Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications最新文献

筛选
英文 中文
The Index Poisoning Attack in P2P File Sharing Systems P2P文件共享系统中的索引投毒攻击
Jian Liang, Naoum Naoumov, K. Ross
{"title":"The Index Poisoning Attack in P2P File Sharing Systems","authors":"Jian Liang, Naoum Naoumov, K. Ross","doi":"10.1109/INFOCOM.2006.232","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.232","url":null,"abstract":"P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when a user searches for a targeted title, the index returns bogus results, such as bogus file identifiers, bogus IP addresses, or bogus port numbers. In this paper we first show that both structured and unstructured P2P file-sharing systems are highly vulnerable to the index poisoning attack. We then develop a novel and efficient methodology for estimating index poisoning levels and pollution levels in file-sharing systems. The methodology is efficient in that involves neither the downloading nor the analysis of binary content files. We deploy data-harvesting platforms for FastTrack, an unstructured file-sharing system, and Overnet, a DHT-based file-sharing system. Applying our methodology to harvested data, we find that index poisoning is pervasive in both systems. We also outline a distributed blacklisting procedure for countering the index poisoning and pollution attacks.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 225
Fault-Tolerant Wireless Access Network Design for Dual-Homed Users 双主用户容错无线接入网设计
Xiaodong Huang, Jianping Wang, V. Vokkarane, J. Jue
{"title":"Fault-Tolerant Wireless Access Network Design for Dual-Homed Users","authors":"Xiaodong Huang, Jianping Wang, V. Vokkarane, J. Jue","doi":"10.1109/INFOCOM.2006.152","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.152","url":null,"abstract":"In this paper, we study the survivability problem in hierarchical wireless access networks with dual-homed end users, who are connected to two base stations (BSs), a primary BS and a backup BS. The dual homing mechanism is resilient to a single failure of a BS. However, if a failure occurs at the base station controller (BSC) layer or at the mobile switching center (MSC) layer, dual-homing may not prevent connection loss. We address the problem of routing from BSs to BSCs and from BSCs to MSCs, with the objective of minimizing the maximum number of connections lost due to a single failure of BS, BSC, or MSC. We first formulate the problem using Integer Linear Programming (ILP). We then prove that this optimization problem is NP-hard by showing some of its subproblems with relaxed constraints are still NP-hard. A Tabu Search (TS) based heuristic is then proposed for the problem, which provides near optimal results in most cases.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Relay Placement for Higher Order Connectivity in Wireless Sensor Networks 无线传感器网络中高阶连接的中继安置
Abhishek Kashyap, S. Khuller, M. Shayman
{"title":"Relay Placement for Higher Order Connectivity in Wireless Sensor Networks","authors":"Abhishek Kashyap, S. Khuller, M. Shayman","doi":"10.1109/INFOCOM.2006.273","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.273","url":null,"abstract":"Sensors typically use wireless transmitters to communicate with each other. However, sensors may be located in a way that they cannot even form a connected network (e.g, due to failures of some sensors, or loss of battery power). In this paper we consider the problem of adding the smallest number of additional (relay) nodes so that the induced communication graph is 2-connected. The problem is NP -hard. In this paper we develop O(1)-approximation algorithms that find close to optimal solutions in time O((kn)) for achieving k-edge connectivity of n nodes. The worst case approximation guarantee is 10, but the algorithm produces solutions that are far better than this bound suggests. We also consider extensions to higher dimensions, and the scheme that we develop for points in the plane, yields a bound of 2dMST where dMST is the maximum degree of a minimum-degree Minimum Spanning Tree in d dimensions using Euclidean metrics. In addition, our methods extend with the same approximation guarantees to a generalization when the locations of relays are required to avoid certain polygonal regions (obstacles). We also prove that if the sensors are uniformly and identically distributed in a unit square, the expected number of relay nodes required goes to zero as the number of sensors goes to infinity.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
Efficiency Centric Communication Model for Wireless Sensor Networks 无线传感器网络的效率中心通信模型
Qing Cao, T. He, Lei Fang, T. Abdelzaher, J. Stankovic, S. Son
{"title":"Efficiency Centric Communication Model for Wireless Sensor Networks","authors":"Qing Cao, T. He, Lei Fang, T. Abdelzaher, J. Stankovic, S. Son","doi":"10.1109/INFOCOM.2006.193","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.193","url":null,"abstract":"Recent studies on radio reality provided strong evidence that radio links between low-power sensor devices are extremely unreliable. In this paper, we study how to improve energy efficiency for reliable communication using such unreliable links. We identify an optimal bound on energy efficiency for reliable communication, and propose a new communication model in the link layer that asymptotically approaches this bound. This new model indicates a better path metric compared to previous path metrics, and we validate this by establishing a routing infrastructure based on this metric, which indeed achieves a higher energy efficiency compared to other stateof-the-art approaches. We present results from a systematic analysis, simulations and prototype experiments based on the MicaZ platform. The results give us fundamental insights on communication efficiency over unreliable links.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
A Stochastic Random-Races Algorithm for Routing in MPLS Traffic Engineering MPLS流量工程中一种随机竞争路由算法
B. Oommen, S. Misra, Ole-Christoffer Granmo
{"title":"A Stochastic Random-Races Algorithm for Routing in MPLS Traffic Engineering","authors":"B. Oommen, S. Misra, Ole-Christoffer Granmo","doi":"10.1109/INFOCOM.2006.90","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.90","url":null,"abstract":"This paper presents an efficient adaptive online routing algorithm for the computation of bandwidth-guaranteed paths in Multiprotocol Label Switching (MPLS) based networks, using a learning scheme that computes an optimal ordering of routes. This work has two-fold contributions. The first is that we propose a new class of solutions other than those available in the literature incorporating the family of stochastic Random-Races (RR) algorithms. The most popular previouslyproposed MPLS Traffic Engineering (TE) solutions attempt to find a superior path to route an incoming path setup request. Our algorithm, on the other hand, tries to learn an optimal ordering of the paths through which requests can be routed according to the “rank” of the paths in the order learnt by the algorithm. The second contribution of our work is that we have proposed a routing algorithm that has better performance than the important algorithms in the literature. The efficiency of our algorithm was experimentally established.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications RandPeer: QoS敏感点对点应用的成员管理
Jin Liang, K. Nahrstedt
{"title":"RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications","authors":"Jin Liang, K. Nahrstedt","doi":"10.1109/INFOCOM.2006.209","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.209","url":null,"abstract":"Many Peer-to-peer (P2P) applications such as media broadcasting and content distribution require a high performance overlay structure in order to deliver satisfying quality of service (QoS). Previous approaches to building such overlays either involve non-scalable solutions such as global information and shared contact point, or rely on gossip style membership dissemination, which lacks QoS awareness. In this paper, we present a distributed membership service called RandPeer, which manages membership information on behalf of P2P applications, and allows peers to locate good neighbors based on their QoS characteristics. Using this service, P2P applications can easily construct their overlays in a scalable and QoS aware fashion. We have implemented RandPeer and experimented in both local and wide area environments. Our results show that (1) RandPeer is scalable and robust to highly dynamic P2P memberships; (2) RandPeer has good lookup performance, both in terms of response time and the randomness of peer selection. The latter improves load balancing and failure resilience of P2P applications; (3) when used to improve the performance of a mesh based P2P overlay, RandPeer achieves 10% improvement in just 2 protocol rounds, which is more than 5 times faster than pure random neighbor selections.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129714834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Utility-Optimal Medium Access Control: Reverse and Forward Engineering 效用-最优介质访问控制:逆向和正向工程
Jang-Won Lee, M. Chiang, A. Calderbank
{"title":"Utility-Optimal Medium Access Control: Reverse and Forward Engineering","authors":"Jang-Won Lee, M. Chiang, A. Calderbank","doi":"10.1109/INFOCOM.2006.252","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.252","url":null,"abstract":"This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-engineer the current exponential backoff (EB) type of MAC protocols such as the BEB (binary exponential backoff) in the IEEE 802.11 standard through a non-cooperative game- theoretic model. This MAC protocol is shown to be implicitly maximizing, using a stochastic subgradient, a selfish local utility at each link in the form of expected net reward for successful transmission. While the existence of a Nash equilibrium can be established, neither convergence nor social welfare optimality is guaranteed due to the inadequate feedback mechanism in the EB protocol. This motivates the forward-engineering part of the paper, where a network-wide utility maximization problem is for- mulated, using a collision and persistence probability model and aligning selfish utility with total social welfare. By adjusting the parameters in the utility objective functions of the NUM problem, we can also control the tradeoff between efficiency and fairness of radio resource allocation through a rigorous and systematic design. We develop two distributed algorithms to solve the MAC design NUM problem, which lead to random access protocols that have slightly more message passing overhead than the current EB protocol, but significant potential for efficiency and fairness improvement. We provide readily-verifiable sufficient conditions under which convergence of the proposed algorithms to a global optimality of network utility can be guaranteed, and through numerical examples illustrate the value of the NUM approach to the complexity-performance tradeoff in MAC design.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127143369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Achieving Delay Guarantees in Ad Hoc Networks through Dynamic Contention Window Adaptation 通过动态竞争窗口自适应实现Ad Hoc网络的时延保证
Yaling Yang, R. Kravets
{"title":"Achieving Delay Guarantees in Ad Hoc Networks through Dynamic Contention Window Adaptation","authors":"Yaling Yang, R. Kravets","doi":"10.1109/INFOCOM.2006.213","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.213","url":null,"abstract":"In this paper, we propose a new protocol, named DDA (Distributed Delay Allocation), which provides average delay guarantees to real-time multimedia applications in wireless ad hoc networks. By adapting the contention window sizes of IEEE 802.11, DDA schedules packets of flows according to their individual delay requirements. The novelty of DDA is that it imposes no control message overhead on the network and does not depend on explicit knowledge of channel capacity. We rigorously prove the convergence property of DDA and show that it always converges to a contention window allocation that satisfies all competing realtime flows’ delay requirements, if the requirements of all realtime flows do not exceed the capacity of the network.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Stall and Path Monitoring Issues in SCTP SCTP中的失速和路径监控问题
J. Noonan, Philip Perry, S. Murphy, John Murphy
{"title":"Stall and Path Monitoring Issues in SCTP","authors":"J. Noonan, Philip Perry, S. Murphy, John Murphy","doi":"10.1109/INFOCOM.2006.289","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.289","url":null,"abstract":"This paper presents how SCTP can stall in multihomed scenarios during failover and under certain circumstances. A stall is where an SCTP end-point ceases to communicate for an extended period of time, but does not report any error to the upper layer. This paper presents two different sets of circumstances where a stall can occur: firstly when there is an underestimation of the Retransmission Time-Out (RTO) value for a redundant network path; and secondly when a network error occurs that causes only SACKs to be lost, which confuses the SCTP sender about which network path is operational. Solutions to both of these stalls are presented that include modifying the RTO value, applying Karn’s algorithm to path monitoring and ensuring the destination address selection policy for SACKs is changed. This paper also presents a mechanism to de-couple data acknowledgement and path monitoring when using multi-homed transport protocols, which should remove the ambiguity about path monitoring and offers a universal solution to the stall.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130564483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications 分布式网络效用最大化的可选分解:框架和应用
D. Palomar, M. Chiang
{"title":"Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications","authors":"D. Palomar, M. Chiang","doi":"10.1109/INFOCOM.2006.257","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.257","url":null,"abstract":"Network utility maximization (NUM) problems pro- vide an important approach to conduct network resource man- agement and to view layering as optimization decomposition. In the existing literature, distributed implementations are typically achieved by the means of the so-called dual decomposition technique. However, the span of decomposition possibilities includes many other elements which thus far have not been fully exploited, such as the use of the primal decomposition technique, the versatile introduction of auxiliary variables, and the potential of multilevel decompositions. This paper presents a systematic framework to exploit the potential of the alternative decomposition structures as a way to obtain different distributed algorithms, each with a different tradeoff among convergence speed, message passing amount and asymmetry, and distributed computation architecture. Many specific applications are consid- ered to illustrate the proposed framework, including resource- constrained and direct-control rate allocation, and rate allocation among QoS classes and with multipath routing. For each of these applications, the associated generalized NUM formulation is first presented, followed by the development of novel alternative decompositions and numerical experiments on the resulting new distributed algorithms.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信