{"title":"e-Health AON (Application-Oriented Networks)","authors":"Wei Liu, Eun Kyo Park","doi":"10.1109/ICCCN.2013.6614130","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614130","url":null,"abstract":"As the world is gearing up towards implementation of digital healthcare networking solutions, the solution roadmap for a national e-Health interconnection network infrastructure is in great demand. This paper first identifies the major benefits in interconnection services that are critical to universal deployment. Then it provides an overview of our e-Health AON (Application Oriented Network) approach that offers direct support to the aspects of interconnection services, operational management services, and security control services. To further achieve the desired effects, this paper presents performance validation plans to assist the realization of a universal e-Health application interconnection network.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimal Algorithm for Time-Slot Assignment in SS/TDMA Satellite Systems","authors":"Xili Wan, Feng Shan, Xiaojun Shen","doi":"10.1109/ICCCN.2013.6614107","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614107","url":null,"abstract":"Packet scheduling in switches plays an important role in providing guaranteed service to meet Quality-of-Service (QoS) requirements. In this paper, we revisit a historical Maximum Traffic Time-slot Scheduling (MTTS) problem for both circuit- and packet-switched traffic in SS/TDMA satellite systems proposed two decades ago by Bonuccelli et al.. They developed a two-step approach to solve the MTTS problem, which scheduled the circuit-switched traffic first into TDMA frames and then inserted packets from packet-switched traffic into empty slots in these scheduled TDMA frames as many as possible. This problem was referred as Incremental Time-slot Assignment (ITSA) Problem in their paper, and was proved to be NP-hard. Therefore, MTTS problem seems to be NP-hard due the the NP-hardness of ITSA problem induced by their two-step approach. However, in this paper, we show that MTTS problem is NOT NP-hard, since there exists an optimal algorithm for this problem. By aggregating the traffic in scheduled TDMA frames, an optimal algorithm based on network flow method is developed for MTTS problem, which can solve the MTTS problem in polynomial time. Theoretic proof for the optimality of our algorithm is given and simulations results further validate the correctness of our algorithm.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132884156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure RFID Authentication Protocol with Key Updating Technique","authors":"G. Khan, G. Zhu","doi":"10.1109/ICCCN.2013.6614192","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614192","url":null,"abstract":"RFID systems are being used in various pervasive applications. Therefore, security and privacy protection is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the system security against replay, eavesdropping and man-in-the-middle attacks while maintaining lower computation, communication and storage. We also compare our authentication method with some recent protocols that deploy the same cipher (XTEA) by implementing the protocols on the same RF based system. Our proposed authentication protocol provides higher security level and lower computation and communication costs.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Braun, Massimo Monti, M. Sifalakis, C. Tschudin
{"title":"An Empirical Study of Receiver-Based AIMD Flow-Control Strategies for CCN","authors":"Stefan Braun, Massimo Monti, M. Sifalakis, C. Tschudin","doi":"10.1109/ICCCN.2013.6614106","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614106","url":null,"abstract":"The Content Centric Network (CCNx) protocol introduces a new routing and forwarding paradigm for the waist of the future Internet architecture. Below CCN, a volatile set of transport and flow-control strategies is envisioned, which can match better different service requirements, than current TCP/IP technology does. Although a broad range of possibilities has not been explored yet, there are already several proponents of strategies that come close to TCP's well-known flow control mechanism (timeout-driven, window-based, and AIMD- operated). In this paper, we carry out an empirical exploration of some proposed strategies in order to assert their feasibility and efficiency. Our contributions are twofold: First, we establish if receiver-based, timeout-driven, AIMD operated flow-control on Interest transmissions is sufficiently effective for CCN in a future Internet deployment, where it may co-exist with TCP. In this process we compare the performance of three different variants of this strategy, in presence of multi-homed content in the network (one of them proposed by the authors). Second, we provide indicators for the general efficiency of timeout-based flow-control at the CCN receiver, in presence of in-network caching, and exhibit some of the challenges faced by such strategies.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122294402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Use of Distributed Beamforming to Increase Base Station Anonymity in Wireless Sensor Networks","authors":"Jon R. Ward, M. Younis","doi":"10.1109/ICCCN.2013.6614164","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614164","url":null,"abstract":"In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for an adversary that desires to achieve the most impactful attack possible against a WSN with the least amount of effort. Even if a WSN employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques to identify the BS. This motivates a significant need for improved BS anonymity to protect the identity, role, and location of the BS. In this paper we propose a novel cross-layer relay-selection algorithm and a distributed beamforming protocol to increase BS anonymity. We examine the effect of the proposed distributed beamforming technique on improving BS anonymity using evidence theory analysis and demonstrate the effectiveness of this approach through simulation.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui-Hui Chiu, Seung-Jong Park
{"title":"AFCD: An Approximated-Fair and Controlled-Delay Queuing for High Speed Networks","authors":"Lin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui-Hui Chiu, Seung-Jong Park","doi":"10.1109/ICCCN.2013.6614103","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614103","url":null,"abstract":"High speed networks have characteristics of high bandwidth, long queuing delay, and high burstiness which make it difficult to address issues such as fairness, low queuing delay and high link utilization. Current high speed networks carry heterogeneous TCP flows which makes it even more challenging to address these issues. Since sender centric approaches do not meet these challenges, there have been several proposals to address them at router level via queue management (QM) schemes. These QM schemes have been fairly successful in addressing either fairness issues or large queuing delay but not both at the same time. We propose a new QM scheme called Approximated-Fair and Controlled-Delay (AFCD) queuing for high speed networks that aims to meet following design goals: approximated fairness, controlled low queuing delay, high link utilization and simple implementation. The design of AFCD utilizes a novel synergistic approach by forming an alliance between approximated fair queuing and controlled delay queuing. It uses very small amount of state information in sending rate estimation of flows and makes drop decision based on a target delay of individual flow. Through experimental evaluation in a 10Gbps high speed networking environment, we show AFCD meets our design goals by maintaining approximated fair share of bandwidth among flows and ensuring a controlled very low queuing delay with a comparable link utilization.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shiguang Wang, Shaohan Hu, Shen Li, Hengchang Liu, Md Yusuf Sarwar Uddin, T. Abdelzaher
{"title":"MINERVA: Information-Centric Programming for Social Sensing","authors":"Shiguang Wang, Shaohan Hu, Shen Li, Hengchang Liu, Md Yusuf Sarwar Uddin, T. Abdelzaher","doi":"10.1109/ICCCN.2013.6614152","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614152","url":null,"abstract":"In this paper, we introduce Minerva; an information-centric programming paradigm and toolkit for social sensing. The toolkit is geared for smartphone applications whose main objective is to collect and share information about the physical world. Information-centric programming refers to a publish-subscribe paradigm that maximizes the amount of information delivered. Unlike a traditional publish-subscribe system where publishers are assumed to have independent content, Minerva is geared for social sensing applications where different sources (participants sharing sensor data) often overlap in information they share. For example, through lack of coordination, they might collect redundant pictures of the same scene or redundant speed measurements of the same street. The main contribution of Minerva, therefore, lies in a data prioritization scheme that maximizes information delivery from publishers to subscribers by reducing redundancy, taking into account the non-independent nature of content. The algorithm is implemented on Android phones on top of the recently introduced named data networking framework. Evaluation results from both two smartphone-based experiments and a large-scale real data driven simulation demonstrate that the prioritization algorithm outperforms other candidates in terms of information coverage.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiulong Liu, Keqiu Li, Yanming Shen, G. Min, Bin Xiao, W. Qu, Hongjuan Li
{"title":"A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems","authors":"Xiulong Liu, Keqiu Li, Yanming Shen, G. Min, Bin Xiao, W. Qu, Hongjuan Li","doi":"10.1109/ICCCN.2013.6614086","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614086","url":null,"abstract":"Radio Frequency Identification (RFID) technology has been widely applied in many scenarios such as inventory control, supply chain management due to its superior properties including fast identification and relatively long interrogating range over barcode systems. It is critical to efficiently identify the unknown tags because these tags can appear when new tagged objects are moved in or wrongly placed. The state-of-the-art Basic Unknown tag Identification Protocol-with Collision-Fresh slot paring (BUIP-CF) protocol can first deactivate all the known tags and then collect all the unknown tags. However, BUIP-CF protocol investigates an ALOHA-like technique and causes too many tag responses, which results in low efficiency. This paper proposes a Fast Unknown tag Identification (FUI) protocol which investigates an indicator vector to label the unknown tags with a given accuracy and removes the time-consuming tag responses in the deactivation phase. FUI also adopts the classical Enhanced Dynamic Framed Slotted ALOHA (EDFSA) protocol to collect the labeled unknown tags. We then investigate the optimal parameter settings to maximize the performance of the proposed FUI protocol. Extensive simulation experiments are conducted to evaluate the performance of the proposed FUI protocol and the experimental results show that it considerably outperforms the state-of-the-art protocol.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132648071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput Enhancement for WDS-Based WLANs","authors":"Jae-Pil Jeong, Wan-Seon Lim, Young-Joo Suh","doi":"10.1109/ICCCN.2013.6614202","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614202","url":null,"abstract":"A wireless distribution system (WDS)-based wireless local area network (WLAN) is composed of a base access point (AP) which is connected to wired line and one or more linked APs which are connected to the base AP or other linked APs via wireless links. Usually, WLAN stations try to associate with an AP from which the stations receive the strongest signal strength. However, in WDS-based WLANs, the base AP may provide higher throughput than linked APs although the signal strength of base AP is weaker than those of linked APs. In this paper, we propose a new medium access scheme in which each station uses an AP that can provide the highest throughput to improve the capacity of WDS-based WLANs. To implement the proposed scheme, no modification is required to stations, while some modifications are required to APs. Our experiment and simulation results show that the proposed scheme achieves improved throughput performance over existing schemes.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115622075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OCNI - Open Cloud Networking Interface","authors":"H. Medhioub, Bilel Msekni, D. Zeghlache","doi":"10.1109/ICCCN.2013.6614161","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614161","url":null,"abstract":"This work presents an open cloud interface extension to merge cloud computing and networks into one modeling and representation framework to extend clouds beyond data centers and enable cloud networking to set up distributed cloud infrastructures. The proposed extension to the de facto standard interface in cloud computing (OCCI) is named Open Cloud Networking Interface (OCNI). OCNI is presented and evaluated in terms of its ability to integrate smoothly with existing cloud computing interfaces and to provide all the required capabilities to express connectivity requirements and ease connection establishment between cloud computing, network and storage nodes at the virtual and physical level irrespective of underlying transport technologies.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}