39th Annual IEEE Conference on Local Computer Networks最新文献

筛选
英文 中文
Cross-layer optimisation for topology design of wireless multicast networks via network coding 基于网络编码的无线组播网络拓扑设计的跨层优化
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-08 DOI: 10.1109/LCN.2014.6925818
Quoc-Tuan Vien, Wanqing Tu, H. Nguyen, R. Trestian
{"title":"Cross-layer optimisation for topology design of wireless multicast networks via network coding","authors":"Quoc-Tuan Vien, Wanqing Tu, H. Nguyen, R. Trestian","doi":"10.1109/LCN.2014.6925818","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925818","url":null,"abstract":"One of the main challenges towards reliable multicast transmissions over wireless networks is the dynamics of the wireless links (e.g. wireless errors, fading, interference, collisions, etc.) that can cause retransmissions overhead over the limited available bandwidth. To this end this paper considers the scenario of wireless multicast networks where network coding is applied to improve network throughput. We first propose a novel cross-layer optimisation framework for network topology design in order to optimise the wireless multicast rate, data flow of the wireless links, energy supply and node lifetime. The performance of the proposed solution is evaluated and compared against other solutions from the literature in terms of system throughput, total energy, and network lifetime. The results show that the proposed cross-layer design outperforms the other schemes involved, reaching up to 50% increase in the system throughput.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure key renewal and revocation for Wireless Sensor Networks 无线传感器网络安全密钥更新与撤销
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-08 DOI: 10.1109/LCN.2014.6925797
Ismail Mansour, G. Chalhoub, P. Lafourcade, F. Delobel
{"title":"Secure key renewal and revocation for Wireless Sensor Networks","authors":"Ismail Mansour, G. Chalhoub, P. Lafourcade, F. Delobel","doi":"10.1109/LCN.2014.6925797","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925797","url":null,"abstract":"Once a secure mechanism for authenticated communication is deployed in a Wireless Sensor Network (WSN), several situations may arise: a node can leave the network, a new node can join the network, an intruder could try to join the network or capture a node. Therefore it is important to revoke and renew certain keys that are learned by a malicious node. We propose several secure WSN protocols for revocations and renewal of cryptographic keys in the network based on symmetric encryption and elliptic curve cryptography (ECC). For all our solutions, we provide a formal analysis of the security of our protocols using Scyther, an automatic verification tool for cryptographic protocols. All the proposed protocols are proven secure but have different security levels by using different types of keys. Finally we implemented all our protocols on real testbeds using TelosB motes and compared their efficiency.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A cooperative localization scheme using RFID crowdsourcing and time-shifted multilateration 一种基于RFID众包和时移乘法的合作定位方案
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925771
Lobna M. Eslim, H. Hassanein, Walid M. Ibrahim, A. Alma'aitah
{"title":"A cooperative localization scheme using RFID crowdsourcing and time-shifted multilateration","authors":"Lobna M. Eslim, H. Hassanein, Walid M. Ibrahim, A. Alma'aitah","doi":"10.1109/LCN.2014.6925771","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925771","url":null,"abstract":"RFID technology as an enabler of the Internet of Things (IoT) is extensively utilized for object localization. Existing RFID-based object localization techniques follow a centralized and coordinated approach. Indeed, none is designed to leverage RFID crowdsourcing for the purpose of object localization. In this paper, we propose a cooperative scheme to localize mobile RFID tags using heterogeneous, distributed and dynamic mobile RFID readers in indoor/outdoor environments. In addition, we introduce the concept of Time-Shifted Multilateration (TSM) to enhance location estimation accuracy of mobile tags when sufficient synchronous detection information is not available. We validate the proposed scheme and the TSM technique through extensive simulations using ns-3. Results show that our approach can achieve accurate location estimation in typical IoT settings.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123458755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Gen2v2 compliant RFID authentication and ownership management protocol 符合Gen2v2的RFID认证和所有权管理协议
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925788
Haifeng Niu, S. Jagannathan, E. Taqieddin
{"title":"A Gen2v2 compliant RFID authentication and ownership management protocol","authors":"Haifeng Niu, S. Jagannathan, E. Taqieddin","doi":"10.1109/LCN.2014.6925788","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925788","url":null,"abstract":"Passive RFID tags and readers are initialized with secret keys which are updated after a successful cycle of authenticatio. Ownership transfer builds upon mutual authentication where a tagged item is shifted from one owner to another. Since the available protocols provide limited security for passive RFID systems and are vulnerable to attackers, we propose a novel ultra-lightweight authentication and ownership management protocol which conforms to the EPC Class-1 Generation-2 Version 2 standard while taking into account the storage and computational resources of the tags. The protocol is successfully implemented on hardware to overcome the weaknesses of the available protocols. The experimental results show that the use of such protocol ensures security with little added communication and computation overhead.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131442753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A deterministic QoE formalization of user satisfaction demands (DQX) 用户满意度需求(DQX)的确定性QoE形式化
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925776
Christos Tsiaras, B. Stiller
{"title":"A deterministic QoE formalization of user satisfaction demands (DQX)","authors":"Christos Tsiaras, B. Stiller","doi":"10.1109/LCN.2014.6925776","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925776","url":null,"abstract":"Measuring the impact of technical variables, such as latency, bandwidth, or resources priority-access, on Quality-of-Experience (QoE) of various services demands an extensive feedback from end-users, when those variables change. Estimating QoE in a given scenario becomes harder, when non-technical variables, such as price, need to be considered in addition to technical ones. In any case, detailed feedback that correlates all variables affecting QoE is needed by end-users for each service separately. In this work a deterministic mathematical model (DQX) encapsulating user demands, service characteristics, and variable specifications is proposed to formalize the QoE calculation, considering one or multiple and diverse variables. The output of QoE functions presented here can be normalized such that results will be compatible with the five-point scale Mean Opinion Score (MOS), proposed by the ITU-T.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124719000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On the possibility of mitigating content pollution in Content-Centric Networking 在以内容为中心的网络中减少内容污染的可能性
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925826
Igor G. Ribeiro, Antonio A. Rocha, C. Albuquerque, Flavio Guimaraes
{"title":"On the possibility of mitigating content pollution in Content-Centric Networking","authors":"Igor G. Ribeiro, Antonio A. Rocha, C. Albuquerque, Flavio Guimaraes","doi":"10.1109/LCN.2014.6925826","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925826","url":null,"abstract":"Content-Centric Networking is an architecture proposal for the future Internet that brings fundamental changes in the way the network operates. Contents are identified and requested based on their names and for security reasons they must be digitally signed by their publishers. Even though this new architecture was designed to be safe, one potential security threat is that malicious publishers may create polluted versions of legitimate contents, reducing their availability and degrading network resources. Because of the non-negligible overhead of checking a large number of signatures, it is not feasible to make it a mandatory task for every router, especially in the network core. In this paper, we propose CCNCheck: a mechanism in which CCN routers probabilistically check the content signatures. We evaluate the mechanism against simulations and found evidences that using CCNCheck increases the fraction of recovered contents and decreases the wastage of network resources.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
MPFC: Massively Parallel Firewall Circuits MPFC:大规模并行防火墙电路
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925785
Sven Hager, F. Winkler, B. Scheuermann, Klaus Reinhardt
{"title":"MPFC: Massively Parallel Firewall Circuits","authors":"Sven Hager, F. Winkler, B. Scheuermann, Klaus Reinhardt","doi":"10.1109/LCN.2014.6925785","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925785","url":null,"abstract":"The process of matching the header fields of network packets against a set of rules is a performance critical task of firewalls. Software-based solutions have no chance to keep pace with the ever-growing data rates in high-speed networks. However, specialized filtering hardware is costly because complex logic is required in order to be able to apply arbitrary rulesets to a packet stream. By adapting the implemented logic to the specific firewall ruleset, FPGAs allow for much more specifically tailored and thus more efficient processing than ruleset-independent circuits in an ASIC. We present MPFC, a method to generate customized firewall circuits in the form of synthesizable VHDL code for FPGA configuration. The highly parallel MPFC circuits achieve a deterministic throughput of one packet per clock cycle, can be operated at high clock frequencies, and provide orders of magnitudes shorter processing latencies than previous work in this direction.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A cross layer routing scheme for passive RFID tag-to-tag communication 无源RFID标签对标签通信的跨层路由方案
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925811
Haifeng Niu, S. Jagannathan
{"title":"A cross layer routing scheme for passive RFID tag-to-tag communication","authors":"Haifeng Niu, S. Jagannathan","doi":"10.1109/LCN.2014.6925811","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925811","url":null,"abstract":"A routing protocol for Passive RFID tag-to-tag networks is not reported in contrast with routing protocols for battery powered mobile wireless ad hoc and sensor networks. In this paper, we provide a cross-layer approach for passive RFID tag-to-tag communication. In the data link layer, we designed the medium access control (MAC) protocol which is suitable for passive tag-to-tag communication. In the network layer, we developed the optimal link cost multipath routing (OLCMR) protocol by using modulation depth as the link cost. Simulation results verify that proposed routing protocol consumes less energy when it is compared to optimum link state routing (OLSR). Additionally, when compared to the single path routing, the proposed multipath routing protocol increases the delivery ratio significantly.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Real-world evaluation of Sensor Context-aware Adaptive Duty-cycled opportunistic routing 传感器上下文感知自适应占空比机会路由的实际评估
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925764
Zhongliang Zhao, T. Braun
{"title":"Real-world evaluation of Sensor Context-aware Adaptive Duty-cycled opportunistic routing","authors":"Zhongliang Zhao, T. Braun","doi":"10.1109/LCN.2014.6925764","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925764","url":null,"abstract":"Energy is of primary concern in wireless sensor networks (WSNs). Low power transmission makes the wireless links unreliable, which leads to frequent topology changes. Resulting packet retransmissions aggravate the energy consumption. Beaconless routing approaches, such as opportunistic routing (OR) choose packet forwarders after data transmissions, and are promising to support dynamic features of WSNs. This paper proposes SCAD - Sensor Context-aware Adaptive Duty-cycled beaconless OR for WSNs. SCAD is a cross-layer routing solution and it brings the concept of beaconless OR into WSNs. SCAD selects packet forwarders based on multiple types of network contexts. To achieve a balance between performance and energy efficiency, SCAD adapts duty-cycles of sensors based on real-time traffic loads and energy drain rates. We implemented SCAD in TinyOS running on top of Tmote Sky sensor motes. Real-world evaluations show that SCAD outperforms other protocols in terms of both throughput and network lifetime.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring the impact of denial-of-service attacks on wireless sensor networks 测量拒绝服务攻击对无线传感器网络的影响
39th Annual IEEE Conference on Local Computer Networks Pub Date : 2014-09-01 DOI: 10.1109/LCN.2014.6925784
Michael Riecker, Dan Thies, M. Hollick
{"title":"Measuring the impact of denial-of-service attacks on wireless sensor networks","authors":"Michael Riecker, Dan Thies, M. Hollick","doi":"10.1109/LCN.2014.6925784","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925784","url":null,"abstract":"Wireless sensor networks (WSNs) are especially susceptible to denial-of-service attacks due to the resource-constrained nature of motes. We follow a systematic approach to analyze the impacts of these attacks on the network behavior; therefore, we first identify a large number of metrics easily obtained and calculated without incurring too much overhead. Next, we statistically test these metrics to assess whether they exhibit significantly different values under attack when compared to those of the baseline operation. The metrics look into different aspects of the motes and the network, for example, MCU and radio activities, network traffic statistics, and routing related information. Then, to show the applicability of the metrics to different WSNs, we vary several parameters, such as traffic intensity and transmission power. We consider the most common topologies in wireless sensor networks such as central data collection and meshed multi-hop networks by using the collection tree and the mesh protocol. Finally, the metrics are grouped according to their capability of distinction into different classes. In this work, we focus on jamming and blackhole attacks. Our experiments reveal that certain metrics are able to detect a jamming attack on all motes in the testbed, irrespective of the parameter combination, and at the highest significance value. To illustrate these facts, we use a standard testbed consisting of the widely-employed TelosB motes.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信