaly detection. Our solution does not rely on any p2p traffic classifier and is thus more robust and efficient. We implement and empirically evaluate the proposed solution on an OpenFlow testbed with four prominent non-proprietary ADSs. Experimental results show that our proposed method provides about 35% increase in detection rate and about 50% decrease in false alarm rates.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132779011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}