Ameva Sanzziri, Anandatirtha Nandugudi, S. Upadhyaya, C. Qiao
{"title":"SESAME: Smartphone enabled secure access to multiple entities","authors":"Ameva Sanzziri, Anandatirtha Nandugudi, S. Upadhyaya, C. Qiao","doi":"10.1109/ICCNC.2013.6504205","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504205","url":null,"abstract":"In this paper we present a smartphone based architecture to secure user access to web services which require password entry. Our architecture takes advantage of biometric sensors that are present in today's smartphones when authenticating a smartphone user in order to ensure that her identity cannot be masqueraded by anyone else. The user can then access web services using a complex password stored in her smartphone but without having to manually enter the complex password. As a result, the architecture overcomes many security limitations of today's password based authentication approaches, and in particular, resolves the current dilemma associated with the use of complex passwords. In addition, the proposed architecture not only works seamlessly with today's web services since it requires no changes to the existing authentication mechanisms used by the servers, but also can be extended to directly use a person's biometrics as credentials instead of passwords when accessing web services and cyber-physical devices in the future.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":" 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114103197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Zhang, Jiangtao Wen, Jingyuan Wang, Wenlai Zhao
{"title":"TCP-FITDC: An adaptive approach to TCP incast avoidance for data center applications","authors":"Jun Zhang, Jiangtao Wen, Jingyuan Wang, Wenlai Zhao","doi":"10.1109/ICCNC.2013.6504236","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504236","url":null,"abstract":"TCP incast is an issue of great importance to the performance of many-to-one communication sessions in data centers. It is resulted from the mismatch between the RTO mechanism of existing TCP congestion control algorithms and the requirements and parameters in data center applications, leading to gross under-utilization of link capacity, high latency and packets loss rates. In this paper, we propose a novel and adaptive delay-based mechanism for TCP incast prevention in data center applications. Theoretical analysis and simulation results show significant performance improvement as compared with existing methods.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114389417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective cache management and performance limits in information-centric networks","authors":"Vasilis Sourlas, L. Tassiulas","doi":"10.1109/ICCNC.2013.6504219","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504219","url":null,"abstract":"Proliferation of content distribution traffic in the Internet is changing the requirements on the networking infrastructure to the extent that radical new architectures are envisioned, where information is addressed by semantic attributes rather than origin and destination identities. In that volatile environment, Information-Centric Networking (ICN) is a flexible communication model that meets the requirements of the new information distribution trends. Information is residing at various locations-nodes (surrogate servers) and users interested in a piece of information request it from the closest replica. In this paper, we propose a distributed, on-line gradient descent type cache management algorithm, designed for ICN, which re-assigns the information items between the nodes of the network with the aim to minimize the overall traffic cost of the information when the popularity and the locality of users' demand change. We also provide a method to calculate the overall network traffic cost lower bound for a certain category of network topologies, so that we can compare the performance of the proposed cache management algorithm.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimized LDPC product network coding scheme in multiple access relay system","authors":"Zhanji Wu, Xiang Chen","doi":"10.1109/ICCNC.2013.6504098","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504098","url":null,"abstract":"An optimized LDPC-product network coding scheme is proposed for a multiple-access relay system with two users, one relay station (RS) and one base station (BS). In the first stage, these two users broadcast their LDPC-coded data packets in turn to the RS and the BS. In the second stage, the RS uses LDPC product code to combine the decoded packets from these two users and generate extra redundancy instead of employing XOR-based network coding, and then the RS forwards the redundancy packet to the BS. In the third stage, the BS decodes the packets from the users and the RS jointly by the iterative decoding (ID) manner. In this scheme, based on the extrinsic information transfer (EXIT) charts, an optimization algorithm of irregular LDPC product code is also put forward in order to further improve the performance of the system. Simulation results confirm that the proposed scheme significantly outperforms the regular LDPC-product networking coding scheme and the conventional XOR-based network coding scheme on both AWGN and fading channels.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an enterprise self-healing system against botnets attacks","authors":"Adeeb M. Alhomoud, I. Awan, Jules Pagna Disso","doi":"10.1109/ICCNC.2013.6504248","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504248","url":null,"abstract":"Protecting against cyber attacks is no longer a problem of organizations and home users only. Cyber security programs are now a priority of most governments. Cyber criminals have been using botnets to gain control over millions of computer, steel information and commit other malicious activities. In this paper we propose a self-healing architecture that was originally inspired from a nature paradigm and applied in the computer field. Our solution is designed to work within a network domain. We present the initial design of our solution based on the principles of self healing systems and the analysis of botnet behaviour. We discuss how to either neutralize or reverse (correct) their actions ensuring that network operations continue without disruption.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intra frame constant rate control scheme for high efficiency video coding","authors":"Yimin Zhou, Ling Tian, X. Ning","doi":"10.1109/ICCNC.2013.6504163","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504163","url":null,"abstract":"To satisfy the increasing high resolution applications, the next generation High Efficiency Video Coding (HEVC) is being developed. A number of proposals have been presented in the last eight JCT-VC meetings to improve the compression efficiency. However, as a significant tool to enhance the coding efficiency, rate control schemes have hardly been considered. This paper proposes a rate control scheme for HEVC intra slice. The proposed scheme is composed of a linear rate-distortion (R-D) model, a PID buffer feedback controller, and an incremental computation approach to quantization parameter (QP). Compared with fixed QP encoding on the HM5.1 under the equal configuration, the proposed rate control scheme achieves accurate buffer control, avoid buffer overflow and underflow, and obtain smooth visual quality. The proposed method is the first intra-only rate control scheme for HEVC, and it is a supplementary of the current HEVC techniques.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Farahbakhsh, N. Crespi, Ángel Cuevas, Neetya Shrestha, M. Mani, P. Saengudomlert
{"title":"Improved P2P content discovery by exploiting user social patterns","authors":"R. Farahbakhsh, N. Crespi, Ángel Cuevas, Neetya Shrestha, M. Mani, P. Saengudomlert","doi":"10.1109/ICCNC.2013.6504125","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504125","url":null,"abstract":"One of the most challenging issues in Unstructured Peer-to-Peer (P2P) network is to efficiently locate information resources. In this paper we propose a novel concept in which peers exploit social relations in order to improve the search success rate. In social networks, people can directly contact acquaintances that have knowledge about the resources they are looking for. However, peers lack these capabilities in a P2P network. We can find different searching mechanism such as flooding, which drastically increases the communication overhead, or random walk (RW) that reduces the message overhead, but since it is a blind sequential search it may take a long time to route a query. In front of this we have proposed a two-hop algorithm that incorporates the social behaviors of peers and processes queries more efficiently [2]. However, there is a strict limitation that the recommended nodes must always have the query resources. In this paper, we propose a one-hop algorithm that uses social behavior patterns. In the proposed algorithm peers establish friendship relations and learn from past experiences to recommend suitable peers that will route queries in an efficient manner. The simulation results show that the proposed one-hop algorithm provides better average success rates compared to both the random walk algorithm and the two-hop algorithm by reducing the search to only one logical hop. In addition, our proposal minimizes the required network memory space by limiting the query record, useful friends and resources at each node in the one-hop algorithm.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving service differentiation of immediate and advance reservation in resource-partitioned optical WDM networks","authors":"Derek R. Rousseau, J. Triay, V. Vokkarane","doi":"10.1109/ICCNC.2013.6504075","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504075","url":null,"abstract":"As a result of the rise of Cloud and Grid computing, network operators are requested to improve their resource provisioning systems. In such scenarios, advance reservation (AR) and immediate reservation (IR) are gaining importance. While the former is capable of delivering low connection blocking for delay-tolerant applications, the latter is used by delay-sensitive ones. Even when both IR and AR requests share the same network substrate, service differentiation is needed. Additionally, under network resources partitioning, not only can the overall network capacity be under-utilized, but service differentiation can also be degraded. In this paper, we assess hybrid IR/AR sharing and partitioning mechanisms in optical wavelength-division multiplexing (WDM) networks, and propose efficient schemes for providing relative quality of service (QoS) differentiation among traffic classes. In order to overcome the poor resource utilization of strict partitioning, we develop and evaluate a preemption-based flexible partitioning framework aiming to provide relative QoS in hybrid IR/AR environments still supporting resource partitioning. Two preemption policies are proposed: switch first then preempt (SFTP) and preempt first then switch (PFTS). Through extensive simulations, we show that the proposed flexible partitioning framework can improve resource utilization, lower the overall blocking, and achieve well-differentiated relative QoS compared to strict partitioning.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"96 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VEGK: Virtual ECC group key for wireless sensor networks","authors":"A. E. El-Din, R. Ramadan, M. Fayek","doi":"10.1109/ICCNC.2013.6504110","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504110","url":null,"abstract":"A Wireless Sensor Network (WSN) is a collection of smart sensor nodes cooperated together for achieving the desire of the assigned application. However, these nodes suffer from different limitations including memory available, computational and communicational limitations. Clustering these nodes is considered as one of the main solutions for prolonging the lifetime of the network. At the same time, security is another challenge for WSNs due to the critical information wirelessly transferred through the network. In this paper, we propose a security framework called Virtual ECC Group Key (VEGK) merging Elliptic Curve Cryptography (ECC) with symmetric pairwise keys along with virtual ECC group keys. In addition, we believe that merging the security with clustering will be beneficial to the energy saving in WSN. Based on the analysis of different scenarios, our proposed security framework is proved to protect the network from many attacks.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud-hosted key sharing towards secure and scalable mobile applications in clouds","authors":"Piotr K. Tysowski, M. Hasan","doi":"10.1109/ICCNC.2013.6504126","DOIUrl":"https://doi.org/10.1109/ICCNC.2013.6504126","url":null,"abstract":"User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. However, data of a sensitive nature must be protected from being read in the clear by an untrusted cloud provider. It is also beneficial to provide finite time limits on access to the data by users. A key management scheme is proposed where encrypted key shares are stored in the cloud and automatically deleted based on passage of time or user activity. The accessibility of the data gradually expires and revocation occurs as a result of the loss of sufficient key shares. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. Subscription to user data is maintained through regular re-generation of shares. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.","PeriodicalId":229123,"journal":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}