2018 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

筛选
英文 中文
Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications 基于voronoi的大规模分布式应用备份路由研究
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635645
M. Grey, Markus Theil, M. Rossberg, G. Schäfer
{"title":"Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications","authors":"M. Grey, Markus Theil, M. Rossberg, G. Schäfer","doi":"10.1109/GIIS.2018.8635645","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635645","url":null,"abstract":"The advent of critical applications that rely on Internet-based communication sheds light upon the robustness limitations of todays’s Internet infrastructure. A well-known expedient are overlay applications that provide means to reroute traffic in case of network failures, but the induced overhead of existing techniques is often considered prohibitively high. Within this work we present a highly scalable backup path mechanism for large-scale distributed applications that makes use of a spherical Voronoi-based technique for peer organization and a position-dependent path selection strategy. The achieved resilience benefit of the resulting backup paths is evaluated with simulations based on real-world data, which show that connection loss in about 75% of wide-area network failures can be avoided by only two proactively selected backup peers.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling the Energy Consumption of LoRaWAN in ns-3 Based on Real World Measurements 基于实际测量的ns-3中LoRaWAN的能耗建模
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635786
J. Finnegan, Stephen Brown, R. Farrell
{"title":"Modeling the Energy Consumption of LoRaWAN in ns-3 Based on Real World Measurements","authors":"J. Finnegan, Stephen Brown, R. Farrell","doi":"10.1109/GIIS.2018.8635786","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635786","url":null,"abstract":"LPWAN technologies are defined by their focus on extended coverage while maintaining energy efficiency, at the expense of data throughput. In this research we enable the analysis of LoRa, a key LPWAN technology, in terms of energy efficiency. We perform real-world measurements of a standard LoRa chip and use the results to develop an energy consumption module in ns-3. Our contributions are an analysis of the energy consumption of different states in a LoRa transmission by the SX1272, the LoRa transceiver that is used in most common LoRaWAN devices, beyond what is provided in the datasheet, and an energy consumption module for use in three of the LoRaWAN ns-3 modules described in research, enabling more accurate energy consumption analysis of LoRa-based systems.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adaptation of Carrier Sensing Threshold to Increase Throughput in Dense 802.11ac Wireless Networks 采用载波感知阈值提高密集802.11ac无线网络的吞吐量
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635766
O. Topal, Günes Karabulut-Kurt, Akin Soysal
{"title":"Adaptation of Carrier Sensing Threshold to Increase Throughput in Dense 802.11ac Wireless Networks","authors":"O. Topal, Günes Karabulut-Kurt, Akin Soysal","doi":"10.1109/GIIS.2018.8635766","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635766","url":null,"abstract":"Carrier sensing mechanisms in many of today’s wireless devices are based on virtual carrier sensing and physical carrier sensing. Virtual carrier sensing functions through the use of request to send and clear to send handshake signaling. Physical carrier sensing makes use of the carrier sense threshold (CST), which indeed aims to mitigate the collisions and interference related problems. In densely deployed networks, however, such classic carrier sensing mechanisms limit the spatial reuse rate, which can result in unsatisfied user demands. In this paper, an adaptive carrier sensing algorithm, which adjusts the CST depending on the overall throughput gain and fairness among the networks, is proposed to increase the spatial reuse and the system throughput. The connectivity issue of the associated clients has been addressed. As a first step, the effect of CST change is investigated in terms of airtime usage, fairness and different node densities in a simple grid 802.11ac dense network deployment. The performance evaluation of the proposed approach is done by using Network Simulator-3 (ns-3). Simulation results show that with the use of the proposed approach, the overall system throughput can be increased by as much as 100% of the throughput provided by the traditional carrier sense multiple access (CSMA)protocol.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree 基于CART决策树的智能电网异常入侵检测系统
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635743
Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis
{"title":"An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree","authors":"Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis","doi":"10.1109/GIIS.2018.8635743","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635743","url":null,"abstract":"The Smart Grid (SG) paradigm constitutes the new technological evolution of the traditional electrical grid, providing remote monitoring and controlling capabilities among all its operations through computing services. These new capabilities offer a lot of benefits, such as better energy management, increased reliability and security, as well as more economical pricing. However, despite these advantages, it introduces significant security challenges, as the computing systems and the corresponding communications are characterized by several cybersecurity threats. An efficient solution against cyberattacks is the Intrusion Detection Systems (IDS). These systems usually operate as a second line of defence and have the ability to detect or even prevent cyberattacks in near real-time. In this paper, we present a new IDS for the Advanced Metering Infrastructure (AMI) utilizing machine learning capabilities based on a decision tree. Decision trees have been used for multiple classification problems like the distinguishment between the normal and malicious activities. The experimental evaluation demonstrates the efficiency of the proposed IDS, as the Accuracy and the True Positive Rate of our IDS reach 0.996 and 0.993 respectively.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Detection of LDDoS Attacks Based on TCP Connection Parameters 基于TCP连接参数的ddos攻击检测
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635701
Michael Siracusano, S. Shiaeles, B. Ghita
{"title":"Detection of LDDoS Attacks Based on TCP Connection Parameters","authors":"Michael Siracusano, S. Shiaeles, B. Ghita","doi":"10.1109/GIIS.2018.8635701","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635701","url":null,"abstract":"Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy. They force vulnerable webservers to open all available connections to the adversary, denying resources to real users. Mitigation advice focuses on solutions that potentially degrade quality of service for legitimate connections. Furthermore, without accurate detection mechanisms, distributed attacks can bypass these defences. A methodology for detection of LDDoS attacks, based on characteristics of malicious TCP flows, is proposed within this paper. Research will be conducted using combinations of two datasets: one generated from a simulated network, the other from the publically available CIC DoS dataset. Both contain the attacks slowread, slowheaders and slowbody, alongside legitimate web browsing. TCP flow features are extracted from all connections. Experimentation was carried out using six supervised AI algorithms to categorise attack from legitimate flows. Decision trees and kNN accurately classified up to 99.99% of flows, with exceptionally low false positive and false negative rates, demonstrating the potential of AI in LDDoS detection.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Diversity in Direct Mobile-to-Mobile Communication Systems: An Experimental Approach 直接移动到移动通信系统的多样性:一种实验方法
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635726
K. Maliatsos, L. Marantis, P. Bithas, A. Kanatas
{"title":"Diversity in Direct Mobile-to-Mobile Communication Systems: An Experimental Approach","authors":"K. Maliatsos, L. Marantis, P. Bithas, A. Kanatas","doi":"10.1109/GIIS.2018.8635726","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635726","url":null,"abstract":"-5G aspires to be the technology that will create, support and enhance automation and industry digitization use cases providing inherent support to device-centric communications, i.e., vehicular (V2X) and Device-to-Device (D2D) communications, tactile internet, as well as Internet-of-Things (IoT) applications. Moreover, 5G deployment options include support of multiple (novel and established) radio access networks (RAN). In this multi-RAN, massive machine-type communication environment, a variety of broadcast, multicast and unicast applications must be simultaneously supported. In this work, we present an implementation of a diversity engine enabled by adaptive, novel, printed ESPAR antennas. The scheme improves system performance in terms of reliability and throughput with increased Signal-to-Noise Ratio (SNR) with simultaneous broadcast and directive support. The scheme was implemented and demonstrated for vehicular use cases in the context of the Horizon 2020 project ROADART.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Grid Architecture, Communications and Data Model: The WiseGRID approach 智能电网架构、通信和数据模型:WiseGRID方法
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635708
D. Stratogiannis, Stamatia Gkiala-Fikari
{"title":"Smart Grid Architecture, Communications and Data Model: The WiseGRID approach","authors":"D. Stratogiannis, Stamatia Gkiala-Fikari","doi":"10.1109/GIIS.2018.8635708","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635708","url":null,"abstract":"Current technical, social, economic and environmental trends impose the optimization of power grid and energy management via the digitalization and Smart Grid (SG) development. The SG incorporates advanced communications and pervasive computing capabilities ensuring improvement in terms of control, efficiency, reliability, flexibility and safety along with novel advanced services to customers and business actors in the energy market. In this paper, the architecture, communications and enhanced data model developed under the WiseGRID project are presented, exploring the main challenges and requirements for the design and deployment of the ICT infrastructure required as part of a complex SG system. In particular, in this work special focus is given on the Smart Grid Architecture Model (SGAM) employed and on two of the main ICT tools developed to establish the interoperability among the entities involved in the SG. Finally, the work performed towards the development of a harmonized data model for SGs is presented in order to be used during the demonstration phase of the project.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Throughput-Aware RRHs Clustering in Cloud Radio Access Networks 云无线接入网中感知吞吐量的RRHs聚类
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635647
Nazih Salhab, Rana Rahim, R. Langar
{"title":"Throughput-Aware RRHs Clustering in Cloud Radio Access Networks","authors":"Nazih Salhab, Rana Rahim, R. Langar","doi":"10.1109/GIIS.2018.8635647","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635647","url":null,"abstract":"Cloud-Radio Access Network (C-RAN) is an attractive solution to Mobile Network Operators. Firstly, C-RAN leverages the effect of pooling multiple Baseband Units (BBUs) to offer centralized processing resources while hosting them on cloud. This results in multiple benefits ranging from statistical multiplexing gains, to energy efficiency. Secondly, C-RAN allows deploying Remote Radio Heads (RRHs) in proximity of end-users allowing exploiting Inter-Cell Interference Cancellation (ICIC) to maximize throughput by coordinating multiple RRHs. In this context, we propose, in this paper, a new throughput-aware RRHs clustering method for C-RAN that maximizes the throughput for end-users, while meeting multiple constrained resources on BBUs. Our approach consists of two stages: First, individual throughput value and requirements of each RRH are calculated taking into account the Signal-to-Interference-plus-Noise Ratio (SINR) values and the distance between RRHs and users. Then, they are included into a k-dimensional Multiple-Choice Knapsack Problem (k-MCKP) subject to several constraints in terms of required resources in order to form RRHs clusters that maximize the global throughput. Simulation results demonstrate the good performance of our proposal in terms of end-users throughput, spectral efficiency and execution time, when compared with the optimal solution and the basic strategy using no-clustering scenarios.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130332864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Joint Power Allocation and Transmission Time Selection in Duty-cycled Wireless Sensor Networks 无线传感器网络中联合功率分配与传输时间选择
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635725
Christos N. Efrem, A. Panagopoulos
{"title":"Joint Power Allocation and Transmission Time Selection in Duty-cycled Wireless Sensor Networks","authors":"Christos N. Efrem, A. Panagopoulos","doi":"10.1109/GIIS.2018.8635725","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635725","url":null,"abstract":"Energy-aware resource allocation plays an important role in battery-limited wireless sensor networks (WSNs), as it improves network performance, in terms of energy savings, and prolongs network lifetime as well. In this paper, we study a duty-cycled WSN where the sensor nodes transmit their data simultaneously to a central access point and then return to sleep mode (this process is repeated in each time period). In particular, we propose a joint power allocation and transmission time selection algorithm in order to minimize the maximum energy consumption of the sensor nodes, under power and time constraints as well as quality-of-service (QoS) requirements. In the problem formulation, we also take into account the circuit energy consumption of each sensor node. Moreover, the proposed algorithm, which is based on a successive convex approximation method, converges very quickly and achieves a Karush-Kuhn-Tucker (KKT) solution for the problem. Finally, numerical results reveal that the proposed technique provides significant performance gain when compared to a baseline scheme.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/giis.2018.8635702
{"title":"[Copyright notice]","authors":"","doi":"10.1109/giis.2018.8635702","DOIUrl":"https://doi.org/10.1109/giis.2018.8635702","url":null,"abstract":"","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信