2008 33rd IEEE Conference on Local Computer Networks (LCN)最新文献

筛选
英文 中文
Secure and efficient authentication in Wireless Mesh Networks using merkle trees 基于默克尔树的无线Mesh网络安全高效认证
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664310
L. Santhanam, Bin Xie, D. Agrawal
{"title":"Secure and efficient authentication in Wireless Mesh Networks using merkle trees","authors":"L. Santhanam, Bin Xie, D. Agrawal","doi":"10.1109/LCN.2008.4664310","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664310","url":null,"abstract":"In the recent years, wireless mesh network (WMN) has evolved as a new paradigm for broadband wireless Internet access. The self-configurability, open wireless infrastructure, and different management styles of WMN make them vulnerable to malicious attackers. As a first step to secure WMNs, it is critical to incorporate an authentication mechanism for mesh clients. The existing proposals are primarily based on public key certificates, which incur considerable overhead in signature verification. We propose a network layer authentication mechanism called Merkle Tree based Mesh Authentication Protocol (MT-MAP) for WMNs. It incorporates inexpensive hash operations using Merkle tree to authenticate single/multihop mesh clients. We also show how the use of hash tree facilitates fast and periodic refresh of authentication certificates. Finally, we present a security analysis of MT-MAP against impersonation and replay attacks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Real-time performance analysis of Adaptive Link Rate 自适应链路速率实时性能分析
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664181
Baoke Zhang, Karthik Sabhanatarajan, A. Gordon-Ross, A. George
{"title":"Real-time performance analysis of Adaptive Link Rate","authors":"Baoke Zhang, Karthik Sabhanatarajan, A. Gordon-Ross, A. George","doi":"10.1109/LCN.2008.4664181","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664181","url":null,"abstract":"High speed links are widely deployed in modern day computer networks to meet the ever growing needs for increasing data bandwidth. However, with the increase in the link rate, the power consumption of the network interfaces increases exponentially, compounding growing concerns about network power consumption. Fortunately, network traffic characteristics show that rapid link rates are not always required. During times of reduced network traffic, the adaptive link rate (ALR) mechanism allows link rates to be reduced with little impact on network performance. Current research has focused on policies to control when and how to change link rates, and have shown promising energy savings. However, these works have been largely simulative, and have not addressed many of the challenges involved in implementation. In this paper, we develop a hardware prototype ALR system and address real-time challenges involved in realizing such an implementation. We also identify new considerations for control policy development given current technology capabilities as well as future projections.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
DiCAP: Distributed Packet Capturing architecture for high-speed network links DiCAP:用于高速网络链路的分布式包捕获体系结构
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664166
C. Morariu, B. Stiller
{"title":"DiCAP: Distributed Packet Capturing architecture for high-speed network links","authors":"C. Morariu, B. Stiller","doi":"10.1109/LCN.2008.4664166","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664166","url":null,"abstract":"IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge traditional IP traffic analysis tools with their high amount of carried data that needs to be processed within a small amount of time. Centralized traffic measurements for high-speed links typically require high-performance capturing hardware that usually comes with a high cost. Software-based capturing solutions, such as libpcap or PFRING, cannot cope with those high data rates and experience high packet losses. Thus, this paper proposes a scalable architecture and its implementation for Distributed Packet Capturing (DiCAP) based on inexpensive off-the-shelf hardware running Linux operating system. The prototype designed has been tested as an implementation and was evaluated against other Linux capturing tools. The evaluation shows that DiCAP can perform loss-less IP packet header capture at high-speed packet rates when used alone and that it can highly improve the performance of libpcap of PFRING when used in combination with those.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Cost-efficient backup-plane architecture for single-hop WDM network 单跳WDM网络的经济高效备份平面架构
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664189
N. Kamiyama
{"title":"Cost-efficient backup-plane architecture for single-hop WDM network","authors":"N. Kamiyama","doi":"10.1109/LCN.2008.4664189","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664189","url":null,"abstract":"Although an AWG-based single-hop WDM network is a desirable architecture to achieve an all-optical packet network in MANs, scalability is a problem. This problem can be solved by providing optical couplers between the AWG and other nodes and collecting multiple nodes. In this case, packet collisions at couplers will significantly increase the packet network delay. Therefore, the author proposed to install an autonomic packet collision avoidance mechanism in couplers. The installation of active devices at couplers degrades the network reliability. Therefore, we need to improve the reliability by providing a backup plane when applying this method to MANs. However, simply doubling all the couplers will largely increase the CAPEX. The probability that multiple collision-avoidance mechanisms breakdown simultaneously is very small, so this paper proposes to construct the backup plane by sharing couplers among nodes accommodated in different couplers on the primary plane.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol 混合无线网格协议中按需模式和主动模式的有效合作
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664151
Won-Ju Yoon, Sang-Hwa Chung, S. Lee, Yun-Sung Lee
{"title":"An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol","authors":"Won-Ju Yoon, Sang-Hwa Chung, S. Lee, Yun-Sung Lee","doi":"10.1109/LCN.2008.4664151","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664151","url":null,"abstract":"Hybrid Wireless Mesh Protocol (HWMP) in IEEE 802.11s provides two routing modes, on-demand and proactive, for WLAN mesh networks. Although the on-demand routing mode always provides the optimum routing paths for data transmission, the initial latency can be very high when communicating with a destination in an external network. On the other hand, the proactive routing mode shows low initial latency when communicating with a destination in an external network, but the data transmission throughput can decrease when communicating with a destination in the same mesh network. This paper proposes an efficient cooperation method of two routing modes, taking advantage of the merits of each routing mode to overcome their faults. To evaluate the performance of the proposed cooperation method, we implemented HWMP on a testbed and performed experiments. The experimental results showed that the proposed cooperation method overcomes the faults of each routing mode and searches for the optimum routing paths quickly and efficiently; it always has the lower initial latency and higher data transmission throughput compared with the on-demand and proactive routing modes.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Signal strength sensitivity and its effects on routing in maritime wireless networks 海上无线网络信号强度灵敏度及其对路由的影响
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664169
C. Ang, S. Wen
{"title":"Signal strength sensitivity and its effects on routing in maritime wireless networks","authors":"C. Ang, S. Wen","doi":"10.1109/LCN.2008.4664169","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664169","url":null,"abstract":"Unlike terrestrial networks, the received signal strength in maritime wireless networks are subjected to perturbations due to the sea movement. Surface motions at sea cause variations in antenna heights and orientations of the communicating node (e.g. ships and buoys), thus affecting the received signal strength. In order to minimize such undesirable effects, we carried out a detailed study of the relationship between sea waves and the received signal strength. The effect of antenna gain variations due to tilting of antenna masts were studied by modeling sea waves. The channel path-loss variations were studied using a two-ray path-loss model for the maritime environment. Our analysis showed that the sea wave movements affect both short and longer links. We proposed a simple scheme to avoid the use of unstable links and implemented it on the QualNet network simulator. We carried out IEEE 802.16-based mesh network simulations with sea terrain and path loss models. We observed performance improvements in packet delay and throughput when the stable link selection scheme was used.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Mobility management for highly mobile users and vehicular networks in heterogeneous environments 异构环境下高度移动用户和车辆网络的移动性管理
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664250
K. Andersson, C. Åhlund, Balkrishna Sharma Gukhool, S. Cherkaoui
{"title":"Mobility management for highly mobile users and vehicular networks in heterogeneous environments","authors":"K. Andersson, C. Åhlund, Balkrishna Sharma Gukhool, S. Cherkaoui","doi":"10.1109/LCN.2008.4664250","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664250","url":null,"abstract":"With the recent developments in wireless networks, different radio access technologies are used in different places depending on capacity in terms of throughput, cell size, scalability etc. In this context, mobile users, and in particular highly mobile users and vehicular networks, will see an increasing number and variety of wireless access points enabling Internet connectivity. Such a heterogeneous networking environment needs, however, an efficient mobility management scheme offering the best connection continuously. In this paper, a mobility management architecture focusing on efficient network selection and timely handling of vertical and horizontal hand-overs is proposed. The solution is based on Mobile IP where hand-over decisions are taken based upon calculations of a metric combining delay and delay jitter. For efficiency reasons, the frequency of binding updates is dynamically controlled, depending on speed and variations in the metric. The dynamic frequency of binding updates helps the timely discovery of congested access points and cell edges so as to allow efficient hand-overs that minimize packet drops and hand-over delays. Results show that the overall signaling cost is decreased and changes in networking conditions are detected earlier compared to standard Mobile IP.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127487532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Resource assignment for adaptively modulated interconnected WLANs 自适应调制互联无线局域网的资源分配
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664211
Amiotosh Ghosh, A. Elhakeem
{"title":"Resource assignment for adaptively modulated interconnected WLANs","authors":"Amiotosh Ghosh, A. Elhakeem","doi":"10.1109/LCN.2008.4664211","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664211","url":null,"abstract":"In this paper we propose resource allocation schemes for TDMA/TDD based high performance link adaptable wireless LANs and examine their interrelation with user buffer. User rates are dynamically adjusted based on their distance from the access points and changes as user moves. We simulate three resource allocation policies namely Minimum Overhead Round Robin (MORR), which does not depend on userpsilas buffer condition, Weighted Minimum Overhead Round Robin (WMORR) which is a function of user buffer as well as the waiting time for transmission opportunity and Weighted Round Robin (WRR) which is a function of user buffer only. We evaluate average buffer packet drop probability due to buffer overflow and average frame overhead in uplink phase of the TDMA/TDD frame. Our results show that the second adaptive resource allocation technique i.e. WMORR outperforms the other two.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Spanning Tree Bridging for Metro Ethernets 城域以太网的智能生成树桥接
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664209
A. Meddeb
{"title":"Smart Spanning Tree Bridging for Metro Ethernets","authors":"A. Meddeb","doi":"10.1109/LCN.2008.4664209","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664209","url":null,"abstract":"Metro Ethernet is taking off rapidly as a WAN service and the simplicity, ubiquity, and plug-and-play features of Ethernet are some key success factors. The original bridging methods assumed the use of VLANs and spanning tree protocols within provider bridge (PB) and provider backbone bridge (PBB) networks. Because of the inadequacy of the existing spanning tree protocols to support carrier network requirements, very recently, a new class of shortest path routing solutions have been introduced that avoid the use of spanning tree protocols in the core namely, shortest path bridging (SPB). This paper aims at illustrating that we can still use spanning trees in metro ethernet provided that the tree generation and VLAN-spanning-tree mapping are performed adequately. We call our solution smart spanning tree bridging (SSTB). SSTB can be used to enhance the 802.1s MSTP, without requiring significant changes in the current Ethernet equipment. Using very simple but yet realistic numerical examples, we show that SSTB yields near optimal bandwidth and link usage. We also show that SSTB outperforms SPB in terms of service delivery, frame loss and jitter, while being comparable in terms of bandwidth usage and latency. Further, SSTB requires only a couple of spanning tree instances, significantly reducing processing and complexity of bridged networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Firewalling wireless sensor networks: Security by wireless 防火墙无线传感器网络:无线安全
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664279
I. Martinovic, Nicos Gollan, J. Schmitt
{"title":"Firewalling wireless sensor networks: Security by wireless","authors":"I. Martinovic, Nicos Gollan, J. Schmitt","doi":"10.1109/LCN.2008.4664279","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664279","url":null,"abstract":"Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, although their deployment requires careful planning and expensive infrastructure that may be difficult to install or modify. Hence, solutions based on wireless sensor networks (WSNs) are gaining popularity to reduce cost and simplify installation. Clearly, one of the key issues rising from the switch to wireless communication lies in security; while an air gap is among the most effective security measures in wired networks, wireless communication is not as easy to isolate from attack. In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data. Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be used to enhance protection and support implementation of lightweight security mechanisms.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129635452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信