2012 18th IEEE International Conference on Networks (ICON)最新文献

筛选
英文 中文
An attack resistant method for detecting dishonest recommendations in pervasive computing environment 普适计算环境下不诚实推荐检测的一种抗攻击方法
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506554
N. Iltaf, Abdul Ghafoor, Usman Zia
{"title":"An attack resistant method for detecting dishonest recommendations in pervasive computing environment","authors":"N. Iltaf, Abdul Ghafoor, Usman Zia","doi":"10.1109/ICON.2012.6506554","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506554","url":null,"abstract":"An attack resistant method for indirect trust computation (based on recommendation) for pervasive computing environment is proposed. The method extends a mechanism to detect outliers in dataset presented in [19] and apply it to filter out malicious recommendations in indirect trust computation. The method is based on a dissimilarity metric based on the statistical distribution of the recommendations grouped into recommendation classes. The proposed model has been evaluated in different attack scenarios (bad mouthing, ballot stuffing and random attack). The model has also been compared with other existing evolutionary recommendation models in this field, and it is shown that the proposed approach can effectively filter out dishonest recommendations provided that the number of dishonest recommendations is less than the number of honest recommendations.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protecting an WSN from internal attack based on epistemic uncertainties 基于认知不确定性保护WSN免受内部攻击
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506589
Xu Huang, D. Sharma, Muhammad R. Ahmed, Hongyan Cui
{"title":"Protecting an WSN from internal attack based on epistemic uncertainties","authors":"Xu Huang, D. Sharma, Muhammad R. Ahmed, Hongyan Cui","doi":"10.1109/ICON.2012.6506589","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506589","url":null,"abstract":"Wireless sensor networks (WSNs) are composed of a large number of low cost and low power, multifunctional sensor nodes communicating at short distance. These sensor nodes are densely deployed to collect and transmit data from physical world to one or more destination nodes called “sink” in an autonomous way. They have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as water contamination, sound, temperature, motion, pressure, and other pollutants. However, security threats to WSNs become serious challenges due to their open nature of the wireless medium. For example, an adversary can easily eavesdrop and replay or inject fabricated messages. Traditional different cryptographic methods can be used to defend against some of such attacks but now very limited. Node compromised is another major problem for WSN security as it allows an adversary to enter inside the security perimeter of the network, called internal attack, which raised more serious challenge to WSNs due to its nature. In this paper, we are focusing on investigating internal attacks of wireless sensor networks with multi-hop and single sinker. The epistemic uncertainty theory is introduced and it is to be shown that our novel algorithm works with controllable resiliency of wireless sensor networks, based on Dempster-Shafer theory (DST). It is to ensure the targeted WSN working at the designed resiliency level with our algorithm.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124441137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed vertical handover management for wireless mesh networks 无线网状网络的分布式垂直切换管理
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506538
P. A. Shah, Muhammad Omer Chughtai, Maaz Rehan, H. Hasbullah
{"title":"Distributed vertical handover management for wireless mesh networks","authors":"P. A. Shah, Muhammad Omer Chughtai, Maaz Rehan, H. Hasbullah","doi":"10.1109/ICON.2012.6506538","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506538","url":null,"abstract":"Operators and wireless internet service providers are increasingly using Wireless Mesh Networks (WMN) to offer Internet connectivity, as it allows fast, easy and affordable network deployment and provide Internet services to the end user through all existing network technologies like Ethernet, WLAN, WiMAX, GPRS etc. Due to evolution of 4G heterogeneous wireless networks, today's mobile devices are equipped with multiple network interfaces. However, when an end user having these mobile devices moves across heterogeneous networks, the previously established communication may no longer remains active. We proposed the vertical handover management mechanism for a distributed IP based mobility management protocol (DIMMP) in WMN to provide seamless mobility with service continuation for mobile devices. Simulations were performed using NS2. Results show that handover delay is reduced significantly by DIMMP in comparison to MibileIP.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115446394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective negative Kerr non-linear coefficient using highly non-linear fibers: A scalable backward propagation approach 使用高度非线性光纤的有效负克尔非线性系数:一种可扩展的反向传播方法
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506541
R. Asif, Muhammad Khawar Islam, M. Zafrullah
{"title":"Effective negative Kerr non-linear coefficient using highly non-linear fibers: A scalable backward propagation approach","authors":"R. Asif, Muhammad Khawar Islam, M. Zafrullah","doi":"10.1109/ICON.2012.6506541","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506541","url":null,"abstract":"We have numerically evaluated optical backward propagation (OBP) by the conjunction of dispersion compensating fiber (DCF) and a non-linear compensator (NLC) devised by effective negative Kerr non-linear coefficient using two highly non-linear fibers (HNLF) to compensate fiber transmission impairments, i.e. chromatic dispersion (CD) and non-linearities (NL). The OBP module is evaluated for dual-polarization (DP) mary (m=4,16,32,64,256) quadrature amplitude modulation (QAM) in 112 Gbit/s coherent transmission over standard single mode fiber (SMF). We have also proposed a intensity limited optical backward propagation module (IL-OBP) by using a self-phase modulation-based optical limiter with an appropriate pre-chirping to compensate for the intensity fluctuations in the transmission link. Our results depict that in highly non-linear sensitive 256QAM transmission, we have observed a 40% increase in the transmission distance by implementing IL-OBP as compared to conventional OBP.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131984475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session management in a multi-channel video streaming system for wireless networks 无线网络多通道视频流系统的会话管理
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506579
Ronit Nossenson, Noam Amram
{"title":"Session management in a multi-channel video streaming system for wireless networks","authors":"Ronit Nossenson, Noam Amram","doi":"10.1109/ICON.2012.6506579","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506579","url":null,"abstract":"We investigate the responsibilities of the session manager in a multi-channel streaming video session over wireless networks. The session manager decides how many channels should be active in the next time interval on the basis of session measurement reports and other considerations. We suggest a simple algorithm for session management and evaluate its performance against unmanaged multi-channel sessions. Experimental results reveal that system performance significantly improved in the managed as compared to the unmanaged session.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal provisioning for scheduling divisible loads with reserved cloud resources 使用预留云资源调度可分负载的最优配置
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506559
Menglan Hu, Jun Luo, B. Veeravalli
{"title":"Optimal provisioning for scheduling divisible loads with reserved cloud resources","authors":"Menglan Hu, Jun Luo, B. Veeravalli","doi":"10.1109/ICON.2012.6506559","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506559","url":null,"abstract":"Cloud computing offers customers an efficient way to flexibly allocate resources to meet demands. Cloud service vendors can offer consumers three purchasing plans, i.e., on-demand, spot, and reserved instances for resource provisioning. Since price of resources in reservation plan is generally cheaper than that in on-demand plan, in this study we attempt to make use of the cheap reserved instances to reduce monetary costs. We consider processing a large divisible load onto on-demand and reserved instances in clouds. Divisible loads, also called embarrassingly parallel workloads, can be partitioned into an arbitrarily large number of independent load fractions and be distributed across multiple processing nodes. We investigate the time-cost optimization problems for provisioning resources and scheduling divisible loads with reserved instances in clouds. The objectives are two-fold: First, given a total processing time (deadline), minimize the total cost. Second, given a budget (total cost), minimize the total processing time. We formulate the problems as mixed integer programs (MIP). We show that the optimal solutions of the problems have very simple structures. We then propose light-weight optimal solutions for the problems with rigorous proofs. Numerical experiments are presented to illustrate the salient features of these solutions.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Error control strategies for transmit-only sensor networks: A case study 仅传输传感器网络的错误控制策略:一个案例研究
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506600
R. Cardell-Oliver, A. Willig, C. Huebner, Thomas Buehring, A. Monsalve
{"title":"Error control strategies for transmit-only sensor networks: A case study","authors":"R. Cardell-Oliver, A. Willig, C. Huebner, Thomas Buehring, A. Monsalve","doi":"10.1109/ICON.2012.6506600","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506600","url":null,"abstract":"Wireless sensor networks using transmit-only sensor nodes are a promising new approach for applications such as environmental monitoring because they can provide high network scalability and long life-time at low cost. But achieving reliable data delivery in a transmit-only network is a challenging problem because there is no feedback channel for reporting lost or damaged packets. Taking a systems approach, this paper identifies three specific error control strategies that are applicable in this design space. The strategies are drawn from the areas of temporal diversity, spatial diversity and coding-based methods. An empirical investigation of these strategies is performed using two case study deployments in indoor and outdoor settings, running from two weeks to several months. In both case studies data replication in successive packets and receiver diversity performed best. In most cases, but not all, coding-based methods offered a poor balance between overhead and efficiency.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scalable data dissemination protocol for wireless sensor networks 无线传感器网络的可扩展数据传播协议
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506603
Haifeng Lu, C. Foh, Jianfei Cai
{"title":"Scalable data dissemination protocol for wireless sensor networks","authors":"Haifeng Lu, C. Foh, Jianfei Cai","doi":"10.1109/ICON.2012.6506603","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506603","url":null,"abstract":"Opportunistic wireless transmission is a technique offering collaboration of simultaneous flows to achieve error resilient transmissions. In this paper, we introduce the use of opportunistic wireless transmission for data diffusion which deals with the all-to-all data dissemination in a wireless sensor network. Our design turns the network infrastructure into a single fountain encoder where source packets arrive from each sensor node and these packets are encoded while flooding throughout the entire network to all nodes. Simulation and analysis are carried out showing that our proposed opportunistic data diffusion achieves efficient and error resilient all-to-all data dissemination. The results confirm that our solution offers not only efficient and reliable all-to-all data dissemination over lossy wireless links, but also scalability to large networks.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127403998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
International network research testbed facilities based on OpenFlow: Architecture, services, technologies, and distributed infrastructure 基于OpenFlow的国际网络研究试验台设施:架构、服务、技术和分布式基础设施
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506563
J. Mambretti, J. Chen, F. Yeh
{"title":"International network research testbed facilities based on OpenFlow: Architecture, services, technologies, and distributed infrastructure","authors":"J. Mambretti, J. Chen, F. Yeh","doi":"10.1109/ICON.2012.6506563","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506563","url":null,"abstract":"Because communication services are global, to advance the state of the art for communication services along with underlying architecture, technologies, and facilities, network science research communities require world-wide experimental research facilities and testbeds. Previously, designing, implementing, and operating such global research facilities have been complex and fairly costly tasks. However, recently a number of trends have reduced the barriers to creating such large scale testbed facilities. These trends include wider deployments of fiber infrastructure, more flexible ligthpath channel control, new techniques for dynamic networking, lower cost components, and the emergence of highly programmable networking, in part, based on innovative control frameworks. Many emerging testbeds and related techniques are based on OpenFlow, which provides opportunities that enable a high degree of network customization, dynamic provisioning, and edge control. These trends are allowing international research facilities to be deployed and used to create and investigate innovative communication services, architecture, protocols, technologies, and facilities. Currently, network research organizations in a number of countries are collaborating to design and implement a persistent international experimental research facility that can be used to implement multiple testbeds and to prototype, investigate, and test network innovations for next generation global scale communication services, including personal networks. OpenFlow is a key resource that has been integrated into this facility. This international experimental network facility is already being used to support a wide range of experiments and to showcase demonstrations of network innovations.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smartphone-based vehicular and activity sensing 基于智能手机的车辆和活动传感
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506524
King-Seng Ang, C. Tham
{"title":"Smartphone-based vehicular and activity sensing","authors":"King-Seng Ang, C. Tham","doi":"10.1109/ICON.2012.6506524","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506524","url":null,"abstract":"Built-in hardware sensors and network connectivity in many modern smartphones provide opportunities for novel location-based and context-aware applications, particularly in the field of public transportation, physical activity recognition and event detection. A real-time prediction method of the time remaining before reaching the specified destination for bus trips is designed and implemented. The ability to keep track of the trip progress with regards to the list of bus stops to be traversed is built upon the location sensing capability of the passenger's phone and a local database of bus stop positions. This in turn is used in computation of the prediction of remaining time, which involves fetching of historical estimates from a central server and adapting the raw estimate values to the relative speed characteristics of the current trip. Separately, a social sensing and event detection system integrates sound, location and motion sensing data from multiple phones with relevant location-specific data extracted from a Twitter stream as inputs that trigger real-time push notifications back to the phone sensors under specific scenarios. In particular, the accelerometer is used to develop the on-device user activity state recognition logic, for which fairly promising results are obtained.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"589 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信