2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)最新文献

筛选
英文 中文
SRLG identification from time series analysis of link state data 从链路状态数据的时间序列分析中识别SRLG
G. Das, D. Papadimitriou, B. Puype, D. Colle, M. Pickavet, P. Demeester
{"title":"SRLG identification from time series analysis of link state data","authors":"G. Das, D. Papadimitriou, B. Puype, D. Colle, M. Pickavet, P. Demeester","doi":"10.1109/COMSNETS.2011.5716485","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716485","url":null,"abstract":"Failing to account for the set of links affected by a simultaneous dependent failure during the re-computation of the routing table entries leads to traffic losses until all failed links have been accounted in the re-computation of these entries. Instead, if the router learns about the existence of Shared Risk Link Groups (SRLGs) from the arriving pattern link state routing information, then decisions regarding SRLG failure can be taken promptly to avoid successive re-computations of alternate shortest paths across the updated topology. In this paper, we propose a mechanism to improve the router recovery time upon occurrence of topological link failures by detecting and identifying the existence of SRLGs from link state routing information exchanged in the routing domain. The proposed model first groups into events individual Link State Advertisements (LSAs) issued by different network nodes (routers) upon link state change; then, it combines this information to find temporal dependence among members of event groups. It further introduces a physical model interpretation derived from the application of the Weibull distribution, to determine the error on the joint probabilities of events resulting from the finite observation sample. This association allows binding the dependence of the identified groups comprising one or more events (associated to SRLG) on the corresponding estimated failure rate. Our simulation results show that the proposed technique to locally detect and identify SRLGs performs sufficiently well to trigger with enough confidence simultaneous routing table updates from the arrival of a reduced set of LSAs (ideally one).","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130424184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Joint optimization of 2-tier dual-homing for NodeBs and RNCs in UMTS networks using meta-heuristic techniques 基于元启发式技术的UMTS网络中节点和rnc两层双归巢联合优化
S. Sadhukhan, S. Mandal, S. Shaw, Debashis Saha
{"title":"Joint optimization of 2-tier dual-homing for NodeBs and RNCs in UMTS networks using meta-heuristic techniques","authors":"S. Sadhukhan, S. Mandal, S. Shaw, Debashis Saha","doi":"10.1109/COMSNETS.2011.5716508","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716508","url":null,"abstract":"Conventional design of UMTS networks usually involves single-homing (i.e., many-to-one mapping) of NodeBs to Radio Network Controllers (RNCs) in tier-1 (i.e., a group of NodeBs is connected to a single RNC) and that of RNCs to Mobile Switching Centres (MSCs) as well as to Serving GPRS Support Nodes (SGSNs) in tier-2 (i.e., a group of RNCs is connected to a single MSC/SGSN). Thus, any NodeB is connected to only one RNC and any RNC is connected to only one MSC/SGSN. However, as subscriber distribution changes over time and new mobility patterns of subscribers begin to evolve, single homing solution sometimes becomes inefficient in terms of handoff cost minimization. One solution to this brown-field operational problem is dual-homing extension of some selected NodeBs and RNCs (i.e., some NodeBs are connected to two RNCs in tier-1 and some RNCs to two MSCs/SGSNs in tier-2) in order to reduce the handoff cost. Traditionally, this optimization problem has been formulated separately for each tier and solved independently, thereby missing the global optimal solution. In this paper, we have first shown how to combine the optimization problems across the two tiers and then mapped the joint dual homing optimization problem into a classical search problem. Next, we have used two common meta-heuristic techniques, namely Simulated Annealing and Tabu Search, to solve the above problem. Comparison of the results obtained from joint dual homing with the published results for individual dual homing reveals that the joint dual homing performs considerably better than individual dual homing that attacks NodeB level and RNC level separately and independently.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier 使用Naìve贝叶斯分类器进行DDoS检测的网络建模的系统方法
R. Vijayasarathy, S. Raghavan, Balaraman Ravindran
{"title":"A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier","authors":"R. Vijayasarathy, S. Raghavan, Balaraman Ravindran","doi":"10.1109/COMSNETS.2011.5716474","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716474","url":null,"abstract":"Denial of Service(DoS) attacks pose a big threat to any electronic society. DoS and DDoS attacks are catastrophic particularly when applied to highly sensitive targets like Critical Information Infrastructure. While research literature has focussed on using various fundamental classifier models for detecting attacks, the common trend observed in literature is to classify DoS attacks into the broad class of intrusions, which makes proposed solutions to this class of attacks unrealistic in practical terms. In this work, the approach to a carefully engineered, practically realised system to detect DoS attacks using a Naìve Bayesian(NB) classifier is described. The work includes network modeling for two protocols - TCP and UDP.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125933085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
CPS-Net: In-network aggregation for synchrophasor applications CPS-Net:同步性应用的网络内聚合
V. Arya, J. Hazra, Palanivel A. Kodeswaran, D. Seetharam, N. Banerjee, S. Kalyanaraman
{"title":"CPS-Net: In-network aggregation for synchrophasor applications","authors":"V. Arya, J. Hazra, Palanivel A. Kodeswaran, D. Seetharam, N. Banerjee, S. Kalyanaraman","doi":"10.1109/COMSNETS.2011.5716510","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716510","url":null,"abstract":"Synchrophasors are sensors that sample power grids and publish these measurements over a network to a number of grid applications such as voltage monitoring, state estimation, visualization, etc. The sampled data is QoS sensitive and must be delivered reliably with minimal delays to the target applications. However, during network overloads or grid emergencies when the volume of data transmitted is high, it is important to gracefully degrade performance and data stream delivery in an application-specific manner.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117017647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Splitting HTTP requests on two servers 在两台服务器上分割HTTP请求
B. Rawal, R. Karne, A. Wijesinha
{"title":"Splitting HTTP requests on two servers","authors":"B. Rawal, R. Karne, A. Wijesinha","doi":"10.1109/COMSNETS.2011.5716484","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716484","url":null,"abstract":"Many techniques are commonly used to increase server availability or for distributing the load among a group of servers. We propose a technique for splitting a single HTTP request that allows a TCP connection to be dynamically split between two Web servers without using a central control. For example, one server can handle connection establishment and closing, while another handles the data transfer. This approach requires no client involvement since the existing connection with the initial server continues to be maintained, and the client is completely unaware of the splitting. We demonstrate the splitting concept in a LAN environment and provide related performance results that highlight several interesting features of splitting. The splitting was done using two bare PC servers with no operating system (OS) or kernel running in the machines. Splitting also works with clients located anywhere on the Internet, although servers have to be located on the same LAN. Our implementation and results indicate the feasibility of splitting TCP connections to transparently redistribute server load without client involvement.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Minimizing content provisioning cost in heterogeneous Social Wireless Networks 在异构社会无线网络中最小化内容供应成本
Mahmoud Taghizadeh, S. Biswas
{"title":"Minimizing content provisioning cost in heterogeneous Social Wireless Networks","authors":"Mahmoud Taghizadeh, S. Biswas","doi":"10.1109/COMSNETS.2011.5716421","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716421","url":null,"abstract":"This paper introduces an optimal cooperative caching policy for minimizing electronic content provisioning cost in Social Wireless Networks (SWNET). The SWNETs are typically formed by a collection of mobile devices, such as data enabled phones, net-books, electronic book readers etc., sharing common interests in electronic content, and physically gathering in settings such as University campuses, work places, malls, airports, train stations and other public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependencies among various stakeholders including the content provider, the network service provider, and the end consumers. Drawing motivation from Amazon's Kindle electronic book delivery business, this paper develops practical network, service, and pricing models which are then used for creating two optimal caching strategies, namely Split Cache and Distributed Benefit for minimizing content provisioning costs in networks with homogenous and heterogeneous object demands. In addition to proving the optimality of the mechanisms, the paper constructs extensive analytical and simulation models for analyzing the proposed caching strategies and their optimal operating points.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Signed graph based approach for on-line optimization in cognitive networks 基于签名图的认知网络在线优化方法
P. Balamuralidhar, Rajan Mindigal Alasingara Bhattachar
{"title":"Signed graph based approach for on-line optimization in cognitive networks","authors":"P. Balamuralidhar, Rajan Mindigal Alasingara Bhattachar","doi":"10.1109/COMSNETS.2011.5716470","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716470","url":null,"abstract":"One of the major architectural components shared between cognitive radios and networks is a cognitive engine supporting a cognitive process. Many of the decision making will need an optimization core for determining the optimum assignment for the control variables. This needs to be on-line to take care of the dynamics of the network and user contexts with strict time budgets. Moreover the overall network system is highly non-linear and often the state relations are analytically not tractable. An efficient search algorithm using a system model incorporating aspects of system ontology is be of value. Here a signed graph based methodology is proposed to incorporate the knowledge of influence relationship between state variables to guide a heuristic optimization process. The proposed methodology is illustrated using a typical wireless link optimization problem.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Confidential Program update with dynamic key computation for clustered wireless sensor networks 机密程序更新与动态密钥计算的集群无线传感器网络
M. Nirmala, A. Manjunath
{"title":"Confidential Program update with dynamic key computation for clustered wireless sensor networks","authors":"M. Nirmala, A. Manjunath","doi":"10.1109/COMSNETS.2011.5716430","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716430","url":null,"abstract":"Securing Network Program update is essential for many crucial military applications. Present Network Programming protocols proposed by Hailun Tan et al. provides confidentiality and authentication with high computational effort and power consumption. We have developed a confidential network program update protocol for clustered wireless sensor networks. Our scheme has two phases, key computation phase and network program update phase. In key computation phase, we provide an efficient key computation scheme for securing the program image. The key is dynamically computed using broadcast encryption scheme when required without storing neither any keys before deployment, nor communicating directly. Network program update phase follows an approach based on Deluge, an open source code dissemination protocol, and provides confidentiality along with authentication. An immediate and independent authentication is achieved without time synchronization between the base station and the sensor nodes. The scheme is resilient to malicious program image injection by the compromised nodes. Mobile agents are used to know about the node compromise. We implement our scheme in TinyOS and evaluate the performance. General Terms: Sensor Networks, Security, Design, Performance.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modified SPIN for wireless sensor networks 用于无线传感器网络的改进SPIN
Z. Rehena, Sarbani Roy, N. Mukherjee
{"title":"A modified SPIN for wireless sensor networks","authors":"Z. Rehena, Sarbani Roy, N. Mukherjee","doi":"10.1109/COMSNETS.2011.5716469","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716469","url":null,"abstract":"Data transmission is one of the major challenges in wireless sensor network (WSN). Different routing protocols have been proposed to save energy during data transmission in WSN. Routing protocols based on data-centric approach are suitable in this context that performs in-network aggregation of data to yield energy saving data dissemination. In this paper we propose a modified version of SPIN protocol named M-SPIN and compare its performance with traditional SPIN protocol using broadcast communication, which is a well known protocol as benchmark. We evaluate the M-SPIN protocol using simulation in TOSSIM environment. We find that, M-SPIN exhibits significant performance gains than traditional SPIN routing.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"23 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Separating event points by Binary Proximity Sensors: An asymptotic analysis 二值接近传感器分离事件点的渐近分析
B. Krishnan
{"title":"Separating event points by Binary Proximity Sensors: An asymptotic analysis","authors":"B. Krishnan","doi":"10.1109/COMSNETS.2011.5716479","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716479","url":null,"abstract":"Let n points be chosen in a sensing area and let identical events of interest occur only in these n chosen points. Binary Proximity Sensors are used to estimate which of these n points had events occurring in them. We restrict to at most one event per event point. Assume that the sensors are identical. The number of sensors dropped and the sensing radius are the two design parameters. We analytically derive the necessary and sufficient conditions on the two parameters to ensure that any of the 2n event configurations are decodable from sensor observations. The necessary and sufficient conditions are derived for various settings of the event-points and sensor deployments. These results have been derived as scaling laws, i.e., these laws are initially derived for n; and then conditions required if n → ∞ are calculated. We have also proposed the extension to higher dimensions from the 1-D case and we also pose a problem similar to the information theoretic Rate-Distortion problem.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"1138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信