2018 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
Software defined status aware routing in content-centric networking 在以内容为中心的网络中,软件定义的状态感知路由
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343126
Yueping Cai, Jun Liu, Xinwei Fan, Ya Qiu, Bing Tan
{"title":"Software defined status aware routing in content-centric networking","authors":"Yueping Cai, Jun Liu, Xinwei Fan, Ya Qiu, Bing Tan","doi":"10.1109/ICOIN.2018.8343126","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343126","url":null,"abstract":"Content-Centric Networking (CCN) is considered as an alternative Internet paradigm to solve the problems of current host-centric Internet. However, how to choose the optimal forwarding interface for the Interest packet and select an optimized routing path is a great challenge in CCN. This paper proposes a Software Defined STatus Aware Routing (SD-STAR) mechanism for CCN. The SD-STAR utilizes controllers to collect network statuses such as packet delay and node load. The forwarding priorities of the matching interfaces are updated according to the network status by controllers. The Interest packet is forwarded through the matching interface with the highest forwarding priority. The SD-STAR mechanism also works under link or node failures. Simulation results show that the SD-STAR effectively reduces the number of Interest packets and the average delay of content requests as well as the network bandwidth consumption compared with the traditional routing algorithms in CCN.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125324334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
RIPPLE: Adaptive fine-grained access control in multi-hop LLNs RIPPLE:多跳lln中的自适应细粒度访问控制
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343245
Youngho Kim, Yun-kyung Lee, Jeongnyeo Kim
{"title":"RIPPLE: Adaptive fine-grained access control in multi-hop LLNs","authors":"Youngho Kim, Yun-kyung Lee, Jeongnyeo Kim","doi":"10.1109/ICOIN.2018.8343245","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343245","url":null,"abstract":"With rapid adoption of industrial IoT applications in the critical infrastructures, security vulnerabilities and data breaches may lead to significant risks. LLNs over IEEE 802.15.4 are emerging as one of core technologies in carrying out the IIoT architectures in the industry due to its energy efficiency. The network technologies connecting the resource constrained devices over the low-power and lossy multi-hop environments are facing security challenges. In this paper, we propose RIPPLE, a fine-grained access control in the multi-hop LLNs. The goal of RIPPLE is to develop a trust delegation model that leads to an autonomous network access control, with an aim to achieve a concept of self-contained network segments. To this end, RIPPLE presents a trust capability that equips the resource constrained devices with security intelligence. Proposed architecture allows the segment to extend its access control boundary by utilizing the trust delegation model. We also present an example deployment of protocol stacks to employ the RIPPLE architecture in the emerging IEEE 802.15.4 multi-hop network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User scenario based video contents creation system 基于用户场景的视频内容创建系统
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343084
Minho Han, Sun-Joong Kim
{"title":"User scenario based video contents creation system","authors":"Minho Han, Sun-Joong Kim","doi":"10.1109/ICOIN.2018.8343084","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343084","url":null,"abstract":"Anyone can easily create new video contents by using existing video contents if they can retrieve for desired scenes from a large number of video contents. In order to do this, a technology for dividing existing video contents, a technology for retrieving divided scenes, and a technology for analyzing user scenarios are required. In this paper, we propose a system to create new video contents according to user written scenario using these technologies.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116236510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fireplug: Flexible and robust N-version geo-replication of graph databases Fireplug:灵活和健壮的n版本图形数据库的地理复制
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343095
Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, L. Rodrigues, M. Correia
{"title":"Fireplug: Flexible and robust N-version geo-replication of graph databases","authors":"Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, L. Rodrigues, M. Correia","doi":"10.1109/ICOIN.2018.8343095","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343095","url":null,"abstract":"The paper describes and evaluates Fireplug, a flexible architecture to build robust geo-replicated graph databases. Fireplug can be configured to tolerate from crash to Byzantine faults, both within and across different datacenters. Furthermore, Fireplug is robust to bugs in existing graph database implementations, as it allows to combine multiple graph databases instances in a cohesive manner. Thus, Fireplug can support many different deployments, according to the performance/robustness tradeoffs imposed by the target application. Our evaluation shows that Fireplug can implement Byzantine fault tolerance in geo-replicated scenarios and still outperform the built-in replication mechanism of Neo4j, which only supports crash faults.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122554007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Faster detection and prediction of DDoS attacks using MapReduce and time series analysis 使用MapReduce和时间序列分析更快地检测和预测DDoS攻击
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343180
Vishal Maheshwari, Ashutosh Bhatia, Kuldeep Kumar
{"title":"Faster detection and prediction of DDoS attacks using MapReduce and time series analysis","authors":"Vishal Maheshwari, Ashutosh Bhatia, Kuldeep Kumar","doi":"10.1109/ICOIN.2018.8343180","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343180","url":null,"abstract":"Security in the Internet is gradually becoming a paramount aspect as large numbers of servers are being deployed over the Internet to provide various automated services. A very prominent attack on the web is Distributed Denial of Service (DDoS) attack which is also being considered as one of the major threats to the recent development in the field of computing such as Cloud Computing and Internet of Things. Despite various attempts to handle a DDoS attack, the problem of the fast detection and prevention of this attack still persists due to the huge amount of processing required on very large sized log files generated for every request and packet sent by a source. The datasets generated during a DDoS attack are voluminous and analyzing them for a possible attack can take hours which could lead to a denial of service to legitimate users and impair system resources adversely. In this paper, we use the Hadoop architecture to facilitate the faster processing of these log files by dividing a log file into multiple smaller chunks and processing each chunk separately over a cluster node in parallel. In addition to the faster detection of a DDoS attack from the log file, we also propose a method for the prediction of abnormal behavior of those sources that are generating packets erratically. The proposed method of prediction is based on time series analysis and further speeds up the process of detecting and blocking of the potential attackers. The proposed approach helps in faster identification of DDoS attacks and blocking of suspicious IPs thereby significantly decreasing the traffic from malicious users. The simulation results obtained reflect the fact that we can detect a DDoS attack in durations as short as five minutes and also block the IPs that could be potentially malicious thereby decreasing the traffic on the server significantly.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysis of message delivery delay in large-scale geographic DTN routing 大规模地理DTN路由中的消息传递延迟分析
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343116
Sumika Nishikawa, Daiki Matsui, Y. Yamasaki, H. Ohsaki
{"title":"Analysis of message delivery delay in large-scale geographic DTN routing","authors":"Sumika Nishikawa, Daiki Matsui, Y. Yamasaki, H. Ohsaki","doi":"10.1109/ICOIN.2018.8343116","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343116","url":null,"abstract":"In this paper, we approximately derive the average message delivery delay in geographic DTN routing under random walk mobility on a large-scale network. A geographic DTN routing aims at realization of message delivery among multiple (generally, geographically-dispersed) geographic locations on a field without necessity of specific communication infrastructure by utilizing mobility of mobile agents. In this paper, we address the following research questions. How well or badly does geographic DTN routing perform in a large-scale network (i.e., a network with many geographic locations)? How is the performance of geographic DTN routing affected by the topology of the network (i.e., connections of many geographic locations)? We try to answer the questions using a hybrid modeling of geographic DTN routing with the help of recent advancement in analytical studies of random walks on a graph. We also show that geographic DTN routing is scalable; i.e., its average message delivery delay is approximately proportional to the network size (i.e., geographic locations) unless heavily loaded. We show that the network topology has limited impact on the performance of geographic DTN routing except heavily loaded conditions; the average message delivery delay is mostly determined by the degree of the destination node.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"12 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PRESENCE: Toward a novel approach for performance evaluation of mobile cloud SaaS Web Services 存在:为移动云SaaS Web服务的性能评估提供一种新的方法
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343082
A. A. Ibrahim, S. Varrette, P. Bouvry
{"title":"PRESENCE: Toward a novel approach for performance evaluation of mobile cloud SaaS Web Services","authors":"A. A. Ibrahim, S. Varrette, P. Bouvry","doi":"10.1109/ICOIN.2018.8343082","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343082","url":null,"abstract":"Cloud Services Providers (CSPs) deliver cloud services to cloud customers on a pay-per-use model. The quality of the provided services are defined using Service Level Agreements (SLAs). The recent developments around edge computing and the advent of mobile cloud computing platforms contribute to the success of this approach and the multiplication of offers. Unfortunately, despite the projections foreseeing a growing market for the coming years, there is no standard mechanism which exists to verify and assure that delivered services satisfy the signed SLA agreement. Accurate measures of the provided Quality of Service (QoS) is also missing most of time. In this context, we aim at offering an automatic framework named PRESENCE, to evaluate the QoS and SLA compliance of Web Services (WSs) offered across several CSPs. PRESENCE aims at quantifying in a fair and by stealth way the performance and scalability of the delivered WS. By stealthiness, we refer to the capacity of evaluating a given Cloud service by orchestrating multiple workload patterns that making them indistinguishable from a regular user traffic from the provider point of view. PRESENCE defines a set of Common performance metrics handled by a set of agents within a customized client (called the Auditor) for measuring the behaviour of cloud applications on top of a given CSP. This position paper offers a description of the PRESENCE framework, and the way each modules are foreseen to be designed. This opens novel perspectives for assessing the SLA compliance of Cloud providers using the PRESENCE framework.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129688498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Trustworthiness management in sharing CDN infrastructure 共享CDN基础设施中的可信度管理
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343088
Tai-Won Um, G. Lee, Hyun-Woo Lee
{"title":"Trustworthiness management in sharing CDN infrastructure","authors":"Tai-Won Um, G. Lee, Hyun-Woo Lee","doi":"10.1109/ICOIN.2018.8343088","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343088","url":null,"abstract":"Sharing Content Delivery Network (CDN) technologies such as CDN interconnection and cloud-based CDN have facilitated access to the huge volume of content in a cost-effective way. However, content distribution through shared CDN nodes is vulnerable to a wide variety of uncertainties, including unexpected node failure, intentional node disruption for maintenance or potential discrimination of content based on ownership. Trustworthiness can be considered as a key property to overcome the perception of uncertainty before delivering content through sharing CDN infrastructure and provide reliable broadcasting and telecommunications services. Establishing trustworthiness in sharing CDN infrastructure is a challenging task in the absence of the referenced framework. Therefore, we propose a trustworthiness management framework for sharing CDN infrastructure.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130390515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data trustworthiness in IoT 物联网中的数据可信度
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343151
S. Suhail, C. Hong, M. Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain
{"title":"Data trustworthiness in IoT","authors":"S. Suhail, C. Hong, M. Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain","doi":"10.1109/ICOIN.2018.8343151","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343151","url":null,"abstract":"Internet of Things (IoT) is deployed in numerous pervasive application areas, for instance, environment monitoring, energy management, health-care system and industrial automation. Data are streamed from multiple sources and is traversed through intermediate nodes until it arrives at sink node which performs decision-making for critical infrastructures. Malicious or compromised nodes may forge data or inject false data. Therefore, assuring high data trustworthiness is crucial for precise decision-making. Data provenance play an important role in evaluating the trustworthiness of data. However, provenance management for resource-constrained devices introduces several challenging requirements, such as network overhead, energy consumption, and efficient storage. In this paper, we formulate the problem of binding IoT with a provenance-aware system to enable it to track the data flow across the networked entities and data transformations applied to data by nodes. We propose a lightweight scheme to transmit provenance for IoT sensor data. The proposed technique relies on the hash chain scheme to encode provenance as the packet traversed from each participating node while the provenance verification is done at the sink node. Furthermore, we evaluate our technique with respect to energy consumption by the constrained nodes.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
RMBC: Randomized mesh blockchain using DBFT consensus algorithm RMBC:使用DBFT共识算法的随机网格区块链
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343211
Sol Jeon, Inshil Doh, K. Chae
{"title":"RMBC: Randomized mesh blockchain using DBFT consensus algorithm","authors":"Sol Jeon, Inshil Doh, K. Chae","doi":"10.1109/ICOIN.2018.8343211","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343211","url":null,"abstract":"The blockchain is decentralized network system that verifies the validity of the transaction through the consensus of the verifiers without trusted third parties. This mechanism ensures transaction integrity disclosing transaction information transparently. Therefore, it is emerging as the core technology of the 4th industrial revolution by improving reliability and efficiency with features of decentralization, ensuring the integrity, and economic cost reduction. However, there are some problems with the growth of the blockchain. The popularly used PoW (Proof of Work) consensus algorithm applied to the public blockchain requires the price to be compensated in order to agree on the validity of the transaction. This has the disadvantage that the system doesn't operate without compensation. Also, the BFT (Byzantine Fault Tolerance) Algorithm using private blockchain has a limited number of acceptable malicious users. In this case, if the users collude with malicious and exceed the limited number, the transaction is rejected. In this paper, we propose a Smart Manager System and RMBC-DBFT (Randomized Mesh Blockchain Diversity of opinion BFT) enables the safe transaction to the problems above.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信