2010 Proceedings IEEE INFOCOM最新文献

筛选
英文 中文
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication 随机差分DSSS:抗干扰无线广播通信
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462156
Yao Liu, P. Ning, H. Dai, An Liu
{"title":"Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication","authors":"Yao Liu, P. Ning, H. Dai, An Liu","doi":"10.1109/INFCOM.2010.5462156","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462156","url":null,"abstract":"Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit ``0'' is encoded using two different spreading codes, which have low correlation with each other, while bit ``1'' is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"562 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
An Experimental Case for SIMO Random Access in Multi-hop Wireless Networks 多跳无线网络中SIMO随机接入的实验研究
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462252
Ahmed K. F. Khattab
{"title":"An Experimental Case for SIMO Random Access in Multi-hop Wireless Networks","authors":"Ahmed K. F. Khattab","doi":"10.1109/INFCOM.2010.5462252","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462252","url":null,"abstract":"In this paper, we demonstrate that multiple concurrent asynchronous and uncoordinated Single- Input Multiple-Output (SIMO) transmissions can successfully take place even though the respective receivers do not explicitly null out interfering signals. Thus motivated, we propose simple modifications to the widely deployed IEEE 802.11 MAC to enable multiple non-spatially-isolated SIMO sender-receiver pairs to share the medium. Namely, we propose to increase the physical carrier sensing threshold, disable virtual carrier sensing, and enable message in message packet detection. We use experiments to show that while increasing the peak transmission rate, spatial multiplexing schemes such as those employed by the IEEE 802.11n are highly non-robust to asynchronous and uncoordinated interferers. In contrast, we show that the proposed multi-flow SIMO MAC scheme alleviates the severe unfairness resulting from uncoordinated transmissions in 802.11 multi-hop networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks 基于CSMA/ ca的无线网络中退避不良节点的阶增益研究
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462002
Zhuo Lu, Wenye Wang, Cliff X. Wang
{"title":"On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks","authors":"Zhuo Lu, Wenye Wang, Cliff X. Wang","doi":"10.1109/INFCOM.2010.5462002","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462002","url":null,"abstract":"Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this paper, we define and study two general classes of backoff misbehavior to assess the gain that misbehaving nodes can obtain. The first class, called continuous misbehavior, keeps manipulating the backoff time unless it is disabled by countermeasures. The second class is referred to as intermittent misbehavior, which tends to evade the detection by countermeasures by performing misbehavior sporadically. Our approach is to introduce a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. Through analytical studies, simulations, and experiments, we demonstrate the impact of a wide range of backoff misbehaviors on network performance with respect to the number of users in CSMA/CA-based wireless networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing 有向图上的随机漫步:估计无线路由传输成本的理论框架
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462109
Yanhua Li, Zhi-Li Zhang
{"title":"Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing","authors":"Yanhua Li, Zhi-Li Zhang","doi":"10.1109/INFCOM.2010.5462109","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462109","url":null,"abstract":"In this paper we develop a unified theoretical framework for estimating various transmission costs of packet forwarding in wireless networks. Our framework can be applied to the three routing paradigms, best path routing, opportunistic routing, and stateless routing, to which nearly all existing routing protocols belong. We illustrate how packet forwarding under each paradigm can be modeled as random walks on directed graphs (digraphs). By generalizing the theory of random walks that has primarily been developed for undirected graphs to digraphs, we show how various transmission costs can be formulated in terms of hitting times and hitting costs of random walks on digraphs. As representative examples, we apply the theory to three specific routing protocols, one under each paradigm. Extensive simulations demonstrate that the proposed digraph based analytical model can achieve more accurate transmission cost estimation over existing methods.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Transition from Heavy to Light Tails in Retransmission Durations 重传持续时间从重尾到轻尾的转换
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461910
Jian Tan, N. Shroff
{"title":"Transition from Heavy to Light Tails in Retransmission Durations","authors":"Jian Tan, N. Shroff","doi":"10.1109/INFCOM.2010.5461910","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461910","url":null,"abstract":"Retransmissions serve as the basic building block that communication protocols use to achieve reliable data transfer. Until recently, the number of retransmissions were thought to follow a light tailed (in particular, a geometric) distribution. However, recent work seems to suggest that when the distribution of the packets have infinite support, retransmission-based protocols may result in heavy tailed delays and even possibly zero throughput. While this result is true even when the distribution of packet sizes are light-tailed, it requires the assumption that the packet sizes have infinite support. However, in reality, packet sizes are often bounded by the Maximum Transmission Unit (MTU), and thus the aforementioned result merits a deeper investigation. To that end, in this paper, we allow the distribution of the packet size L to have finite support. This packet is sent over an on-off channel {(A_i,U_i)} with alternating available A_i and unavailable U_i periods. If L≥A_i, the transmission fails and we wait for the next period A_(i+1) to retransmit the packet. The transmission duration is thus measured from the first attempt to a point when a channel available period larger than L. Under mild conditions, we show that the transmission duration distribution exhibits a transition from a power law main body to an exponential tail with Weibull type distributions between the two. The time scale to observe the power law main body is roughly equal to the average transmission duration of the longest packet. Both the power law main body and the exponential tail could dominate the overall performance. For example, the power law main body, if significant, may cause the channel throughput to be very close to zero. On the other hand, the exponential tail, if more evident, may imply that the system operates in a benign environment. These theoretical findings provide an understanding on why some empirical measurements suggest heavy tails and light tails for others (e.g., wireless networks). We use these results to further highlight the engineering implications from distributions with power law main bodies and light tails by analyzing two cases: (1) The throughput of on-off channels with retransmissions, where we show that even when packet sizes have small means and bounded support the variability in their sizes can greatly impact system performance. (2) The distribution of the number of jobs in an M/M/∞ queue with server failures. Here we show that retransmissions can cause long-range dependence and quantify the impact of the maximum job sizes on the long-range dependence.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location Fingerprint 基于信号强度差作为定位指纹的Cramer-Rao定界分析
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462020
A. Hossain, Wee-Seng Soh
{"title":"Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location Fingerprint","authors":"A. Hossain, Wee-Seng Soh","doi":"10.1109/INFCOM.2010.5462020","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462020","url":null,"abstract":"In this paper, we analyze the Cramer-Rao Lower Bound (CRLB) of localization using Signal Strength Difference (SSD) as location fingerprint. This analysis has a dual purpose. Firstly, the properties of the bound on localization error may help to design efficient localization algorithm. For example, utilizing one of the properties, we propose a way to define weights for a weighted K-Nearest Neighbor (K-NN) scheme which is shown to perform better than the K-NN algorithm. Secondly, it provides suggestions for a positioning system design by revealing error trends associated with the system deployment. In both cases, detailed analysis as well as experimental results are presented in order to support our claims.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Approximate Models for General Cache Networks 通用缓存网络的近似模型
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461936
Elisha J. Rosensweig, J. Kurose, D. Towsley
{"title":"Approximate Models for General Cache Networks","authors":"Elisha J. Rosensweig, J. Kurose, D. Towsley","doi":"10.1109/INFCOM.2010.5461936","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461936","url":null,"abstract":"Many systems employ caches to improve performance. While isolated caches have been studied in-depth, multi-cache systems are not well understood, especially in networks with arbitrary topologies. In order to gain insight into and manage these systems, a low-complexity algorithm for approximating their behavior is required. We propose a new algorithm, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches. We demonstrate the utility of a-Net using both per- cache and network-wide performance measures. We also perform factor analysis of the approximation error to identify system parameters that determine the precision of a-Net.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128776606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 221
A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching 高速交换串扰避免的位填充算法
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462140
Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, D. Lee
{"title":"A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching","authors":"Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, D. Lee","doi":"10.1109/INFCOM.2010.5462140","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462140","url":null,"abstract":"Motivated by the design of high speed switching fabrics, in this paper we propose a emph{bit-stuffing} algorithm for generating forbidden transition codes to mitigate the crosstalk effect between adjacent wires in long on-chip buses. We first model a bus with forbidden transition constraints as a forbidden transition channel, and derive the Shannon capacity of such a channel. Then we perform a worst case analysis and a probabilistic analysis for the bit-stuffing algorithm. We show by both theoretic analysis and simulations that the coding rate of the bit stuffing encoding scheme for independent and identically distributed (i.i.d.) Bernoulli input traffic is quite close to the Shannon capacity, and hence is much better than those of the existing forbidden transition codes in the literature, including the Fibonacci representation.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Retiring Replicants: Congestion Control for Intermittently-Connected Networks 退役复制人:间歇连接网络的拥塞控制
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461934
N. Thompson, S. Nelson, Mehedi Bakht, T. Abdelzaher, R. Kravets
{"title":"Retiring Replicants: Congestion Control for Intermittently-Connected Networks","authors":"N. Thompson, S. Nelson, Mehedi Bakht, T. Abdelzaher, R. Kravets","doi":"10.1109/INFCOM.2010.5461934","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461934","url":null,"abstract":"The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These intermittently-connected networks (ICNs) typically lack stable end-to-end paths. In order to improve the delivery rates of the networks, new store-carry-and-forward protocols have been proposed which often use message replication as a forwarding mechanism. Message replication is effective at improving delivery, but given the limited resources of ICN nodes, such as buffer space, bandwidth and energy, as well as the highly dynamic nature of these networks, replication can easily overwhelm node resources. In this work we propose a novel node-based replication management algorithm which addresses buffer congestion by dynamically limiting the replication a node performs during each encounter. The insight for our algorithm comes from a stochastic model of message delivery in ICNs with constrained buffer space. We show through simulation that our algorithm is effective, nearly tripling delivery rates in some scenarios, and imposes little overhead.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Counting RFID Tags Efficiently and Anonymously 高效、匿名的RFID标签计数
2010 Proceedings IEEE INFOCOM Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461944
Hao Han, Bo Sheng, C. C. Tan, Qun A. Li, W. Mao, Sanglu Lu
{"title":"Counting RFID Tags Efficiently and Anonymously","authors":"Hao Han, Bo Sheng, C. C. Tan, Qun A. Li, W. Mao, Sanglu Lu","doi":"10.1109/INFCOM.2010.5461944","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461944","url":null,"abstract":"Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many real-time monitoring and privacy-preserving applications. In this paper, we present an efficient and anonymous scheme for tag population estimation. This scheme leverages the position of the first reply from a group of tags in a frame. Results from mathematical analysis and extensive simulation demonstrate that our scheme outperforms other protocols proposed in the previous work.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信