{"title":"Energy efficient learning solution for intrusion detection in Wireless Sensor Networks","authors":"S. Misra, P. Venkata Krishna, Kiran Isaac Abraham","doi":"10.1109/COMSNETS.2010.5431976","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431976","url":null,"abstract":"The protocols in Wireless Sensor Networks (WSN) have a unique requirement for being of low complexity and energy-efficient. Due to their possible deployment in remote locations for civil, educational, scientific and military purposes, security, which includes intrusion detection and intrusion prevention, is of utmost importance. In this paper, we propose a simple, low complexity and energy-aware protocol for intrusion detection in WSN. The protocol is self-learning and distributed in nature. The distributed nature avoids all other nodes being sacrificed when a single node is compromised. The protocol juxtaposes the concept of stochastic learning automata on packet sampling mechanism to achieve an energy aware intrusion detection system. We have rigorously evaluated the performance of our proposed solution by performing a variety of experiments and have found our solution approach to be promising.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115259458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using bandwidth-road maps for improving vehicular internet access","authors":"Jun Yao, S. Kanhere, Mahbub Hassan","doi":"10.1109/COMSNETS.2010.5431969","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431969","url":null,"abstract":"Thanks to the developments in the Wireless Wide Area Networking (WWAN) technology, e.g. the 3G, HSDPA, and WiMax, daily commuters now can access to the high-speed mobile data services from a fast-moving vehicle. However, in the vehicular environment, where users continuously change their geographic locations, the WWAN bandwidth fluctuates significantly, due to heterogenous wireless radio and network load conditions at different locations. This bandwidth instability presents formidable challenges to engineer a stable wireless access to the Internet. To guarantee a smooth connectivity, the underlying communication substrate will have to constantly adapt to the changing networking conditions.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure self organization of wireless sensor network: A new approach","authors":"H. Kalita, A. Kar","doi":"10.1109/COMSNETS.2010.5431968","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431968","url":null,"abstract":"Self organization is an important phase of a wireless sensor network. Thousands of Sensors are deployed in a large geographical area randomly without considering the location factor. After deployment, sensors nodes are required to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission. Also, security is an important aspect while forming the network initially. Only the authorized nodes should be allowed to join the network. In this paper, we discuss our secure self organization algorithm.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinated sampling sans Origin-Destination identifiers: Algorithms and analysis","authors":"V. Sekar, Anupam Gupta, M. Reiter, Hui Zhang","doi":"10.1109/COMSNETS.2010.5432011","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432011","url":null,"abstract":"Flow monitoring is used for a wide range of network management applications. Many such applications require that the monitoring infrastructure provide high flow coverage and support fine-grained network-wide objectives. Coordinated Sampling (cSamp) is a recent proposal that improves the monitoring capabilities of ISPs to address these demands. In this paper, we address a key deployment impediment for cSamp-like solutions-the need for routers to determine the Origin-Destination (OD) pair of each packet. In practice, however, this information is not available without expensive changes. We present a new framework called cSamp-T, in which each router uses only local information, instead of the OD-pair identifiers. Leveraging results from the theory of maximizing sub-modular set functions, cSamp-T provides near-ideal performance in maximizing the total flow coverage in the network. Further, with a small amount of targeted upgrades to a few routers, cSamp-T nearly optimally maximizes the minimum fractional coverage across all OD-pairs. We demonstrate these results on a range of real topologies.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116642303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Agarwal, Nikitas Liogkas, Prashanth Mohan, V. Padmanabhan
{"title":"WebProfiler: Cooperative diagnosis of Web failures","authors":"S. Agarwal, Nikitas Liogkas, Prashanth Mohan, V. Padmanabhan","doi":"10.1109/COMSNETS.2010.5431995","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431995","url":null,"abstract":"Despite tremendous growth in the importance and reach of the Web, users have little recourse when a Web page fails to load. Web browsers provide little feedback on such failures, typically offering only generic suggestions such as re-checking the URL or the machine's network settings. Hence, users are often unable to diagnose Web access problems, and resort to haphazardly modifying their settings or simply trying again later. We advocate a client-based collaborative approach for diagnosing Web browsing failures. Our system, WebProfiler, leverages end-host cooperation to pool together observations on the success or failure of Web accesses from multiple vantage points. These are fed into a simple, collaborative blame attribution algorithm. Our evaluation on a controlled testbed shows WebProfiler can accurately diagnose 3.6 times as many failures than possible from a single client's perspective. We present the design and prototype implementation of WebProfiler for an enterprise network.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128044352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zone based ant colony routing in mobile ad-hoc network","authors":"Maumita Bandyopadhyay, Parama Bhaumik","doi":"10.1109/COMSNETS.2010.5431989","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431989","url":null,"abstract":"Ant colony optimization (ACO) is a stochastic approach for solving combinatorial optimization problems like routing in computer networks. The idea of this optimization is based on the food accumulation methodology of the ant community. Zone based routing algorithms is build on the concept of individual node's position for routing of packets in mobile ad-hoc networks. Here the nodes' position can be further utilized to discover routes by the Ants in optimized way. Position based routing algorithms (POSANT) had some significant loopholes to find route (source to destination) like it never guarantees the route would be the shortest one, in cases while it is able to find it. On the contrary, routing algorithms which are based on ant colony optimization find routing paths that are close in length to the shortest paths. The drawback of these algorithms is the large number of control messages that needs to be sent or the long delay before the routes are established from a source to a destination. Here In this paper we have used Zone based ANT colony using Clustering which assures to find shortest route using the DIR principle (In this principle, the source or intermediate node transmits message to several neighbors and the node whose direction is closest to the direction of destination gets selected as the next hop forwarding node.) together with minimum overhead for route discovery and mobility management. Unlike other Zone based approach, in clustering it is not required to consider zone related information of each node while finding shortest path. Here, it is being proposed a new routing algorithm for mobile ad hoc network by combining the concept of Ant Colony approach and Zone based routing approach using clustering to get shortest path with small number of control messages to minimize the overhead. Simulations show that Zone Based ant colony routing algorithm has relatively short route establishment overhead than other zone based ant colony algorithms in highly mobile scenarios.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jong-Hoon Kim, Gokarna Sharma, N. Boudriga, S. S. Iyengar
{"title":"RAMP system for proactive pipeline monitoring","authors":"Jong-Hoon Kim, Gokarna Sharma, N. Boudriga, S. S. Iyengar","doi":"10.1109/COMSNETS.2010.5431967","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431967","url":null,"abstract":"In this poster, we demonstrate a novel cost effective, scalable, and customizable RFID-based autonomous pipeline monitoring system, called RAMP system, which combines sensing technologies with robot agent based technologies for efficiently inspecting health related events and RFID technologies for the storage of event related information and location support. RAMP system integrates a new concept of Multiple-channeled Redundant Array of Independent RFID Tags (called McRAIT) to increase the capacity of RFIDs needed to store information, to authorize higher communication bandwidth, to provide efficient localization of events, and to improve the fault tolerance. Further, we present some simulation experiments and prototypes to demonstrate the feasibility and scalability of RAMP system.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"28 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133723493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon Schubert, Frank C. Uyeda, N. Vasic, N. Cherukuri, Dejan Kostic
{"title":"Bandwidth adaptation in streaming overlays","authors":"Simon Schubert, Frank C. Uyeda, N. Vasic, N. Cherukuri, Dejan Kostic","doi":"10.1109/COMSNETS.2010.5432020","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432020","url":null,"abstract":"A major challenge for real-time streaming overlays is to distribute high bit-rate streams with uninterrupted playback. Hosts usually have sufficient inbound bandwidth to support streaming, but due to the prevalence of asymmetric links in broadband networks, the bottleneck is the aggregate, overlay-wide outbound bandwidth. If this bandwidth is less than what is required to forward the stream to the overlay members, then a large number of users potentially experience poor playback. We argue that for successful streaming in bandwidth constrained situations overlays need to be able to adapt to the aggregate available bandwidth. We present four bandwidth adaptation policies for tree-based streaming overlays and evaluate their efficiency using a large-scale emulation testbed with realistic broadband link characteristics.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Srivathsan, S. Siddharth, Raghavan Muthuregunathan, R. Gunasekaran, V. R. Uthariaraj
{"title":"Enhanced Genetic algorithm for solving broadcast scheduling problem in TDMA based wireless networks","authors":"R. Srivathsan, S. Siddharth, Raghavan Muthuregunathan, R. Gunasekaran, V. R. Uthariaraj","doi":"10.1109/COMSNETS.2010.5431986","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431986","url":null,"abstract":"Fixed topology packet radio networks can be used where cable connection is not possible. In TDMA based broadcast schedule for these multihop networks, finding a collision free transmission schedule for every node in the network with minimum number of time slots and maximum slot usage is an NP-complete problem. Various heuristic approaches have been proposed to solve this problem. Among these, the Modified GA Approach by Chakraborty has used Genetic Algorithm for solving this problem by defining a new crossover operator that maintains only valid individuals in the population. But the crossover and mutation operators defined in that approach have less chances of maintaining diverse and fitter individuals in the population. In this paper, we enhance this Genetic algorithm by defining additional validity constraints whose application results in clearly observable optimizations in the individuals. Further, we define problem specific crossover and mutation operators that maintain these constraints while preserving diversity and fitness in the population. It is observed that the proposed Enhanced GA outperforms the existing heuristic approaches in almost all the test cases.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130300347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Yuksel, Kadangode K. Ramakrishnan, R. Doverspike, R. Sinha, Guangzhi Li, K. Oikonomou, Dongmei Wang
{"title":"Cross-layer techniques for failure restoration of IP multicast with applications to IPTV","authors":"M. Yuksel, Kadangode K. Ramakrishnan, R. Doverspike, R. Sinha, Guangzhi Li, K. Oikonomou, Dongmei Wang","doi":"10.1109/COMSNETS.2010.5432003","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432003","url":null,"abstract":"Broadcast TV distribution over an IP network requires stringent QoS constraints, such as low latency and loss. Streaming content in IPTV is typically delivered to distribution points on an IP backbone using IP multicast protocols such as Protocol Independent Multicast Source Specific Mode (PIM-SSM). Link-restoration using MPLS or layer-2 Fast Reroute (FRR) is a proven failure restoration technique. Link-based FRR creates a pseudo-wire or tunnel in parallel to the IP adjacencies (links); and thus, single link failures are transparent to the Interior Gateway Protocol (IGP) such as OSPF. Although one may choose the back-up path's IGP link weights to avoid traffic overlap during any single physical link failure, multiple failures may still cause traffic overlap with FRR. We present a cross-layer restoration approach that combines both FRR-based restoration for single link failure and “hitless” (i.e., without loss) PIM tree reconfiguration algorithms to prevent traffic overlap when multiple failures occur.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128388345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}