2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020最新文献

筛选
英文 中文
Crosstalk-induced Impact of Coexisting DWDM Network on Continuous-variable QKD 共存DWDM网络串扰对连续变量QKD的影响
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570604589
Binjie Chu, Yichen Zhang, Yijia Zhao, Yifan Xu, Xing Chen, Xiangyu Wang, Song Yu
{"title":"Crosstalk-induced Impact of Coexisting DWDM Network on Continuous-variable QKD","authors":"Binjie Chu, Yichen Zhang, Yijia Zhao, Yifan Xu, Xing Chen, Xiangyu Wang, Song Yu","doi":"10.1109/DRCN48652.2020.1570604589","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604589","url":null,"abstract":"In this paper, the crosstalk-induced impact of coexisting dense-wavelength-division-multiplexed (DWDM) channels on continuous-variable quantum key distribution (CV-QKD) in practical communication environment is investigated. We analyze the nonlinear effect resulting from classical channels on the transmitted local oscillator in CV-QKD, while various existing studies mainly focus on the crosstalk-induced excess noise. We demonstrate that the generally ignored phenomenon of four-wave mixing in excess noise analysis is a visible factor causing local oscillator fluctuation characterized by the statistical properties of the power evolution of local oscillator. Besides, the impact of stimulated Raman scattering on local oscillator is derived in the same theoretical approach and experimentally investigated. Finally, by establishing a trusted model for local oscillator fluctuation we perform the security analysis to constrain the threshold of fluctuation. All of the above analysis should be taken into account as a supplementary for evaluating the performance of CV-QKD with coexisting DWDM system and optimal allocation of classical and quantum channels.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the cost benefit of real-time optical performance in dynamic optical restoration 动态光学恢复中实时光学性能的成本效益评估
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570638832
B. Gangopadhyay, J. Pedro, J. Santos, N. Borges, Paulo Santos, H. Bock, N. Prasad, R. Prasad
{"title":"Evaluating the cost benefit of real-time optical performance in dynamic optical restoration","authors":"B. Gangopadhyay, J. Pedro, J. Santos, N. Borges, Paulo Santos, H. Bock, N. Prasad, R. Prasad","doi":"10.1109/DRCN48652.2020.1570638832","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570638832","url":null,"abstract":"Network availability is becoming a key aspect for next generation networks. Operators and service-providers are struggling to keep the network total cost of ownership (TCO) under control while providing seamless connectivity to end-users. In the same context, the authors investigate the benefit of a framework exploiting real-time optical performance to compute restoration paths while executing dynamic layer-0 (L0) restoration. This investigative study evaluates total network cost and is based on five reference networks with a five-year traffic growth model between two network-operation modes - i) a traditional framework where dynamic L0 restoration path and resources are calculated with offline planned \"end-of-life\" (EoL) optical performance data and ii) a real-time framework where dynamic L0 restoration path and resources are calculated with real-time calculated \"current-state-of-life\" (CoL) performance data.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116205878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software-Defined Network Design driven by Availability Requirements 由可用性需求驱动的软件定义网络设计
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570604282
Dorabella Santos, Teresa Gomes, D. Tipper
{"title":"Software-Defined Network Design driven by Availability Requirements","authors":"Dorabella Santos, Teresa Gomes, D. Tipper","doi":"10.1109/DRCN48652.2020.1570604282","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604282","url":null,"abstract":"In Software Defined Networking (SDN), the controller locations are mainly constrained by delays between switches and controllers, and between the controllers themselves. In addition to the delay requirements, the availability of the connections between switches and controllers is also a key issue for control plane performance. Here, we explore the idea of having a spanning tree substructure called the spine, whose links can be upgraded to have high availability in order to support availability requirements for the control paths (routing paths between switches and controllers). We formulate an optimization model of the joint controller placement and spine design problem for SDN networks, under delay, availability and path redundancy requirements.Numerical results are presented showing the trade-offs between the number of controllers, delay requirements and upgrade cost.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers 安全总比后悔好:复制SDN控制器的可靠性和安全性建模
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570604424
Siwar Kriaa, S. Papillon, L. Jagadeesan, V. Mendiratta
{"title":"Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers","authors":"Siwar Kriaa, S. Papillon, L. Jagadeesan, V. Mendiratta","doi":"10.1109/DRCN48652.2020.1570604424","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604424","url":null,"abstract":"Software-defined networks (SDN), through their programmability, significantly increase network resilience by enabling dynamic reconfiguration of network topologies in response to faults and potentially malicious attacks detected in real-time. Another key trend in network softwarization is cloud- native software, which, together with SDN, will be an integral part of the core of future 5G networks. In SDN, the control plane forms the \"brain\" of the software-defined network and is typically implemented as a set of distributed controller replicas to avoid a single point of failure. Distributed consensus algorithms are used to ensure agreement among the replicas on key data even in the presence of faults. Security is also a critical concern in ensuring that attackers cannot compromise the SDN control plane; byzantine fault tolerance algorithms can provide protection against compromised controller replicas. However, while reliability/availability and security form key attributes of resilience, they are typically modeled separately in SDN, without consideration of the potential impacts of their interaction. In this paper we present an initial framework for a model that unifies reliability, availability, and security considerations in distributed consensus. We examine -- via simulation of our model -- some impacts of the interaction between accidental faults and malicious attacks on SDN and suggest potential mitigations unique to cloud-native software.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols 针对IEC 61850实时通信协议攻击的对手模型
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570604241
Livinus Obiora Nweke, G. Weldehawaryat, S. Wolthusen
{"title":"Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols","authors":"Livinus Obiora Nweke, G. Weldehawaryat, S. Wolthusen","doi":"10.1109/DRCN48652.2020.1570604241","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570604241","url":null,"abstract":"Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication networks and systems for power utility automation in particular not only requires distributed processing, but in case of the generic object oriented substation events and sampled value (GOOSE/SV) protocols also hard real-time characteristics. This motivates the desire to include both quality of service (QoS) and explicit network topology in an adversary model based on a π-calculus process algebraic formalism based on earlier work. This allows reasoning over process states, placement of adversarial entities and communication behaviour. We demonstrate the use of our model for the simple case of a replay attack against the publish/subscribe GOOSE/SV subprotocol, showing bounds for non-detectability of such an attack.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Paxos in the NIC: Hardware Acceleration of Distributed Consensus Protocols 网卡中的Paxos:分布式共识协议的硬件加速
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570611009
G. Belocchi, V. Cardellini, A. Cammarano, G. Bianchi
{"title":"Paxos in the NIC: Hardware Acceleration of Distributed Consensus Protocols","authors":"G. Belocchi, V. Cardellini, A. Cammarano, G. Bianchi","doi":"10.1109/DRCN48652.2020.1570611009","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570611009","url":null,"abstract":"Modern network infrastructures rich of logically centralized agents, such as DHCP, AAA, SDN controller agents, need to use redundancy in order to guarantee high availability and consensus protocols to have strong consistency. Unfortunately, consensus protocols, which are traditionally deployed as application-layer services running on end-to-end servers, are often recognized as system performance bottlenecks. In this paper, we present a possible solution leveraging programmable network hardware in order to offer consensus as service for the application, thus reducing occupied server resources and accelerating the protocol with programmable hardware. This is obtained by defining a high-level abstraction for describing consensus protocols and conducting a feasibility study through the implementation of the Paxos protocol with a SmartNIC.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125708563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust Optimization Model for Probabilistic Protection under Uncertain Virtual Machine Capacity in Cloud 云环境下虚拟机容量不确定的概率保护鲁棒优化模型
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570609411
Mitsuki Ito, Fujun He, E. Oki
{"title":"Robust Optimization Model for Probabilistic Protection under Uncertain Virtual Machine Capacity in Cloud","authors":"Mitsuki Ito, Fujun He, E. Oki","doi":"10.1109/DRCN48652.2020.1570609411","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570609411","url":null,"abstract":"This paper presents robust optimization models for minimizing the required backup capacity with probabilistic protection against multiple simultaneous failures of physical machines in a cloud provider. If random failures occur, the required capacities for virtual machines are allocated to the dedicated backup physical machines, which are determined in advance. We consider two uncertainties, failure event and virtual machine capacity. By adopting the robust optimization technique, we formulate three mixed integer linear programming problems. There are differences of robustness between the three models. Then we provide theorems concerned with the differences and prove them. The theorems are supported by numerical results. Our three presented models are applicable to the case that virtual machine capacities are uncertain, and by using these models, we can obtain the optimal solution of the allocation of virtual machines under the uncertainty.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121442301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Vulnerable Critical Infrastructure Zones in Smart Cities 识别智慧城市中脆弱的关键基础设施区域
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570613452
Abdulaziz Alqahtani, D. Tipper, Katrina Kelly-Pitou, Amy Babay
{"title":"Identifying Vulnerable Critical Infrastructure Zones in Smart Cities","authors":"Abdulaziz Alqahtani, D. Tipper, Katrina Kelly-Pitou, Amy Babay","doi":"10.1109/DRCN48652.2020.1570613452","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570613452","url":null,"abstract":"Emerging smart cities are leveraging technologies to create smart critical infrastructures with the goal of improving the quality of life. These smart infrastructures introduce new vulnerabilities to the failure of ICT and electric power. Hence there is a need for holistic analysis of critical infrastructures incorporating power and communications with other infrastructures when determining weak points. Here we propose a framework for identifying the most important geographical zones within a city from a critical infrastructure viewpoint. The framework combines multiple metrics including societal, geographic and network science based, as well as including power requirements. Furthermore it enables analyst to study both networked critical infrastructure and standalone critical infrastructure. A case study of four critical infrastructures in the city of Pittsburgh, Pennsylvania is given illustrating the approach. The results show that considering the infrastructures as a group in a holistic fashion yields much different results when compared with studying each infrastructure individually. Further, we demonstrate how the results of the holistic analysis can be incorporated into a risk analysis.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134398120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Linear Massive MIMO Uplink Detector Based On Joint Jacobi and Gauss-Seidel Methods 基于联合雅可比和高斯-塞德尔方法的线性海量MIMO上行探测器
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570610672
M. Albreem, Ayman A. El-Saleh, M. Juntti
{"title":"Linear Massive MIMO Uplink Detector Based On Joint Jacobi and Gauss-Seidel Methods","authors":"M. Albreem, Ayman A. El-Saleh, M. Juntti","doi":"10.1109/DRCN48652.2020.1570610672","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570610672","url":null,"abstract":"In fifth generation (5G) cellular system, massive multiple-input multiple-output (MIMO) is utilized to improve the diversity gain, reliability, link robustness, latency, and power and spectral efficiencies. However, a large number of antennas requires sophisticated signal processing to detect data. Although the detection based on maximum likelihood (ML) obtains the best performance, it is not hardware friendly because of the exponential complexity. Therefore, several iterative methods are proposed to estimate the signal without computing the inverse of equalization matrix, and hence, minimize the complexity. The Jacobi (JA) and the Gauss-Seidel (GS) methods achieve a satisfactory performance. However, large iterations’ number is in demand which produces a high computational complexity. This paper proposes a detector for massive MIMO uplink (UL) system based on the JA and GS methods. Proposed detector obtains a balance between the performance and the complexity. In this research, initialization is performed based on the JA method. After-that, the estimation is performed based on the GS method. Numerical results show that the proposed JAGS detector outperforms the GS and the JA based detector. Moreover, proposed JA-GS based detector requires few iterations to obtain the target performance and hence, a considerable reduction in computational complexity is achieved.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving the Connectivity Resilience of a Telecommunications Network to Multiple Link Failures Through a Third-Party Network 提高电信网络对通过第三方网络的多链路故障的连通性弹性
2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020 Pub Date : 2020-03-01 DOI: 10.1109/DRCN48652.2020.1570613461
A. Sousa
{"title":"Improving the Connectivity Resilience of a Telecommunications Network to Multiple Link Failures Through a Third-Party Network","authors":"A. Sousa","doi":"10.1109/DRCN48652.2020.1570613461","DOIUrl":"https://doi.org/10.1109/DRCN48652.2020.1570613461","url":null,"abstract":"Currently, telecommunication networks are fully resilient, in terms of connectivity, to single link failures. On the other hand, multiple simultaneous link failures are becoming a concern to network operators, mainly due to malicious human activities. Full connectivity resilience to multiple link failures is too costly and other solutions must be envisaged. For a given maximum number of simultaneous link failures, the connectivity resilience metric adopted here is the minimum number of network node pairs that can still communicate for any set of failing links. In this work, the connectivity resilience to multiple link failures is improved by resorting to a third-party network for temporary additional connectivity (i.e., while the failing links are not reestablished). In such a solution, some nodes must be selected to act as gateway nodes between the two networks. For a given network topology and a given number of gateway nodes, the aim is to select the most appropriate gateway nodes so that the connectivity resilience is improved as much as possible. To address this problem, a Gateway Node Selection (GNS) algorithm is proposed where the most damaging sets of failing links are identified and, then, a set cover problem type is defined and solved to select the gateway nodes. The computational results demonstrate the effectiveness of the proposed GNS algorithm over two well-known network topologies.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信