2018 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
Evaluating container-based virtualization overhead on the general-purpose IoT platform 评估通用物联网平台上基于容器的虚拟化开销
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538602
Wagner dos Santos Marques, Paulo S. Souza, F. Rossi, Guilherme da Cunha Rodrigues, R. Calheiros, Marcelo Da Silva Conterato, T. Ferreto
{"title":"Evaluating container-based virtualization overhead on the general-purpose IoT platform","authors":"Wagner dos Santos Marques, Paulo S. Souza, F. Rossi, Guilherme da Cunha Rodrigues, R. Calheiros, Marcelo Da Silva Conterato, T. Ferreto","doi":"10.1109/ISCC.2018.8538602","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538602","url":null,"abstract":"Virtualization has become a key technology that provides several advantages (e.g., flexibility, migration, isolation) for a plethora of computing infrastructures. However, traditional virtualization models are not suitable for embedded IoT platforms due to the virtualization layer verhead. New virtualization proposals such as container-based approaches arise as an option where performance is not impacted. However, when working on general-purpose embedded platforms, some studies have demonstrated that applications on container-based virtualization on embedded devices present considerable performance overhead. Since most performance evaluations on platforms using containers were run on servers, this study expands the testbed scenario by analyzing several metrics that measure the overhead of container-based virtualization layer on embedded IoT devices. Results demonstrated improvements up to 23% in terms of performance and up to 32% in terms of EDP.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"61 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proactive Virtual Machine Migration in Fog Environments 雾环境中的主动虚拟机迁移
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538655
Diogo M. Gonçalves, Karima Velasquez, M. Curado, L. Bittencourt, E. Madeira
{"title":"Proactive Virtual Machine Migration in Fog Environments","authors":"Diogo M. Gonçalves, Karima Velasquez, M. Curado, L. Bittencourt, E. Madeira","doi":"10.1109/ISCC.2018.8538655","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538655","url":null,"abstract":"Fog computing provides a low latency access to resources at the edge of the network for resource-constrained devices. The high mobility of some of these devices, such as vehicles, brings great challenges related to resource allocation and management. In order to improve the management of computing resources utilized by mobile users connected to the Fog infrastructure, this paper proposes a virtual machine placement and migration decision model based on mobility prediction. Simulations have shown that moving the virtual machine to a Fog node ahead of the user’s route using the proposed approach can decrease by almost 50% the number of migrations needed by the user. The Fog architecture provides an average latency of about 15 milliseconds for the users’ applications and the proposed approach presents a lower latency compared to a greedy approach for the VM placement problem.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"143 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Novel Location-Based Content Distribution Protocol for Vehicular Named-Data Networks 一种基于位置的车载命名数据网络内容分发协议
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538481
Rodolfo W. L. Coutinho, A. Boukerche, Xiangshen Yu
{"title":"A Novel Location-Based Content Distribution Protocol for Vehicular Named-Data Networks","authors":"Rodolfo W. L. Coutinho, A. Boukerche, Xiangshen Yu","doi":"10.1109/ISCC.2018.8538481","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538481","url":null,"abstract":"The peculiar characteristics of vehicular networks (e.g., high vehicular mobility, poor wireless link quality and short-lived and intermittent connectivity among vehicles) challenge host-centric content search and distribution in vehicular networking applications. In this regard, recent studies have proposed information-centric protocols to improve content distribution in vehicular networks. However, they are still severely impaired by the highly dynamic nature of vehicular network topologies and the broadcast storm problem due to uncontrolled Interest packet flooding for content discovery. In this paper, we tackle the broadcast storm problem of Interest packet transmissions for content discovery in vehicular named-data networks. We propose the location-based content distribution protocol (LOCOS) for oriented Interest packet transmissions towards the proximity area of a recently discovered content source vehicle. The LOCOS protocol leverages the recently discovered location of a vehicle content source to controlled transmit Interest packets to the area where the content source is located. Simulation results show that the LOCOS protocol improves content delivery rate in 10% and 28% when compared with related work, while it reduces the content delivery delay in 80%.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System 在不受信任的操作系统中使用Intel SGX保护身份验证凭据
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538470
Rafael C. R. Conde, C. Maziero, N. C. Will
{"title":"Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System","authors":"Rafael C. R. Conde, C. Maziero, N. C. Will","doi":"10.1109/ISCC.2018.8538470","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538470","url":null,"abstract":"An important principle in computational security is to reduce the attack surface, by maintaining the Trusted Computing Base (TCB) small. Even so, no security technique ensures full protection against any adversary. Thus, sensitive applications should be designed with several layers of protection so that, even if a layer might be violated, sensitive content will not be compromised. In 2015, Intel released the Software Guard Extensions (SGX) technology in its processors. This mechanism allows applications to allocate enclaves, which are private memory regions that can hold code and data. Other applications and even privileged code, like the OS kernel and the BIOS, are not able to access enclaves’ contents. This paper presents a novel password file protection scheme, which uses Intel SGX to protect authentication credentials in the PAM authentication framework, commonly used in UNIX systems. We defined and implemented an SGX-enabled version of the pam_unix.so authentication module, called UniSGX. This module uses an SGX enclave to handle the credentials informed by the user and to check them against the password file. To add an extra security layer, the password file is stored using SGX sealing. A threat model was proposed to assess the security of the proposed solution. The obtained results show that the proposed solution is secure against the threat model considered, and that its performance overhead is acceptable from the user point of view. The scheme presented here is also suitable to other authentication frameworks.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Handover Initiation Comparison in Virtualised SDN-based Flow Mobility Management 基于虚拟sdn的流迁移管理中的切换起始比较
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538696
Flávio Meneses, Carlos Guimarães, Daniel Corujo, R. Aguiar
{"title":"Handover Initiation Comparison in Virtualised SDN-based Flow Mobility Management","authors":"Flávio Meneses, Carlos Guimarães, Daniel Corujo, R. Aguiar","doi":"10.1109/ISCC.2018.8538696","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538696","url":null,"abstract":"This paper presents a framework that integrates Software Defined Networks (SDN) and Network Functions Virtualisation (NFV) to migrate operational aspects of both the network’s Points of Attachment (PoA) and Mobile Nodes (MN) into the cloud. The SDN Controller is used as an enhanced mobility management entity by integrating the capability to instantiate in the cloud a virtual representation of the MNs (vMN). These vMNs not only act as anchors for the handover process of the physical MNs, but also act as proxies for the delivery of context information about the physical MNs wireless surroundings. Such information can be further used by the Controller for optimised handover decisions, resulting in a technology-agnostic flow mobility management mechanism for heterogeneous networks. A video delivery scenario was selected for evaluation in an experimental testbed, where the video is offloaded between wireless networks towards a dual-interfaced MN, considering different handover initiation procedures. With a handover delay of about 60ms, the results shown that virtualising the end-points reduces 67% of the OpenFlow signalling in the physical network, while as a trade-off, the OpenFlow control communication packet size and delay of the MN are incremented.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Forests: fire detection service 智慧森林:火灾探测服务
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538719
G. Neumann, Vitor Pinheiro de Almeida, M. Endler
{"title":"Smart Forests: fire detection service","authors":"G. Neumann, Vitor Pinheiro de Almeida, M. Endler","doi":"10.1109/ISCC.2018.8538719","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538719","url":null,"abstract":"Smart Forest is a concept derived from the Internet of Things (IoT) and defines sections of a forest where remote sensing is applied to collect data about environmental conditions. One of the main objectives of Smart Forests is to detect wild fire at early stages. However, the required technology for such monitoring usually demands a complex and expensive sensor and network infrastructure and requires central processing capabilities for analyzing data from several thousands of sensors. The goal of this work is to propose a solution focused on Edge Computing, using the concept of Mobile Hubs (M-Hubs). The developed Fire Detection IoT prototype application is based on the ContextNet middleware, and uses Event Processing Agents (EPAs), running on smart phones carried by forest guards. Scalability tests up to 10,000 remote sensors connected per MHub were performed.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Scalability of Real-Time IoT-based Applications for Smart Cities 智慧城市实时物联网应用的可扩展性
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538451
Ivan D. Zyrianoff, Fabrizio F. Borelli, G. Biondi, Alexandre Heideker, C. Kamienski
{"title":"Scalability of Real-Time IoT-based Applications for Smart Cities","authors":"Ivan D. Zyrianoff, Fabrizio F. Borelli, G. Biondi, Alexandre Heideker, C. Kamienski","doi":"10.1109/ISCC.2018.8538451","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538451","url":null,"abstract":"The Internet of Things (IoT) is getting momentum, which drives us to design solutions able to deal with huge amounts of data coming from different sorts of sensors in order to make decisions to adapt system behavior automatically. While in recent years many IoT-based reasoning systems have already been proposed, there are no comprehensive results reporting their performance, particularly in complex environments. As an answer to that challenge, developers often choose an architecture design based on previous experience that have an impact on the system performance and scalability. This paper shows experimental results of a performance analysis study of different implementations of context-aware management architectures for IoT-based smart cities. Results show that different architectural choices affect system scalability and that automatic real time decision-making is feasible in an environment composed of dozens of thousands of sensors continuously transmitting data.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Novel RSSI-based Algorithm for Detect and Bypass Routing Holes in Wireless Sensor Networks 一种新的基于rssi的无线传感器网络路由漏洞检测和绕过算法
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538584
Moysés M. Lima, Horácio Oliveira, R. Pazzi
{"title":"A Novel RSSI-based Algorithm for Detect and Bypass Routing Holes in Wireless Sensor Networks","authors":"Moysés M. Lima, Horácio Oliveira, R. Pazzi","doi":"10.1109/ISCC.2018.8538584","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538584","url":null,"abstract":"Greedy Forwarding technique is an attractive approach used by most geographic routing algorithms to forward packets to the node that is geographically closer to the destination node. However, this strategy requires all sensor nodes to know their physical location which is not always possible in forest scenarios and in most cases is not able to overcome routing holes. In this work, we propose a Novel RSSI-based Algorithm that performs data aggregation and is able to overcome routing holes in WSNs called LRS (Long-Range SINK). Our algorithm considers the existence of a long-range sink so that in a single hop it is possible to reach the whole network. Our algorithm takes advantage of the Received Signal Strength Indicator (RSSI) of the nodes to enable the construction of routing path toward the sink. Our results clearly show that the proposal has high delivery rates in scenarios with routing holes with all of the benefits of a greedy forwarding technique.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recommendations of a Laboratory Infrastructure for Simulation of Telemedicine Services 模拟远程医疗服务的实验室基础设施建议
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538493
B. Smaradottir, R. Fensli, C. Moe
{"title":"Recommendations of a Laboratory Infrastructure for Simulation of Telemedicine Services","authors":"B. Smaradottir, R. Fensli, C. Moe","doi":"10.1109/ISCC.2018.8538493","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538493","url":null,"abstract":"In Norway, a health reform targeting coordination and continuity of care has urged municipalities to re-organize their services as there is an increasing use of remote monitoring and sensor technologies in citizens’ homes. In this context, the research project “Telemedicine Agder” is an opportunity to study the implementation, organization and operation of large scale telemedicine services, and identify the service models of the future. As part of the project, simulation of a telemedicine service for remote monitoring of diabetes II was tested in a clinical laboratory with key informants from municipalities, hospital and research partners. This paper presents the technical and physical infrastructure of the clinical laboratory environment for simulation of a telemedicine service workflow with recommendations based on experiences from the project, relevant and applicable to other eHealth-related contexts.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MARIO: A Cognitive Radio Primary User Arrivals Data Generator 马里奥:认知无线电主用户到达数据发生器
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538660
Rogers S. Cristo, G. M. D. Santana, D. M. Osorio, K. Branco
{"title":"MARIO: A Cognitive Radio Primary User Arrivals Data Generator","authors":"Rogers S. Cristo, G. M. D. Santana, D. M. Osorio, K. Branco","doi":"10.1109/ISCC.2018.8538660","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538660","url":null,"abstract":"Cognitive Radio technique has been recognized as one of the most promising solutions for the increasingly growing problem of spectrum scarcity in wireless networks, specially with the emerging of the Internet of Things. In cognitive radio networks, secondary users are allowed to intelligently access licensed bands of primary users, thus enhancing the spectrum utilization. In this context, for investigating the advantages of cognitive radio, Machine Learning techniques have been widely applied to predict primary users arrivals. However, the available simulators are usually complex and highly time consuming. Therefore, in this work, we propose a simple and intuitive primary user arrivals data generator, MARIO, that can produce random arrival data for multiple channels by employing Poisson process. This generator is validated by using the generated data to predict new sequences according to a Hidden Markov Model. Our results show that the data generator can be used to simulate various traffic patterns over different channels.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信