2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)最新文献

筛选
英文 中文
Sycomore: A Permissionless Distributed Ledger that Self-Adapts to Transactions Demand Sycomore:一种自适应交易需求的无许可分布式账本
E. Anceaume, Antoine Guellier, R. Ludinard, B. Sericola
{"title":"Sycomore: A Permissionless Distributed Ledger that Self-Adapts to Transactions Demand","authors":"E. Anceaume, Antoine Guellier, R. Ludinard, B. Sericola","doi":"10.1109/NCA.2018.8548053","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548053","url":null,"abstract":"We propose a new way to organise both transactions and blocks in a distributed ledger to address the performance issues of permissionless ledgers. In contrast to most of the existing solutions in which the ledger is a chain of blocks extracted from a tree or a graph of chains, we present a distributed ledger whose structure is a balanced directed acyclic graph of blocks. We call this specific graph a SYC-DAG. We show that a SYC-DAG allows us to keep all the remarkable properties of the Bitcoin blockchain in terms of security, immutability, and transparency, while enjoying higher throughput and self-adaptivity to transactions demand. To the best of our knowledge, such a design has never been proposed so far.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media 支持对Twitter社交媒体上可疑用户的识别和评估
A. Tundis, Gaurav Bhatia, Archita Jain, M. Mühlhäuser
{"title":"Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media","authors":"A. Tundis, Gaurav Bhatia, Archita Jain, M. Mühlhäuser","doi":"10.1109/NCA.2018.8548321","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548321","url":null,"abstract":"The exploitation of Internet technology represents for terrorists and criminals a convenient means for establishing and advertising illegal activities. Especially, social networks facilitate new collaborations as well as the spreading of information with a lower risk of being exposed and fetched. Indeed, due to the increasing number of social media and the huge amount of data continuously generated from them, the discovering process of cyber-criminals is a hard task to be performed by the Law Enforcement Agencies and Police Forces if only based on traditional approaches. It becomes even harder if the heterogeneous nature of data, due to multi-cultural aspects, such as the variety of languages, is considered during the searching process. As a consequence, the adoption of a computer-based approach represents a viable solution. In particular, this paper aims at supporting the automatic identification process of potential online suspicious users, who act on social media. A methodological process, centered on the combination of well-known text analysis techniques by considering multi-language aspects, is proposed. In addition, an evaluation approach, based on the exploitation of different qualitative evaluation criteria, is employed to assess the level of suspiciousness of the identified users. Finally, a software tool that supports the execution of the proposed process is developed and its experimentation is shown through a case study on Twitter.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of Burst Header Packets in Optical Burst Switching Networks 光突发交换网络中突发头包的分析
S. Chawathe
{"title":"Analysis of Burst Header Packets in Optical Burst Switching Networks","authors":"S. Chawathe","doi":"10.1109/NCA.2018.8548071","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548071","url":null,"abstract":"Optical Burst Switching (OBS) networks provide a practical alternative to optical packet switching and optical circuit switching by separating control information from the primary data, sending the former on a separate control channel. However, this separation also renders OBS networks susceptible to a denial- or degradation-of-service attack (intentional or otherwise) when the data provisioned by a header packet on the control channel does not materialize. This paper addresses the problem of detecting and characterizing such problems and describes a method based on monitoring network traffic on the control and data channels. The method is evaluated on a publicly available dataset.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Population Protocols with Convergence Detection 具有收敛检测的种群协议
Yves Mocquard, B. Sericola, E. Anceaume
{"title":"Population Protocols with Convergence Detection","authors":"Yves Mocquard, B. Sericola, E. Anceaume","doi":"10.1109/NCA.2018.8548344","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548344","url":null,"abstract":"This paper focuses on pairwise interaction-based protocols, and proposes an universal mechanism that allows each agent to locally detect that the system has converged to the sought configuration with high probability. To illustrate our mechanism, we use it to detect the instant at which the proportion problem is solved. Specifically, let n<inf>A</inf> (resp. n<inf>B</inf>) be the number of agents that initially started in state $A$ (resp. B) and γ<inf>A</inf>= n<inf>A</inf>/n, where $n$ is the total number of agents. Our protocol guarantees, with a given precision ε > 0 and any high probability 1 - 6, that after O ($n$ ln($n$ /δ)) interactions, any queried agent that has set the detection flag will output the correct value of the proportion γ<inf>A</inf> of agents which started in state A, by maintaining no more than O (ln(n) / ε) integers. We are not aware of any such results. Simulation results illustrate our theoretical analysis.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"4173 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127566776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Response Time Characterization of Microservice-Based Systems 基于微服务的系统响应时间表征
Jaime Correia, Fabio Ribeiro, R. Filipe, Filipe Araújo, J. Cardoso
{"title":"Response Time Characterization of Microservice-Based Systems","authors":"Jaime Correia, Fabio Ribeiro, R. Filipe, Filipe Araújo, J. Cardoso","doi":"10.1109/NCA.2018.8548062","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548062","url":null,"abstract":"In pursuit of faster development cycles, companies have favored small decoupled services over monoliths. Following this trend, distributed systems made of microservices have grown in scale and complexity, giving rise to a new set of operational problems. Even though this paradigm simplifies development, deployment, management of individual services, it hinders system observability. In particular, performance monitoring and analysis becomes more challenging, especially for critical production systems that have grown organically, operate continuously, and cannot afford the availability cost of online benchmarking. Additionally, these systems are often very large and expensive, thus being bad candidates for full-scale development replicas. Creating models of services and systems for characterization and formal analysis can alleviate the aforementioned issues. Since performance, namely response time, is the main interest of this work, we focused on bottleneck detection and optimal resource scheduling. We propose a method for modeling production services as queuing systems from request traces. Additionally, we provide analytical tools for response time characterization and optimal resource allocation. Our results show that a simple queuing system with a single queue and multiple homogeneous servers has a small parameter space that can be estimated in production. The resulting model can be used to accurately predict response time distribution and the necessary number of instances to maintain a desired service level, under a given load.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems 基于功率分割和NOMA的物联网中继系统射频能量收集和信息传输
A. Rauniyar, P. Engelstad, O. Østerbø
{"title":"RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems","authors":"A. Rauniyar, P. Engelstad, O. Østerbø","doi":"10.1109/NCA.2018.8548068","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548068","url":null,"abstract":"Due to the proliferation of the Internet of Things (loT), an unprecedented expansion of wireless devices and communication among these devices for data transmission is expected over the next few years. IoT devices are rather power constrained and are mostly battery operated devices. Therefore, energy efficiency of such IoT devices or systems is a major concern. In this paper, radio frequency (RF) energy harvesting and information transmission based on Non-orthogonal multiple access (NOMA) protocol is considered for wireless powered IoT relay systems. A source node needs the help of power constrained IoT relay node IoTR to transmit its data. IoTR node first harvests the energy from the RF signal of the source node and process the information in the first stage and then transmits the source node information data along with its data using NOMA protocol in the next stage. Unlike most of the previous works in this domain, this paper also considers the data transmission of the IoTR node along with the source node to its intended destination nodes. Specifically, considering the energy constrained nature of IoT nodes and devices, we have used the combination of power splitting (PS) and NOMA protocol and have mathematically derived the outage probability and sum-throughput for the proposed system. We have also formulated an algorithm to find out the optimal power splitting factor that maximizes the sum-throughput of the proposed system. Our proposed system analytical results are validated by the simulation results.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Sensing Quality and Estimation of Public Transport Occupancy During Live Operation 公共交通运行过程中占用率的感知质量与估计
L. Mikkelsen, H. Schwefel, T. Madsen
{"title":"Sensing Quality and Estimation of Public Transport Occupancy During Live Operation","authors":"L. Mikkelsen, H. Schwefel, T. Madsen","doi":"10.1109/NCA.2018.8548319","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548319","url":null,"abstract":"Public transport providers have an interest in obtaining bus occupancy information for optimizing services and doing so at a low cost. For that reason it is of interest to compare new low cost bus occupancy estimation methods with established approaches in terms of estimation quality and characterization of variability. The paper provides approaches to derive confidence intervals for two relevant estimation approaches, WLAN probes and light sensor based, and compares the two approaches based on data from a live deployment. The comparison shows that the light sensor based approach provides high accuracy but errors accumulate over time introducing a bias and uncertainty in the estimate. The WLAN based approach is capable of recovering after errors, but due to the variability introduced by the extrapolation from number of devices to number of people the approach is less accurate.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using SGX-Based Virtual Clones for IoT Security 使用基于sgx的虚拟克隆实现物联网安全
Rashid Tahir, A. Raza, Fareed Zaffar, Faizan Ul Ghani, M. Zulfiqar
{"title":"Using SGX-Based Virtual Clones for IoT Security","authors":"Rashid Tahir, A. Raza, Fareed Zaffar, Faizan Ul Ghani, M. Zulfiqar","doi":"10.1109/NCA.2018.8548065","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548065","url":null,"abstract":"Widespread permeation of IoT devices into our daily lives has created a diverse spectrum of security and privacy concerns unique to the IoT ecosystem. Conventional host and network security mechanisms fail to address these issues due to resource constraints, ad-hoc network models and vendor-centric data collection and sharing policies. Hence, there is a need to redesign the IoT infrastructure to secure both the device and the data. To this end, we propose a design where users are in the driving seat, devices are less exposed and data sharing models are flexible and fine-grained. Our proposal comprises hardware-secured data banks based on Intel Software Guard Extensions (SGX) to house the data in clouds without the need to trust the cloud provider. Virtual clones (shadows) of devices running on top of these data banks serve as competent proxies of actual IoT devices hiding away device weaknesses. The proposed infrastructure is scalable and robust and serves as a good first step for the community to build on and improve.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124154917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction 高效、流畅和稳健的人机交互的雾机器人
G. Chand, Suman Ojha, B. Johnston, Jesse Clark, Mary-Anne Williams
{"title":"Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction","authors":"G. Chand, Suman Ojha, B. Johnston, Jesse Clark, Mary-Anne Williams","doi":"10.1109/NCA.2018.8548077","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548077","url":null,"abstract":"Active communication between robots and humans is essential for effective human-robot interaction. To accomplish this objective, Cloud Robotics (CR) was introduced to make robots enhance their capabilities. It enables robots to perform extensive computations in the cloud by sharing their outcomes. Outcomes include maps, images, processing power, data, activities, and other robot resources. But due to the colossal growth of data and traffic, CR suffers from serious latency issues. Therefore, it is unlikely to scale a large number of robots particularly in human-robot interaction scenarios, where responsiveness is paramount. Furthermore, other issues related to security such as privacy breaches and ransomware attacks can increase. To address these problems, in this paper, we have envisioned the next generation of social robotic architectures based on Fog Robotics (FR) that inherits the strengths of Fog Computing to augment the future social robotic systems. These new architectures can escalate the dexterity of robots by shoving the data closer to the robot. Additionally, they can ensure that human-robot interaction is more responsive by resolving the problems of CR. Moreover, experimental results are further discussed by considering a scenario of FR and latency as a primary factor comparing to CR models.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126816318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS) 基于集成学习的Wi-Fi网络入侵检测系统
Francisco D. Vaca, Quamar Niyaz
{"title":"An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS)","authors":"Francisco D. Vaca, Quamar Niyaz","doi":"10.1109/NCA.2018.8548315","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548315","url":null,"abstract":"As the use of Wi-Fi networks grows, so does the increase in security threats. Attackers continue to improve their attack methods, which create the need for developing effective mechanisms to detect the sophisticated attacks. In this work, we propose an implementation of intrusion detection system for Wi-Fi networks using an ensemble learning method. The AWID Wi-Fi intrusion dataset is used to discover the necessary features needed for the efficient IDS implementation. We apply several ensemble learning methods on this dataset and finalize the best one for the proposed IDS implementation. The performance of IDS is reported using well-known metrics including accuracy, precision, recall, and f-measure.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信