2008 Proceedings of 17th International Conference on Computer Communications and Networks最新文献

筛选
英文 中文
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs TRACK:一种新的基于连通支配集的无线传感器网络Sink迁移模型
A. Srinivasan, Jie Wu
{"title":"TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs","authors":"A. Srinivasan, Jie Wu","doi":"10.1109/ICCCN.2008.ECP.127","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.127","url":null,"abstract":"The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK - a novel sink mobility model exploiting the connected dominating set (CDS) property of a network graph. TRACK, to the best of our knowledge, is the first contemporary sink mobility model to exploit the CDS property for WSN lifetime longevity and secure data aggregation. In TRACK, the CDS of the given network is computed and then the minimum spanning tree (MST) of the CDS is constructed. Using the CDS-MST as the underlying framework, a Hamiltonian circuit (HC) is constructed, along which the sink is mobilized to traverse the network. Since TRACK, by the very definition of CDS, passes through the transmission range of every node in the network, data can be relayed directly from the source node to the sink, eliminating the need for multi-hop routing. By virtue of this property, nodes in the WSN are discharged from their routing obligations and data aggregation becomes more secure. Additionally, we propose an extended version of TRACK called M-TRACK in this paper. The extended model trades higher fractions of sensor energy with the objective of minimizing the length of sink trajectory. This consequently minimizes the delay between consecutive sink visits, mitigating buffer-overflow of sensors. M-TRACK does necessitate multi-hop routing, but keeps it within a bounded number of hops. We confirm the efficiency and robustness of our models via simulation and analysis, and show that our model can extend the WSN lifetime up to seven times that which can be achieved using a static sink.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks 802.11网络去认证/反关联攻击的轻量级防御方案
T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal
{"title":"A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks","authors":"T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal","doi":"10.1109/ICCCN.2008.ECP.51","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.51","url":null,"abstract":"In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
TCP Over Optical Burst Switching (OBS): To Split or Not To Split? TCP Over光突发交换(OBS):分割还是不分割?
Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane
{"title":"TCP Over Optical Burst Switching (OBS): To Split or Not To Split?","authors":"Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane","doi":"10.1109/ICCCN.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.66","url":null,"abstract":"TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Analysis of WiMedia UWB System for Medical Applications with Human Blockage 用于人体阻塞医疗的WiMedia UWB系统性能分析
Yue Shang, Dong Wang, D. Birru
{"title":"Performance Analysis of WiMedia UWB System for Medical Applications with Human Blockage","authors":"Yue Shang, Dong Wang, D. Birru","doi":"10.1109/ICCCN.2008.ECP.118","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.118","url":null,"abstract":"Ultra-wide-band (UWB) is expected to enable highspeed short-range wireless connectivity of numerous devices in the consumer application space. It is also a very promising candidate technology for medical applications. However, a good understanding of the performance of the technology in the medical application environment is essential. In this paper, we present the results of the study on the effects of human body interfering with (blocking) the UWB radio signal, focusing on the performance of the WiMedia UWB technology for medical applications. The study includes channel measurements, modeling and performance evaluation using the channel models. The impact of human blockages on the wireless link is studied via system simulations for different UWB configurations, including the standard WiMedia UWB system with single receive (RX) antenna, (co-located) receive antenna selection system, and the (separately-located) device selection system. Link margin analysis is also performed to quantitatively evaluate the link robustness of different UWB setups against human blockages.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Model for Differentiated Service Support in Wireless Multimedia Sensor Networks 无线多媒体传感器网络中差异化服务支持模型
M. Moghaddam, D. Adjeroh
{"title":"A Model for Differentiated Service Support in Wireless Multimedia Sensor Networks","authors":"M. Moghaddam, D. Adjeroh","doi":"10.1109/ICCCN.2008.ECP.164","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.164","url":null,"abstract":"Different network applications need different Quality of Service (QoS) requirements such as packet delay, packet loss, bandwidth and availability. It is important to develop a network architecture which is able to guaranty quality of service requirements for high priority traffic. In Wireless Multimedia Sensor Networks (WMSNs), a sensor node may have different kinds of sensor which gather different types of data, with differing levels of importance. We argue that the sensor networks should be willing to spend more resources in disseminating packets that carry more important information. Some applications of WMSNs need to send real time traffic toward the sink node. This real time traffic requires low latency and high reliability so that immediate remedial and defensive actions can be taken, where necessary. Similar to wired networks, service differentiation in wireless sensor networks is also very important. In this paper we propose a differentiated service model for WMSNs. The proposed model can provide requested quality of service for high priority real time classes. In the proposed model, we distinguish high priority real time traffic from the low priority non-real time traffic, and input traffic streams are then serviced based on their priorities. Simulation results confirm the efficiency of the proposed model.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A System Architecture for Evolving Protocol Stacks (Invited Paper) 演进协议栈的系统架构(特邀论文)
A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin
{"title":"A System Architecture for Evolving Protocol Stacks (Invited Paper)","authors":"A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin","doi":"10.1109/ICCCN.2008.ECP.44","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.44","url":null,"abstract":"A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Autocorrelation-Based Spectrum Sensing Algorithms for Cognitive Radios 基于自相关的认知无线电频谱感知算法
T. Ikuma, M. Naraghi-Pour
{"title":"Autocorrelation-Based Spectrum Sensing Algorithms for Cognitive Radios","authors":"T. Ikuma, M. Naraghi-Pour","doi":"10.1109/ICCCN.2008.ECP.102","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.102","url":null,"abstract":"Cognitive radio is an enabling technology for opportunistic spectrum access. Spectrum sensing is a key feature of a cognitive radio whereby a secondary user can identify and utilize the spectrum that remains unused by the licensed (primary) users. Among the recently proposed algorithms the covariance-based method of [1] is a constant false alarm rate (CFAR) detector with a fairly low computational complexity. The low computational complexity reduces the detection time and improves the radio agility. In this paper, we present a framework to analyze the performance of this covariance-based method. We also propose a new spectrum sensing technique based on the sample autocorrelation of the received signal. The performance of this algorithm is also evaluated through analysis and simulation. The results obtained from simulation and analysis are very close and verify the accuracy of the approximation assumptions in our analysis. Furthermore, our results show that our proposed algorithm outperforms the algorithm in [1].","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SOR Revisited: Partitioning and Recovering after Shrinking SOR重访:收缩后的分区和恢复
Manki Min, Austin F. O'Brien, Sung Y. Shin
{"title":"SOR Revisited: Partitioning and Recovering after Shrinking","authors":"Manki Min, Austin F. O'Brien, Sung Y. Shin","doi":"10.1109/ICCCN.2008.ECP.147","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.147","url":null,"abstract":"In this paper, we present an enhancement to our previously proposed algorithm, SOR, for the minimum energy broadcasting problem in wireless sensor ad hoc networks. We implement the enhanced algorithm, PSOR (Partitioning- based SOR), and compare its solution quality with other algorithms in the literature: BIP, OMEGa, SOR, and EWMA. The enhancement comes from the diversification of solution space by allowing more shrinking than the original algorithm, SOR. We can achieve the diverse solution search without hurting the original algorithm's theoretical performance bound. The experimental results confirm that the enhancement further improves the solution quality of the original algorithm, SOR.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Design of a Programmable Edge Node with Hybrid Multi-Core Processors for Virtual Networks 虚拟网络中混合多核处理器可编程边缘节点的设计
Yan Luo, Chunhui Zhang
{"title":"The Design of a Programmable Edge Node with Hybrid Multi-Core Processors for Virtual Networks","authors":"Yan Luo, Chunhui Zhang","doi":"10.1109/ICCCN.2008.ECP.26","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.26","url":null,"abstract":"Emerging new network applications challenge the existing Internet infrastructure and call for flexible and open network facilities that can provide virtual networks for conducting experiments or deploying new services. In this paper, we propose to use hybrid multi-core processors including general purpose ones and network processors as the main processing elements of a programmable edge node (PEN), an integral part of the virtualizable network substrate. We describe the design of the PEN and compare it with two newly proposed architectures. We present experiment results on the performance limitations of an existing design and show the potential of network processors in forwarding packets, isolating experiments and measurements, and offloading complex packet processing.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Standard-Based Middleware Platform for Medical Sensor Networks and u-Health 基于标准的医疗传感器网络和u-Health中间件平台
I. Martínez, J. Escayola, M. Martínez-Espronceda, L. Serrano, J. Trigo, S. Led, José García
{"title":"Standard-Based Middleware Platform for Medical Sensor Networks and u-Health","authors":"I. Martínez, J. Escayola, M. Martínez-Espronceda, L. Serrano, J. Trigo, S. Led, José García","doi":"10.1109/ICCCN.2008.ECP.135","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.135","url":null,"abstract":"Advances in information and communication technologies, ICT, are bringing new opportunities in the field of middleware systems oriented to ubiquitous environments and wearable devices used for patient telemonitoring. At a time of such challenges, this paper arises from the need to identify robust technical telemonitoring solutions that are both open and interoperable in home or mobile scenarios. These middleware systems demand standardized solutions to be cost effective and to take advantage of standardized operation and interoperability. Thus, a fundamental challenge is to design a plug-&-play platform that, either as individual elements or as components, can be incorporated in a simple way into different telecare systems, perhaps configuring a personal user network. Moreover, there is an increasing market pressure from companies not traditionally involved in medical markets, asking for a standard for personal health devices (PHD), which foresee a vast demand for telemonitoring, wellness, ambient assisted living (AAL) and applications for ubiquitous-health (u-health). However, the newly emerging situations imply very strict requirements for the protocols involved in the communication. The ISO/IEEE 11073 (X73) family of standards is adapting to new personal devices, implementing high quality sensors, and supporting wireless transport (e.g. Bluetooth) and the access to faster and reliable communication network resources. Its optimized version (X73-PHD) is adequate for this new technology snapshot and might appear the best-positioned international standards to reach this goal. This work presents an updated survey of this standard and its implementation in a middleware telemonitoring platform.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信