2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
Demonstration of TADA: A tool for automatic detection of AQM TADA的演示:AQM的自动检测工具
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-09-08 DOI: 10.1109/INFCOMW.2016.7562227
Minoo Kargar Bideh, Andreas Petlund, Iffat Ahmed
{"title":"Demonstration of TADA: A tool for automatic detection of AQM","authors":"Minoo Kargar Bideh, Andreas Petlund, Iffat Ahmed","doi":"10.1109/INFCOMW.2016.7562227","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562227","url":null,"abstract":"Active Queue Management (AQM) and solutions to the bufferbloat problem have gained a huge attention in the research community, but it is unknown to what extent such solutions are currently deployed on the Internet. In this paper, we present a demonstration of a tool, called TADA, for automatic detection of AQM on a transmission path bottleneck. We have developed an active measurement tool for Linux, which is not only able to detect the presence of an AQM between a client and a server instance of the tool, but which can also detect the type of AQMs (from a selection of AQM families). TADA relies on active measurement and is able to accurately detect the AQM type in unloaded or lightly loaded bottleneck conditions. For this demonstration, we will allow users to change parameters for loss rate, number of flows competing on the bottleneck, serial bottleneck configuration, FIFO or AQM type on the bottleneck and observe the changes/performance of the tool under different settings.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"361 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting AS-level graph reduction 回顾as级图约简
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-09-08 DOI: 10.1109/INFCOMW.2016.7562121
Erik C. Rye, Justin P. Rohrer, Robert Beverly
{"title":"Revisiting AS-level graph reduction","authors":"Erik C. Rye, Justin P. Rohrer, Robert Beverly","doi":"10.1109/INFCOMW.2016.7562121","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562121","url":null,"abstract":"The topological structure of the Internet - the interconnection of routers and autonomous systems (ASes) - is large and complex. Frequently it is necessary to evaluate network protocols and applications on “Internet-like” graphs in order understand their security, resilience, and performance properties. A fundamental obstacle to emulation and simulation is creating realistic Internet-like topologies of reduced order. We reexamine existing AS graph reduction algorithms and find that they struggle to capture graph theoretic properties of modern topologies and topologies obtained from different sources. We develop a new AS graph reduction method that performs well across time periods and data sets.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of secure 6LoWPAN communications for tactical wireless sensor networks 战术无线传感器网络安全6LoWPAN通信的实现
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-09-01 DOI: 10.1109/INFCOMW.2016.7562168
David W. Courtney, P. Thulasiraman
{"title":"Implementation of secure 6LoWPAN communications for tactical wireless sensor networks","authors":"David W. Courtney, P. Thulasiraman","doi":"10.1109/INFCOMW.2016.7562168","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562168","url":null,"abstract":"Tactical wireless sensor networks (WSN) consist of power constrained devices spread throughout a region of interest to provide data extraction in real time. The main challenges to the deployment of tactical WSNs for mission-centric operations are limited nodal energy and information security. In this paper we develop security mechanisms to be implemented on a tactical WSN using the 6LoWPAN protocol for use by the United States Marine Corps (USMC). Specifically, we develop an architectural framework for tactical WSNs by studying security gaps and vulnerabilities within the 6LoWPAN security sublayer which is based on IEEE 802.15.4. We develop a key management scheme that is non-broadcast but that is also feasible in an operational scenario. In addition, we modify the 6LoWPAN packet structure to facilitate the newly developed keying mechanism. The tactical WSN architecture is designed to defend against a variety of network attacks that can potentially occur. Simulations will be conducted via MATLAB to show the effectiveness of the developed keying and communication mechanisms.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Delay tolerant video upload from public vehicles 从公共车辆上传可容忍延迟的视频
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-11 DOI: 10.1109/INFCOMW.2016.7562074
Ali Safari Khatouni, M. Marsan, M. Mellia
{"title":"Delay tolerant video upload from public vehicles","authors":"Ali Safari Khatouni, M. Marsan, M. Mellia","doi":"10.1109/INFCOMW.2016.7562074","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562074","url":null,"abstract":"In this paper we study a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via wireless transmission to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators (MNOs), each charging a different cost. Both the cost and the upload rate for each network interface change over time, according to the network load and the position of the vehicle. When a video must be uploaded to the central security, the system has to complete the upload within a deadline, deciding i) which interface(s) to use, ii) when to upload from that interface(s) and iii) at which rate to upload. The goal is to minimize the total cost of the upload, which we assume to be proportional to the data volume being transmitted and to the cost of using a given interface. We formalize the optimization problem and propose greedy heuristics. Results are generated, using real wireless bandwidth traces, showing that one of the proposed greedy heuristics comes very close to the optimal solution.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116238027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing mmTrace:使用基于图像的光线追踪建模毫米波室内传播
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7562115
Daniel Steinmetzer, J. Classen, M. Hollick
{"title":"mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing","authors":"Daniel Steinmetzer, J. Classen, M. Hollick","doi":"10.1109/INFCOMW.2016.7562115","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562115","url":null,"abstract":"Current mm-wave indoor propagation analysis techniques have limited options when it comes to more than one transmitter and receiver. Experimental testbed hardware is expensive and state-of-the-art simulation methods, such as statistical channel models, are limited to specific scenarios. To overcome these problems, we present mmTrace, a fast deterministic image-based ray-tracing simulation framework for mm-wave propagation. It supports developing mm-wave specific protocols and, in contrast to common statistical models, deals with multiple transceivers. The strengths of mmTrace constitute signal variations at different receivers and interference of multiple transmitters, which are crucial in certain situations. We implement our framework in MATLAB and validate simulated channel impulse responses against those of statistical channel models for IEEE 802.11ad in well-defined scenarios. Our results indicate that image-based ray-tracing is a feasible tool to predict interference in mm-wave communication systems.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127098228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A survey of mobility support in Named Data Networking 命名数据网络中移动性支持的调查
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7562050
Yu Zhang, A. Afanasyev, J. Burke, Lixia Zhang
{"title":"A survey of mobility support in Named Data Networking","authors":"Yu Zhang, A. Afanasyev, J. Burke, Lixia Zhang","doi":"10.1109/INFCOMW.2016.7562050","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562050","url":null,"abstract":"The initial Named Data Networking (NDN) architecture design provided consumer mobility support automatically, taking advantage of NDN's stateful forwarding plane to return data to mobile consumers; at the same time, the support of data producer mobility was left unspecified. During the past few years, a number of NDN producer mobility support schemes have been proposed. This paper provides a clear definition of NDN mobility support, to enable fetching of data produced by mobile users, and then to classify the proposed solutions by their commonalities and to articulate design tradeoffs of different approaches. We identify remaining challenges and discuss future research directions for effective and efficient data producer mobility support in NDN.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127454479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
A QoS-constrained transmission strategy for energy Harvesting transmitter 能量收集发射机的qos约束传输策略
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7562206
Xiaomin Wu, Yuanyuan Jiao, Jian Yang, H. Xi
{"title":"A QoS-constrained transmission strategy for energy Harvesting transmitter","authors":"Xiaomin Wu, Yuanyuan Jiao, Jian Yang, H. Xi","doi":"10.1109/INFCOMW.2016.7562206","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562206","url":null,"abstract":"Energy Harvesting is a promising feature for supplying energy to a wireless device. However, due to the mobility of wireless device and the stochastic nature of the energy arrivals, innovative management strategies should be adopted to maximize the energy efficiency. In this paper, we consider the utility maximization problem of a wireless transmitter with delay limited communications and energy harvesting capability. The throughput maximization problem is formulated as a Constrained Markov Decision Process (CMDP). To deal with the curse of the dimensionality, we introduce a new technique named Lyapunov Optimization. Based on Lyapunov Optimization theory, we propose an online expected transmission utility maximization algorithm (ETUMA) which is adaptive to the wireless channel state information as well as the data and the energy queue state information. Derived ETUMA has an advantage of low complexity and requires no prior knowledge of the system. Finally, simulations are provided to illustrate the effectiveness and potential of the proposed algorithm.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127494089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D-beamforming codebook design based on directly search for millimeter-wave communications 基于直接搜索的毫米波通信三维波束形成码本设计
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7562230
Wei-xia Zou, Longfei Wang, Chao Guo
{"title":"3D-beamforming codebook design based on directly search for millimeter-wave communications","authors":"Wei-xia Zou, Longfei Wang, Chao Guo","doi":"10.1109/INFCOMW.2016.7562230","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562230","url":null,"abstract":"To solve symmetry and beam distortion problem in 3D-beamforming codebook design by direct product method, this paper proposes a codebook design scheme, which is generated by search in two-dimensional matrix. The method can generate asymmetric beam and solves the problem of beam distortion in the direction of large angle. It has more flexibility and can meet the demand for more scenes.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobile-edge computing vs. centralized cloud computing in fiber-wireless access networks 移动边缘计算与光纤无线接入网络中的集中式云计算
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7562226
B. Rimal, D. P. Van, M. Maier
{"title":"Mobile-edge computing vs. centralized cloud computing in fiber-wireless access networks","authors":"B. Rimal, D. P. Van, M. Maier","doi":"10.1109/INFCOMW.2016.7562226","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562226","url":null,"abstract":"The advent of Internet of Things and 5G applications renders the need for integration of both centralized cloud computing and emerging mobile-edge computing (MEC) with existing network infrastructures to enhance storage, processing, and caching capabilities in not only centralized but also distributed fashions for supporting both delay-tolerant and mission-critical applications. This paper investigates performance gains of centralized cloud and MEC enabled integrated fiber-wireless (FiWi) access networks. A novel resource management scheme incorporating both centralized cloud and MEC offloading activities into the underlying FiWi dynamic bandwidth allocation process is proposed. An analytical framework is developed to model packet delay, response time efficiency, and gain-offload overhead ratio for both cloud and conventional broadband access traffic. The obtained results demonstrate the feasibility of implementing conventional cloud and MEC in FiWi access networks, while not affecting network performance of broadband access traffic.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114960712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Security architecture based on defense in depth for Cloud Computing environment 云计算环境下基于纵深防御的安全架构
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7562097
Theodoros Mavroeidakos, A. Michalas, D. Vergados
{"title":"Security architecture based on defense in depth for Cloud Computing environment","authors":"Theodoros Mavroeidakos, A. Michalas, D. Vergados","doi":"10.1109/INFCOMW.2016.7562097","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562097","url":null,"abstract":"Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The aggregation of these technologies offers a new environment for the deployment of services. Cloud computing environment provides capabilities which are unique covering the existing and future needs of organizations and companies. Moreover, this environment supports big data applications usually forming the core elements of research projects. Therefore cloud computing technology and big data are linked to each other. However, the capabilities of cloud computing environment create challenges concerning the security of data applications and its systems. In this respect, security issues are present on big data applications. By adopting the cloud computing environment, the provider has to incorporate security systems and policies in its infrastructure in order to mitigate the security threats. In this paper, multilayered security architecture is defined based on defense in depth. In this architecture the cloud infrastructure is divided into defense zones to achieve better security control. Additionally, intrusion detection system (IDS), honeypots and firewalls are incorporated alongside the defense mechanisms of the cloud infrastructure. In this way, a secure architecture is applied in which the end service is provided uninterrupted, while control over the level of security is maintained.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116557662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信