{"title":"Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networks","authors":"Shao Tao, A. Ananda, M. Chan","doi":"10.1109/LCN.2008.4664163","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664163","url":null,"abstract":"While wireless networks are generally deployed in three dimensional environments, most geometric routing protocols are designed and evaluated with a focus on two dimensional space. In this paper, we present a connectivity based routing protocol in 3D space named Spherical Coordinate Routing(SCR), which exploits connectivity-based greedy forwarding for efficient routing paths and a spherical coordinate tree based recovery method to guarantee packet delivery. SCR can deploy multiple recovery trees simultaneously to enhance the routing efficiency and resilience against network dynamics. Simulation results show that the packet delivery ratio of SCR is 22% ~ 63% higher than that of BVR, LCR and NoGeo, at the critical node density range of 4 to 8. The amount of forwarding traffic required per packet delivery is considerably lower than protocols relying on scoped flooding based recovery. The SCR protocol can efficiently recover from topology changes due to clustered node failures, while maintaining excellent path stretch and traffic load performance in a 3D network topology.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing Games","authors":"Xinbo Jiang, F. Safaei","doi":"10.1109/LCN.2008.4664202","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664202","url":null,"abstract":"Massively multiplayer online role playing games feature huge maps that can be partitioned into smaller components called zones to achieve scalability. In peer-to-peer (P2P) systems, those zones can be assigned to peers who are willing to take up the role of zone servers. A seamless map requires inter-zone communications to allow interactions between players across zone boundaries. In assigning zones to peers, it is critical to seek approaches to reduce the inter-zone communication cost in P2P system. In this paper, we formulate the zone assignment problem for P2P system and demonstrate that the problem is NP-hard. We hence propose a low-cost heuristic that partitions the physical network into bins, as well as, aggregating the partitions of the virtual world by clustering neighboring zones in a game map. We then demonstrate that by assigning clustered neighboring zones in the virtual map into peers in common physical network bins, we are able to achieve similar inter-zone communication cost for the zone assignment problem as that can be achieved by the optimization model we formulated, while avoiding the prohibitively high computation cost required by the latter.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring the spatial-temporal effect of internet traffic based on Random Matrix Theory","authors":"Jia Liu, Wenzhu Zhang, Jian Yuan, Depeng Jin, Lieguang Zeng","doi":"10.1109/LCN.2008.4664178","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664178","url":null,"abstract":"Monitoring traffic pattern is always an important approach to improve the performance of computer networks. In recent years, peer-to-peer (P2P) service gradually dominates the Internet traffic against traditional client-server (C-S) service such as Web. The changed situation of networks is mainly in two aspects. One is that popular P2P file-sharing applications require both board downstream and upstream bandwidth, which conflicts to asymmetry structure of the C-S service oriented networks, and another is that the topology of P2P overlay networks is varying with peers joining and leaving. The dramatic shift of Internet traffic may cause different patterns from that observed in early years. This leads a new round of Internet measurement, which requires effective monitoring of network-wide traffic within the region of ISP or autonomous system. Unfortunately, few of technologies can capture well the dynamics of C-S and P2P traffic in a macroscopic level. In this paper, we propose a method based on random matrix theory (RMT) for the detection of networkwide traffic pattern. Using only a few observation points, our method can monitor the macroscopic effect of the Internet traffic. We show that such macroscopic-level monitoring can be used to capture shifts in spatial-temporal patterns caused by P2P and C-S traffic, and inform where and when P2P and C-S traffic possibly arise in transit networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127696964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cross-domain framework for coordinated end-to-end QoS adaptation","authors":"Lifen Zhou, H. Pung, L. Ngoh","doi":"10.1109/LCN.2008.4664224","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664224","url":null,"abstract":"In this paper, we propose a novel cross-domain QoS framework for coordinated end-to-end QoS adaptation. The framework treats each autonomous QoS service on the end-to-end path as a QoS component and models its capabilities and behavior with respect to the requirements of end-to-end QoS coordination. Based on such information, the end-to-end QoS framework runtime copes with a QoS violation by selecting a suitable QoS adaptation solution among all the end-to-end candidate choices. Preliminary simulation results demonstrate the feasibility of our framework for distributed end-to-end QoS coordination.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hosein Shafiei, F. Hoseini, A. Khonsari, M. Ould-Khaoua
{"title":"A graph theoretic approach in achieving robust peer-to-peer networking paradigm","authors":"Hosein Shafiei, F. Hoseini, A. Khonsari, M. Ould-Khaoua","doi":"10.1109/LCN.2008.4664227","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664227","url":null,"abstract":"In this paper, we proposed a graph theoretic approach employing an algorithmic method to construct constant-degree graphs possessing not only provably minimum diameter, but also maximum connectivity with respect to other similar graphs.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless medium","authors":"D. Salyers, A. Striegel, C. Poellabauer","doi":"10.1109/LCN.2008.4664284","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664284","url":null,"abstract":"The demand for rich multimedia content is continuously increasing as exemplified by the success of sites such as YouTube, Google Video, and others. Critically, the richness of multimedia content places significant demands on the limited bandwidth available in wireless networks. To that end, this paper proposes a novel mechanism, opportunistic wireless broadcast (OWB), that opportunistically aggregates redundant content over short timescales into unified broadcasts in order to dramatically improve the efficiency of streaming media. Unlike end-to-end techniques such as application-layer multicast (ALM) or native IP multicast, OWB does not require modifications to the server or client applications, thus offering a practical transition for deployment. Experimental studies are presented showing that even with a minimal amount of redundancy, OWB can significantly improve network throughput and quality of service in terms of end-to-end delay.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yeting Yu, Jianping Pan, Ming Lu, Lin X. Cai, D. Hoffman
{"title":"Evaluating “no-new-wires” home networks","authors":"Yeting Yu, Jianping Pan, Ming Lu, Lin X. Cai, D. Hoffman","doi":"10.1109/LCN.2008.4664296","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664296","url":null,"abstract":"Emerging broadband entertainment applications such as IPTV (Internet protocol television) and whole-house PVR (personal video recorder) bring new challenges to existing home networks. Gigabit Ethernet is an obvious choice, but consumers are still reluctant due to the need for rewiring in most dwellings. Several ldquono-new-wiresrdquo technologies have been proposed in recent years, but there is little work on how to distribute IPTV, VoIP (voice over IP) and data traffic together effectively and efficiently in a household environment. In this paper, we propose a wireless/wired-hybrid, multi-link structure for broadband home networks, and investigate its feasibility and performance through a multimedia over multi-link testbed. Our measurement study shows that the proposed multi-link structure can improve the performance, reliability and availability of home networks considerably, indicating that it is an attractive approach to multimedia in-home distribution. In addition, the paper also discusses the challenges and approaches in further improving the performance of heterogeneous, multi-link home networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129866337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key management in wireless sensor networks with inter-network sensor roaming","authors":"Sejin Choi, V. Sarangan, Steve Trost","doi":"10.1109/LCN.2008.4664187","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664187","url":null,"abstract":"Wireless sensor networks (WSNs) are considered to be an ideal solution for many commercial and industrial applications due to their low-cost and easy deployability. However, Security is a critical concern in WSNs due to the technical challenge of providing sufficient security with battery-powered sensors that have limited computational resources. Although numerous advancements have been made in the field of key management in WSNs, most have focused on establishing keys within a single WSN. In addition, many have assumed that the locations of the sensors are fixed. As the number of WSN applications increases, there is an increasing demand for solutions that allow sensors to securely roam between different WSNs even when the WSNs are managed by independent organizations. This paper presents a base station-to-sensor pairwise key management protocol that allows sensor nodes to relocate to other WSNs as required by the application. In addition, the proposed solution localizes the damage that can arise when a sensor or a base-station is compromised without increasing the computational burden on the sensors. To the best of our knowledge, this is one of the first few works to address the pairwise key distribution problem in WSNs that allow nodes to roam between different, independent networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of intrusion detection on secure group communications in hierarchically structured group architectures","authors":"Jin-Hee Cho, I. Chen","doi":"10.1109/LCN.2008.4664307","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664307","url":null,"abstract":"We develop a class of adaptive security protocols with designs to allow group communication systems (GCSs) in mobile ad hoc networks (MANETs) to dynamically adjust operational settings to best satisfy application-imposed performance and security requirements, leveraging the inherent tradeoff between security and performance properties of the system. These adaptive security protocols include an intrusion detection protocol for dealing with insider attacks and a scalable region-based hierarchical group key management protocol for dealing with outsider attacks. Our design settings include the time interval over which intrusion detection should be performed, and the regional area size for the region-based hierarchical group key management protocol for group key management. When given a set of parameter values characterizing operational and environmental conditions of a GCS, we identify optimal design settings to be used by the system dynamically to maximize the mean time to security failure of the system while minimizing the total group communication cost incurred for GCSs in MANET environments.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks","authors":"Steffen Peter, K. Piotrowski, P. Langendörfer","doi":"10.1109/LCN.2008.4664280","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664280","url":null,"abstract":"This paper shows how complex security-related design decisions in wireless sensor networks can be made less difficult with a proposed supporting tool. As case study in this paper we focus on in-network-aggregation which is a promising option to reduce network effort. We introduce several algorithms for concealed data aggregation, each with its own benefits and drawbacks concerning security issues but also with respect to code size, processing overhead etc. Selecting the optimal combination requires in-depth knowledge of programming resource constrained devices, protocols for those devices, and last but not least significant background in security. Our proposed configuration tool - named configKIT - has been designed to cope with such complexity. This paper presents how configKIT works, how it will be set up, and how it can be applied in practice. The pre-compiler assessment process considers memory, energy and security parameters and provides reliable application-dependent configurations to the developer before a single line of code is written. The approach can reduce development time significantly and enables even complex and sophisticated security algorithms to a broader public.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}