Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.最新文献

筛选
英文 中文
Deployable overlay network for defense against distributed SYN flood attacks 可部署覆盖网络,防御分布式SYN flood攻击
Y. Ohsita, S. Ata, M. Murata
{"title":"Deployable overlay network for defense against distributed SYN flood attacks","authors":"Y. Ohsita, S. Ata, M. Murata","doi":"10.1093/ietcom/e91-b.8.2618","DOIUrl":"https://doi.org/10.1093/ietcom/e91-b.8.2618","url":null,"abstract":"Distributed denial-of-service attacks on public servers have recently become more serious. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN floods. But single point defense (ex. firewalls) lacks a scalability to catch up the increase of the attack traffic. In this paper, we introduce a distributed defense mechanism using overlay networks. This mechanism detects attacks near the victim servers and alert messages are sent via the overlay networks. Then defense nodes identify legitimate traffic and block malicious ones. The legitimate traffic is protected via the overlay networks. We simulate and verify our proposed method can effectively block malicious traffic and protect legitimate traffic. We also describe the deployment scenario of our defense mechanism.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124920553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A novel IEEE 802.15.3 CTA sharing protocol for supporting VBR streams 一种支持VBR流的新型IEEE 802.15.3 CTA共享协议
Kwan-Wu Chin, D. Lowe
{"title":"A novel IEEE 802.15.3 CTA sharing protocol for supporting VBR streams","authors":"Kwan-Wu Chin, D. Lowe","doi":"10.1109/ICCCN.2005.1523821","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523821","url":null,"abstract":"The IEEE 802.15.3 MAC enables high-rate communications between devices in a wireless personal area network and has good support for applications requiring quality of service (QoS). To meet applications' QoS requirements, such as delay and jitter, the channel time allocation (CTA) scheduler plays an important role in sizing and positioning CTAs within each super-frame. In this paper, we first present a novel CTA sharing protocol, called VBR-MCTA that enables the sharing of CTAs belonging to streams with the same group identity. This allows our protocol to exploit the statistical characteristics of variable bit rate (VBR) streams by giving unused time units to a How that requires peak rate allocation. We then present two optimizations to VBR-MCTA, namely VBR-Blind and VBR-TokenBus. The former, by giving ownership of a CTA in a round-robin manner without consideration to traffic profiles, does not consume any valuable \"air-time\" with signaling overheads. The latter allows a CTA to be shared by multiple devices that take turns owning unused \"air-time\" from CTAs. We have simulated VBR-MCTA and its optimizations in the ns-2 simulator over an implementation of the IEEE 802.15.3 MAC. Our results show that VBR-TokenBus has the best delay and jitter as it provides a one to six milliseconds reduction in both compared to standard CTA methods. VSR-Blind, although having performing poorer than MCTA-Token or VBR-MCTA, is still significantly better than traditional CTA methods at a reduced overhead.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Energy-aware connected dominating set construction in mobile ad hoc networks 移动自组网中能量感知连接支配集的构建
Bonam Kim, Junmo Yang, Dong Zhou, Min-Te Sun
{"title":"Energy-aware connected dominating set construction in mobile ad hoc networks","authors":"Bonam Kim, Junmo Yang, Dong Zhou, Min-Te Sun","doi":"10.1109/ICCCN.2005.1523855","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523855","url":null,"abstract":"Connected dominating set (CDS) has been used widely in mobile ad hoc networks by numerous routing, broadcast, and time synchronization protocols. Although computing minimum CDS is known to be NP-hard, many distributed protocols have been proposed to construct a small CDS. However, these protocols are either too complicated, need non-local information, are not adaptive to topology changes, or fail to consider the difference in energy consumption for nodes within and outside the CDS. In this paper, we present two timer-based energy-aware connected dominating set protocols. Our protocols extend the MAC-layer timer-based connected dominating set protocol (MTCDS) so that the energy level at each node is taken into account when constructing the CDS. Simulation results have shown that our protocols effectively construct an energy-aware CDS with a very competitive size and prolong the network operation under different levels of nodal mobility.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
STCP: a generic transport layer protocol for wireless sensor networks STCP:无线传感器网络的通用传输层协议
Yogesh G. Iyer, S. Gandham, S. Venkatesan
{"title":"STCP: a generic transport layer protocol for wireless sensor networks","authors":"Yogesh G. Iyer, S. Gandham, S. Venkatesan","doi":"10.1109/ICCCN.2005.1523908","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523908","url":null,"abstract":"We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. We present the requirements for such a transport protocol and propose sensor transmission control protocol (STCP). STCP is a generic, scalable and reliable transport layer protocol where a majority of the functionalities are implemented at the base station. STCP offers controlled variable reliability, congestion detection and avoidance, and supports multiple applications in the same network. We present the design and implementation of STCP and evaluate the protocol with different scenarios and network characteristics.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 319
Low-energy sensor network time synchronization as an emergent property 低能量传感器网络的时间同步特性
S. Bush
{"title":"Low-energy sensor network time synchronization as an emergent property","authors":"S. Bush","doi":"10.1109/ICCCN.2005.1523817","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523817","url":null,"abstract":"The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. The algorithm specifically includes the likelihood that some proportion of the sensors may include GPS receivers in order to obtain and propagate a master clock time.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Traffic engineering for virtual private networks and random traffic demands in WDM optical core networks 虚拟专用网的流量工程和WDM光核心网的随机流量需求
E. Doumith, M. Gagnaire, O. Audouin, N. Puech
{"title":"Traffic engineering for virtual private networks and random traffic demands in WDM optical core networks","authors":"E. Doumith, M. Gagnaire, O. Audouin, N. Puech","doi":"10.1109/ICCCN.2005.1523876","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523876","url":null,"abstract":"Two main classes of traffic demands may be considered in data networks: virtual private networks (VPN) and random traffic requests. In this paper, we investigate traffic engineering for such traffic classes in the context of hybrid WDM optical networks. A hybrid optical network is made of a set of multi-granularity switches, each electrical cross-connect (EXC) of the network being coupled to an optical cross-connect (OXC). Our approach differs from existing approaches by combining global optimization tools with iterative optimization tools to solve the routing and wavelength assignment (RWA) problem. For this reason, a simulated annealing meta-heuristic has been developed to route lightpath demands associated to VPN traffic. On the other hand, random demands are routed sequentially by means of a Dijkstra algorithm. Hence, space-time correlation between demands as well as sub-wavelength traffic grooming have been considered in our RWA strategy.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A lightweight classification algorithm for energy conservation in wireless sensor networks 一种用于无线传感器网络节能的轻量级分类算法
N. Tezcan, Wenye Wang
{"title":"A lightweight classification algorithm for energy conservation in wireless sensor networks","authors":"N. Tezcan, Wenye Wang","doi":"10.1109/ICCCN.2005.1523816","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523816","url":null,"abstract":"Classification of sensor nodes can be used as a technique for conserving energy and prolonging the lifetime of a wireless sensor network (WSN). In this paper, we present a new algorithm of lightweight and dynamic classification. By this algorithm, energy consumption is reduced while providing a full coverage, which is an important network parameter in WSNs. Moreover, node classification is adaptive to topology changes and has no constraint on routing protocols and hardware. Based on sensors residual energy, they are classified as essential and non-essential and rotated dynamically. Essential nodes send their measurements to the sink, whereas, non-essential ones do not send new data and receive queries from the sink. This reduces transmitting and receiving energy of non-essential nodes and regulates data traffic. Further, our mechanism may provide location-based tunable redundancy, e.g., if redundant data is needed from a specific region, the sink may query the corresponding essential nodes to activate non-essential ones in that region. We analyze the complexity and energy consumption for the scenario where nodes are randomly deployed in a given region. Analysis, supported by extensive simulation in ns2, shows that energy consumption due to communications can be reduced in proportional to the ratio of essential nodes and fairly distributed among sensors by rotation.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On-line multicast routing in WDM grooming networks WDM疏导网络中的在线组播路由
A. Vishwanath, W. Liang
{"title":"On-line multicast routing in WDM grooming networks","authors":"A. Vishwanath, W. Liang","doi":"10.1109/ICCCN.2005.1523861","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523861","url":null,"abstract":"This paper considers the problem of on-line multicast routing in WDM grooming optical mesh networks without wavelength conversion capability. In such networks, provisioning of connection requests with fractional wavelength capacity requirements is achieved by dividing a wavelength into multiple time slots and multiplexing traffic on the wavelength. We present an on-line multicast traffic grooming algorithm for the concerned problem. The objective is to efficiently route multicast requests with sub-wavelength capacity requirements onto high-capacity wavelengths, and balance the load on the links in the network at the same time. To do so, we propose a cost function, which not only encourages grooming new requests onto the wavelengths that are being used by existing traffic, but also performs load balancing by intelligently increasing the cost of using wavelengths on links. The performance results obtained by experiments on a representative sized mesh network show that the proposed algorithm outperforms the other existing algorithms.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Stability and hop-count based approach for route computation in MANET 基于稳定性和跳数的MANET路由计算方法
Sridhar K, M. Chan
{"title":"Stability and hop-count based approach for route computation in MANET","authors":"Sridhar K, M. Chan","doi":"10.1109/ICCCN.2005.1523800","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523800","url":null,"abstract":"In this paper, we present an approach for MANET routing based on stability and hop-count, where the stability metric considered is the residual lifetime of a link. We view stability based routing not as a separate routing protocol but as an enhancement to a hop-count based routing protocol (e.g. DSR or AODV), so that the expected residual lifetime as well as hop count of a route are taken into account. First, we investigate how residual link lifetime is affected by parameters such as speed and mobility pattern using simulation. The result shows that residual link lifetime is a function of current link age, mobility speed and mobility pattern and does not vary monotonically with age. Therefore, intuitive idea such as older links are more stable, which is used in existing stability-based routing algorithms like associativity based routing (ABR), does not hold across a large spectrum of mobility speeds and models. Instead, the reverse can be true. We propose stability and hop-count based routing algorithm (SHARC) using DSR as the basic routing protocol. The stability of a path is calculated using a simple histogram based estimator. Simulation results show that SHARC performs better than a hop-count only algorithm (DSR) and a stability only algorithm for both throughout of long-lived TCP and response time of short data transfer. SHARC also performs close to an algorithm with perfect knowledge of link residual lifetime in many cases.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116356279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Reducing restoration blocking in WDM optical networks 减少WDM光网络中的恢复阻塞
Zhi Liu, L. Ruan
{"title":"Reducing restoration blocking in WDM optical networks","authors":"Zhi Liu, L. Ruan","doi":"10.1109/ICCCN.2005.1523877","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523877","url":null,"abstract":"In this paper, we study the problem of reducing restoration blocking probability in WDM optical networks. First, we present two reasons for restoration blocking: primary holding and mutual competition. Next, we propose two dynamic routing and wavelength assignment algorithms to address primary holding and give three heuristics to address mutual competition. Simulation results show that our algorithms can effectively reduce the restoration blocking probability without sacrificing working blocking probability.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信