2013 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
SESAME: Smartphone enabled secure access to multiple entities SESAME:智能手机支持安全访问多个实体
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504205
Ameva Sanzziri, Anandatirtha Nandugudi, S. Upadhyaya, C. Qiao
{"title":"SESAME: Smartphone enabled secure access to multiple entities","authors":"Ameva Sanzziri, Anandatirtha Nandugudi, S. Upadhyaya, C. Qiao","doi":"10.1109/ICCNC.2013.6504205","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504205","url":null,"abstract":"In this paper we present a smartphone based architecture to secure user access to web services which require password entry. Our architecture takes advantage of biometric sensors that are present in today's smartphones when authenticating a smartphone user in order to ensure that her identity cannot be masqueraded by anyone else. The user can then access web services using a complex password stored in her smartphone but without having to manually enter the complex password. As a result, the architecture overcomes many security limitations of today's password based authentication approaches, and in particular, resolves the current dilemma associated with the use of complex passwords. In addition, the proposed architecture not only works seamlessly with today's web services since it requires no changes to the existing authentication mechanisms used by the servers, but also can be extended to directly use a person's biometrics as credentials instead of passwords when accessing web services and cyber-physical devices in the future.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":" 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114103197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TCP-FITDC: An adaptive approach to TCP incast avoidance for data center applications TCP- fitdc:一种用于数据中心应用的TCP连发避免的自适应方法
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504236
Jun Zhang, Jiangtao Wen, Jingyuan Wang, Wenlai Zhao
{"title":"TCP-FITDC: An adaptive approach to TCP incast avoidance for data center applications","authors":"Jun Zhang, Jiangtao Wen, Jingyuan Wang, Wenlai Zhao","doi":"10.1109/ICCNC.2013.6504236","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504236","url":null,"abstract":"TCP incast is an issue of great importance to the performance of many-to-one communication sessions in data centers. It is resulted from the mismatch between the RTO mechanism of existing TCP congestion control algorithms and the requirements and parameters in data center applications, leading to gross under-utilization of link capacity, high latency and packets loss rates. In this paper, we propose a novel and adaptive delay-based mechanism for TCP incast prevention in data center applications. Theoretical analysis and simulation results show significant performance improvement as compared with existing methods.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114389417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Effective cache management and performance limits in information-centric networks 信息中心网络中有效的缓存管理和性能限制
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504219
Vasilis Sourlas, L. Tassiulas
{"title":"Effective cache management and performance limits in information-centric networks","authors":"Vasilis Sourlas, L. Tassiulas","doi":"10.1109/ICCNC.2013.6504219","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504219","url":null,"abstract":"Proliferation of content distribution traffic in the Internet is changing the requirements on the networking infrastructure to the extent that radical new architectures are envisioned, where information is addressed by semantic attributes rather than origin and destination identities. In that volatile environment, Information-Centric Networking (ICN) is a flexible communication model that meets the requirements of the new information distribution trends. Information is residing at various locations-nodes (surrogate servers) and users interested in a piece of information request it from the closest replica. In this paper, we propose a distributed, on-line gradient descent type cache management algorithm, designed for ICN, which re-assigns the information items between the nodes of the network with the aim to minimize the overall traffic cost of the information when the popularity and the locality of users' demand change. We also provide a method to calculate the overall network traffic cost lower bound for a certain category of network topologies, so that we can compare the performance of the proposed cache management algorithm.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An optimized LDPC product network coding scheme in multiple access relay system 一种优化的多址中继系统LDPC产品网络编码方案
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504098
Zhanji Wu, Xiang Chen
{"title":"An optimized LDPC product network coding scheme in multiple access relay system","authors":"Zhanji Wu, Xiang Chen","doi":"10.1109/ICCNC.2013.6504098","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504098","url":null,"abstract":"An optimized LDPC-product network coding scheme is proposed for a multiple-access relay system with two users, one relay station (RS) and one base station (BS). In the first stage, these two users broadcast their LDPC-coded data packets in turn to the RS and the BS. In the second stage, the RS uses LDPC product code to combine the decoded packets from these two users and generate extra redundancy instead of employing XOR-based network coding, and then the RS forwards the redundancy packet to the BS. In the third stage, the BS decodes the packets from the users and the RS jointly by the iterative decoding (ID) manner. In this scheme, based on the extrinsic information transfer (EXIT) charts, an optimization algorithm of irregular LDPC product code is also put forward in order to further improve the performance of the system. Simulation results confirm that the proposed scheme significantly outperforms the regular LDPC-product networking coding scheme and the conventional XOR-based network coding scheme on both AWGN and fading channels.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an enterprise self-healing system against botnets attacks 针对僵尸网络攻击的企业自愈系统
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504248
Adeeb M. Alhomoud, I. Awan, Jules Pagna Disso
{"title":"Towards an enterprise self-healing system against botnets attacks","authors":"Adeeb M. Alhomoud, I. Awan, Jules Pagna Disso","doi":"10.1109/ICCNC.2013.6504248","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504248","url":null,"abstract":"Protecting against cyber attacks is no longer a problem of organizations and home users only. Cyber security programs are now a priority of most governments. Cyber criminals have been using botnets to gain control over millions of computer, steel information and commit other malicious activities. In this paper we propose a self-healing architecture that was originally inspired from a nature paradigm and applied in the computer field. Our solution is designed to work within a network domain. We present the initial design of our solution based on the principles of self healing systems and the analysis of botnet behaviour. We discuss how to either neutralize or reverse (correct) their actions ensuring that network operations continue without disruption.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intra frame constant rate control scheme for high efficiency video coding 高效视频编码的帧内恒速率控制方案
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504163
Yimin Zhou, Ling Tian, X. Ning
{"title":"Intra frame constant rate control scheme for high efficiency video coding","authors":"Yimin Zhou, Ling Tian, X. Ning","doi":"10.1109/ICCNC.2013.6504163","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504163","url":null,"abstract":"To satisfy the increasing high resolution applications, the next generation High Efficiency Video Coding (HEVC) is being developed. A number of proposals have been presented in the last eight JCT-VC meetings to improve the compression efficiency. However, as a significant tool to enhance the coding efficiency, rate control schemes have hardly been considered. This paper proposes a rate control scheme for HEVC intra slice. The proposed scheme is composed of a linear rate-distortion (R-D) model, a PID buffer feedback controller, and an incremental computation approach to quantization parameter (QP). Compared with fixed QP encoding on the HM5.1 under the equal configuration, the proposed rate control scheme achieves accurate buffer control, avoid buffer overflow and underflow, and obtain smooth visual quality. The proposed method is the first intra-only rate control scheme for HEVC, and it is a supplementary of the current HEVC techniques.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Improved P2P content discovery by exploiting user social patterns 通过利用用户社交模式改进P2P内容发现
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504125
R. Farahbakhsh, N. Crespi, Ángel Cuevas, Neetya Shrestha, M. Mani, P. Saengudomlert
{"title":"Improved P2P content discovery by exploiting user social patterns","authors":"R. Farahbakhsh, N. Crespi, Ángel Cuevas, Neetya Shrestha, M. Mani, P. Saengudomlert","doi":"10.1109/ICCNC.2013.6504125","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504125","url":null,"abstract":"One of the most challenging issues in Unstructured Peer-to-Peer (P2P) network is to efficiently locate information resources. In this paper we propose a novel concept in which peers exploit social relations in order to improve the search success rate. In social networks, people can directly contact acquaintances that have knowledge about the resources they are looking for. However, peers lack these capabilities in a P2P network. We can find different searching mechanism such as flooding, which drastically increases the communication overhead, or random walk (RW) that reduces the message overhead, but since it is a blind sequential search it may take a long time to route a query. In front of this we have proposed a two-hop algorithm that incorporates the social behaviors of peers and processes queries more efficiently [2]. However, there is a strict limitation that the recommended nodes must always have the query resources. In this paper, we propose a one-hop algorithm that uses social behavior patterns. In the proposed algorithm peers establish friendship relations and learn from past experiences to recommend suitable peers that will route queries in an efficient manner. The simulation results show that the proposed one-hop algorithm provides better average success rates compared to both the random walk algorithm and the two-hop algorithm by reducing the search to only one logical hop. In addition, our proposal minimizes the required network memory space by limiting the query record, useful friends and resources at each node in the one-hop algorithm.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving service differentiation of immediate and advance reservation in resource-partitioned optical WDM networks 改进资源分区光WDM网络中即时预约和预先预约的业务区分
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504075
Derek R. Rousseau, J. Triay, V. Vokkarane
{"title":"Improving service differentiation of immediate and advance reservation in resource-partitioned optical WDM networks","authors":"Derek R. Rousseau, J. Triay, V. Vokkarane","doi":"10.1109/ICCNC.2013.6504075","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504075","url":null,"abstract":"As a result of the rise of Cloud and Grid computing, network operators are requested to improve their resource provisioning systems. In such scenarios, advance reservation (AR) and immediate reservation (IR) are gaining importance. While the former is capable of delivering low connection blocking for delay-tolerant applications, the latter is used by delay-sensitive ones. Even when both IR and AR requests share the same network substrate, service differentiation is needed. Additionally, under network resources partitioning, not only can the overall network capacity be under-utilized, but service differentiation can also be degraded. In this paper, we assess hybrid IR/AR sharing and partitioning mechanisms in optical wavelength-division multiplexing (WDM) networks, and propose efficient schemes for providing relative quality of service (QoS) differentiation among traffic classes. In order to overcome the poor resource utilization of strict partitioning, we develop and evaluate a preemption-based flexible partitioning framework aiming to provide relative QoS in hybrid IR/AR environments still supporting resource partitioning. Two preemption policies are proposed: switch first then preempt (SFTP) and preempt first then switch (PFTS). Through extensive simulations, we show that the proposed flexible partitioning framework can improve resource utilization, lower the overall blocking, and achieve well-differentiated relative QoS compared to strict partitioning.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"96 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VEGK: Virtual ECC group key for wireless sensor networks VEGK:用于无线传感器网络的虚拟ECC组密钥
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504110
A. E. El-Din, R. Ramadan, M. Fayek
{"title":"VEGK: Virtual ECC group key for wireless sensor networks","authors":"A. E. El-Din, R. Ramadan, M. Fayek","doi":"10.1109/ICCNC.2013.6504110","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504110","url":null,"abstract":"A Wireless Sensor Network (WSN) is a collection of smart sensor nodes cooperated together for achieving the desire of the assigned application. However, these nodes suffer from different limitations including memory available, computational and communicational limitations. Clustering these nodes is considered as one of the main solutions for prolonging the lifetime of the network. At the same time, security is another challenge for WSNs due to the critical information wirelessly transferred through the network. In this paper, we propose a security framework called Virtual ECC Group Key (VEGK) merging Elliptic Curve Cryptography (ECC) with symmetric pairwise keys along with virtual ECC group keys. In addition, we believe that merging the security with clustering will be beneficial to the energy saving in WSN. Based on the analysis of different scenarios, our proposed security framework is proved to protect the network from many attacks.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud-hosted key sharing towards secure and scalable mobile applications in clouds 云托管密钥共享,在云中实现安全和可扩展的移动应用程序
2013 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2013-01-28 DOI: 10.1109/ICCNC.2013.6504126
Piotr K. Tysowski, M. Hasan
{"title":"Cloud-hosted key sharing towards secure and scalable mobile applications in clouds","authors":"Piotr K. Tysowski, M. Hasan","doi":"10.1109/ICCNC.2013.6504126","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504126","url":null,"abstract":"User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. However, data of a sensitive nature must be protected from being read in the clear by an untrusted cloud provider. It is also beneficial to provide finite time limits on access to the data by users. A key management scheme is proposed where encrypted key shares are stored in the cloud and automatically deleted based on passage of time or user activity. The accessibility of the data gradually expires and revocation occurs as a result of the loss of sufficient key shares. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. Subscription to user data is maintained through regular re-generation of shares. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信