37th Annual IEEE Conference on Local Computer Networks最新文献

筛选
英文 中文
Autonomous dynamic transmission scheduling based on neighbor node behavior for multihop wireless networks 基于邻居节点行为的多跳无线网络自主动态传输调度
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423625
Daiki Nobayashi, Y. Fukuda, T. Ikenaga
{"title":"Autonomous dynamic transmission scheduling based on neighbor node behavior for multihop wireless networks","authors":"Daiki Nobayashi, Y. Fukuda, T. Ikenaga","doi":"10.1109/LCN.2012.6423625","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423625","url":null,"abstract":"Multihop wireless networks (MWNs) can dynamically extend the coverage area of wireless local area networks (LANs). Communication performance of MWNs that use a single channel decreases due to interference between nodes occurring when frames are being relayed. In this paper, we proposed an autonomous dynamic transmission scheduling scheme for MWNs that is based on the behavior of neighbor nodes. In our proposed scheme, each node has a transmission priority obtained by monitoring neighboring nodes. Because it is difficult for low priority node to obtain the right to transmit a frame, the proposed scheme can mitigate interferences among nodes. In this paper, we evaluate the proposed scheme by performing simulations, and show that it can improve performance in MWN communications.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"58 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114105246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the feasibility of secure application-layer communications on the Web of Things 物联网中安全应用层通信的可行性研究
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423615
J. Granjal, E. Monteiro, J. Silva
{"title":"On the feasibility of secure application-layer communications on the Web of Things","authors":"J. Granjal, E. Monteiro, J. Silva","doi":"10.1109/LCN.2012.6423615","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423615","url":null,"abstract":"The availability of inexpensive sensing devices capable of wireless communications enables the design of exciting and new distributed sensing applications. The integration of such applications with the Internet will contribute to materialize a vision of a future Web that we nowadays describe as the Web of Things (WoT). Many security-related aspects are still open on how to address security for communications on the WoT, and that must be targeted before such applications can realistically be considered ready for deployment. We discuss the experimental evaluation of mechanisms proposed to secure end-to-end web communications with IPv6-capable sensing applications and devices, as such mechanisms may provide an important contribution towards the WoT. Our experimental evaluation study considers the impact of security on real sensing devices and requirements from sensing applications, allowing the identification of the limitations of current sensing platforms in supporting the proposed mechanisms.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Distributed data filtering in logistics wireless sensor networks based on transmission relevance 基于传输相关性的物流无线传感器网络分布式数据过滤
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423622
Sebastian Zöller, A. Reinhardt, R. Steinmetz
{"title":"Distributed data filtering in logistics wireless sensor networks based on transmission relevance","authors":"Sebastian Zöller, A. Reinhardt, R. Steinmetz","doi":"10.1109/LCN.2012.6423622","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423622","url":null,"abstract":"Energy-efficient operation is mandatory in wireless sensor networks due to the limited energy budget of sensor nodes. Considering the potential application of wireless sensor networks in logistics, cost efficiency is another major requirement due to high cost pressure. To save on data transmissions within such sensor deployments, which account for the major part of energy consumption and monetary costs, we develop a method for data filtering based on an in-network determination of transmission relevance of sensor data. Our approach explicitly incorporates interdependencies between wireless sensor nodes and their measurements and data transmissions. It contributes to efficiency in wireless sensor networks by filtering out irrelevant data and enables a subsequent reduction of unnecessary transmissions from a network-wide view, while being able to still offer real-time data provision with sufficient data fidelity to stakeholders. The benefits of our approach are indicated by preliminary evaluation results.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130739034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MP-DNA: A novel distributed replica placement heuristic for WMNs MP-DNA:一种新的分布式副本放置启发式方法
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423679
Zakwan Al-Arnaout, Jonathan Hart, Q. Fu, Marcus Frean
{"title":"MP-DNA: A novel distributed replica placement heuristic for WMNs","authors":"Zakwan Al-Arnaout, Jonathan Hart, Q. Fu, Marcus Frean","doi":"10.1109/LCN.2012.6423679","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423679","url":null,"abstract":"Content replication and placement is an area that has been well explored in the scope of Content Delivery Networks (CDNs), but has received relatively less attention from the research community when it comes to Wireless Mesh Networks (WMNs). There are a number of Replica Placement Algorithms (RPAs) that are specifically designed for CDNs. But they do not consider the special features of wireless networks. In this paper, we propose a new heuristic called MP-DNA (Multiple Partitions per Delegate Node Assignment). We study the problem of optimal content replication and placement in WMNs. In our model, each mesh router acts as a replica server with limited storage capacity. The challenge is to replicate content as close as possible to the requesting clients and thus reduce the access latency per object, while minimizing the number of replicas. We formulate this problem in terms of combinatorial optimization and propose a novel, distributed, scalable heuristic for content replication. Using simulation tests, we demonstrate that MP-DNA is scalable, performing well with respect to the number of replica servers and the number of objects. Furthermore, MP-DNA can achieve a performance close to the Greedy-Global heuristic, with a significant reduction in running time, mean throughput and storage space required.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130769895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Monitoring Traffic Activity Graphs with low-rank matrix approximation 低秩矩阵逼近监控交通活动图
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423680
Yang Liu, Wenji Chen, Y. Guan
{"title":"Monitoring Traffic Activity Graphs with low-rank matrix approximation","authors":"Yang Liu, Wenji Chen, Y. Guan","doi":"10.1109/LCN.2012.6423680","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423680","url":null,"abstract":"Recently, Traffic Activity Graphs (TAGs) have been proposed to understand, analyze, and model network-wide communication patterns. The topological properties of the TAGs have been shown to be very helpful for malware analysis, anomaly detection, and attack attribution. In a TAG, nodes represent hosts in the network and edges are observed flows that indicate certain communication relations or interactions of interest among the hosts. The challenge is how to capture and analyze TAGs which are usually large, sparse and complex and often have overly-large space and computation requirements. In this paper, we present a new sampling-based low-rank approximation method for monitoring TAGs. The resulted solution can reduce the computation complexity for the communication pattern analysis from O(mn) to O(m+n), where m and n denote the number of sources and destinations, respectively. The experimental results with real-world traffic traces show that our method outperform existing solutions in terms of efficiency and the capability of processing and identifying unknown TAGs.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"18 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132869879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the distribution of inter contact time for DTNs ddn间接触时间分布的研究
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423594
Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang
{"title":"On the distribution of inter contact time for DTNs","authors":"Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang","doi":"10.1109/LCN.2012.6423594","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423594","url":null,"abstract":"Inter contact time (ICT) between two mobile nodes is essential to forwarding algorithms and the end-to-end delay in Delay Tolerant Networks (DTNs). However, studies regarding the distribution of ICT lack general applicability and the exponential parameter concerns with too many motion characteristics. Consequently, it is difficult to design the protocol and analyze the performance for DTNs. In this paper, we demonstrate ICT between two mobile nodes is exponentially distributed and the exponential parameter relates to their historical contact numbers and the cumulative ICTs. Moreover, through extensive experimental simulations, we find that our findings have a general applicability in both theoretical mobility models and real world mobility traces, thus providing guidelines on the design of new mobility models with exponential distribution, new message protocols and further performance analysis methods.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting protocol switching covert channels 检测协议切换隐蔽通道
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423628
S. Wendzel, S. Zander
{"title":"Detecting protocol switching covert channels","authors":"S. Wendzel, S. Zander","doi":"10.1109/LCN.2012.6423628","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423628","url":null,"abstract":"Network covert channels enable hidden communication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs transfer hidden information by sending network packets with different selected network protocols. In this paper we present the first detection methods for PSCCs. We show that the number of packets between network protocol switches and the time between switches can be monitored to detect PSCCs with 98-99% accuracy for bit rates of 4 bits/second or higher.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks 无线传感器网络中流量攻击威胁的评估度量与对策
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423644
Yousef Ebrahimi, M. Younis
{"title":"Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks","authors":"Yousef Ebrahimi, M. Younis","doi":"10.1109/LCN.2012.6423644","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423644","url":null,"abstract":"In wireless sensor networks, all data packets are routed from the individual sensor nodes towards an in-situ base-station (BS). Such traffic pattern makes the BS vulnerable to adversary's attack. Basically, an adversary would intercept the ongoing transmissions and localize their sources. Then by employing traffic analysis techniques, an adversary would correlate the intercepted transmissions to uncover the data path which may lead to the location of the BS. Evidence theory is a well-known scheme that an adversary might use for traffic analysis. However, prior work considered only intercepted transmissions as evidences in the correlation process without factoring in the time of interception. In this paper, we argue that time-based correlation increases the accuracy of the traffic analysis and makes contemporary countermeasures ineffective. A novel technique is proposed to counter the time correlation and boost the anonymity of the BS. The technique imposes buffering delay at each relaying node on the data route in order to disturb the time correlation among consecutive transmissions. Our technique is validated through simulation.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124749070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling visitor movement in theme parks 模拟主题公园的游客运动
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423650
Gürkan Solmaz, M. Akbaş, D. Turgut
{"title":"Modeling visitor movement in theme parks","authors":"Gürkan Solmaz, M. Akbaş, D. Turgut","doi":"10.1109/LCN.2012.6423650","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423650","url":null,"abstract":"Realistic modeling of the movement of people in an environment is critical for evaluating the performance of mobile wireless systems such as urban sensing or mobile sensor networks. Existing human movement models are either fully synthetic or rely on traces of actual human movement. There are many situations where we cannot perform an accurate simulation without taking into account what the people are actually doing. For instance, in theme parks, the movement of people is strongly tied to the locations of the attractions and is synchronized with major external events. For these situations, we need to develop scenario specific models. In this paper, we present a model of the movement of visitors in a theme park. The nondeterministic behavior of the human walking pattern is combined with the deterministic behavior of attractions in the theme park. The attractions are divided into groups of rides, restaurants and live shows. The time spent by visitors at different attractions is calculated using specialized queuing-theoretic models. We compare the realism of the model by comparing its simulations to the statistics of the theme parks and to real-world GPS traces of visitor movement. We found that our model provides a better match to the real-world data compared to current state-of-the-art movement models.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Comparison of Anchor Selection algorithms for improvement of position estimation during the Wi-Fi localization process in disaster scenario 灾难场景下Wi-Fi定位过程中改进位置估计的锚点选择算法比较
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423660
O. Artemenko, T. Simon, A. Mitschele-Thiel, D. Schulz, R. Ta
{"title":"Comparison of Anchor Selection algorithms for improvement of position estimation during the Wi-Fi localization process in disaster scenario","authors":"O. Artemenko, T. Simon, A. Mitschele-Thiel, D. Schulz, R. Ta","doi":"10.1109/LCN.2012.6423660","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423660","url":null,"abstract":"It is very common that during the localization process redundant reference data can be collected. This reference data is called “anchors”. For some position estimation algorithms, like trilateration or Min-Max, only three or four anchors for 2-d or 3-d localization respectively are required. The selection of certain anchors from collected amount can affect the localization accuracy significantly [1]. The main purpose of this paper is to propose and analyze several most promising Optimum Anchor Selection algorIthmS (OASIS) that can contribute to the improvement of the localization precision.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信