{"title":"Deployable overlay network for defense against distributed SYN flood attacks","authors":"Y. Ohsita, S. Ata, M. Murata","doi":"10.1093/ietcom/e91-b.8.2618","DOIUrl":"https://doi.org/10.1093/ietcom/e91-b.8.2618","url":null,"abstract":"Distributed denial-of-service attacks on public servers have recently become more serious. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN floods. But single point defense (ex. firewalls) lacks a scalability to catch up the increase of the attack traffic. In this paper, we introduce a distributed defense mechanism using overlay networks. This mechanism detects attacks near the victim servers and alert messages are sent via the overlay networks. Then defense nodes identify legitimate traffic and block malicious ones. The legitimate traffic is protected via the overlay networks. We simulate and verify our proposed method can effectively block malicious traffic and protect legitimate traffic. We also describe the deployment scenario of our defense mechanism.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124920553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel IEEE 802.15.3 CTA sharing protocol for supporting VBR streams","authors":"Kwan-Wu Chin, D. Lowe","doi":"10.1109/ICCCN.2005.1523821","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523821","url":null,"abstract":"The IEEE 802.15.3 MAC enables high-rate communications between devices in a wireless personal area network and has good support for applications requiring quality of service (QoS). To meet applications' QoS requirements, such as delay and jitter, the channel time allocation (CTA) scheduler plays an important role in sizing and positioning CTAs within each super-frame. In this paper, we first present a novel CTA sharing protocol, called VBR-MCTA that enables the sharing of CTAs belonging to streams with the same group identity. This allows our protocol to exploit the statistical characteristics of variable bit rate (VBR) streams by giving unused time units to a How that requires peak rate allocation. We then present two optimizations to VBR-MCTA, namely VBR-Blind and VBR-TokenBus. The former, by giving ownership of a CTA in a round-robin manner without consideration to traffic profiles, does not consume any valuable \"air-time\" with signaling overheads. The latter allows a CTA to be shared by multiple devices that take turns owning unused \"air-time\" from CTAs. We have simulated VBR-MCTA and its optimizations in the ns-2 simulator over an implementation of the IEEE 802.15.3 MAC. Our results show that VBR-TokenBus has the best delay and jitter as it provides a one to six milliseconds reduction in both compared to standard CTA methods. VSR-Blind, although having performing poorer than MCTA-Token or VBR-MCTA, is still significantly better than traditional CTA methods at a reduced overhead.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-aware connected dominating set construction in mobile ad hoc networks","authors":"Bonam Kim, Junmo Yang, Dong Zhou, Min-Te Sun","doi":"10.1109/ICCCN.2005.1523855","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523855","url":null,"abstract":"Connected dominating set (CDS) has been used widely in mobile ad hoc networks by numerous routing, broadcast, and time synchronization protocols. Although computing minimum CDS is known to be NP-hard, many distributed protocols have been proposed to construct a small CDS. However, these protocols are either too complicated, need non-local information, are not adaptive to topology changes, or fail to consider the difference in energy consumption for nodes within and outside the CDS. In this paper, we present two timer-based energy-aware connected dominating set protocols. Our protocols extend the MAC-layer timer-based connected dominating set protocol (MTCDS) so that the energy level at each node is taken into account when constructing the CDS. Simulation results have shown that our protocols effectively construct an energy-aware CDS with a very competitive size and prolong the network operation under different levels of nodal mobility.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STCP: a generic transport layer protocol for wireless sensor networks","authors":"Yogesh G. Iyer, S. Gandham, S. Venkatesan","doi":"10.1109/ICCCN.2005.1523908","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523908","url":null,"abstract":"We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. We present the requirements for such a transport protocol and propose sensor transmission control protocol (STCP). STCP is a generic, scalable and reliable transport layer protocol where a majority of the functionalities are implemented at the base station. STCP offers controlled variable reliability, congestion detection and avoidance, and supports multiple applications in the same network. We present the design and implementation of STCP and evaluate the protocol with different scenarios and network characteristics.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-energy sensor network time synchronization as an emergent property","authors":"S. Bush","doi":"10.1109/ICCCN.2005.1523817","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523817","url":null,"abstract":"The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. The algorithm specifically includes the likelihood that some proportion of the sensors may include GPS receivers in order to obtain and propagate a master clock time.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic engineering for virtual private networks and random traffic demands in WDM optical core networks","authors":"E. Doumith, M. Gagnaire, O. Audouin, N. Puech","doi":"10.1109/ICCCN.2005.1523876","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523876","url":null,"abstract":"Two main classes of traffic demands may be considered in data networks: virtual private networks (VPN) and random traffic requests. In this paper, we investigate traffic engineering for such traffic classes in the context of hybrid WDM optical networks. A hybrid optical network is made of a set of multi-granularity switches, each electrical cross-connect (EXC) of the network being coupled to an optical cross-connect (OXC). Our approach differs from existing approaches by combining global optimization tools with iterative optimization tools to solve the routing and wavelength assignment (RWA) problem. For this reason, a simulated annealing meta-heuristic has been developed to route lightpath demands associated to VPN traffic. On the other hand, random demands are routed sequentially by means of a Dijkstra algorithm. Hence, space-time correlation between demands as well as sub-wavelength traffic grooming have been considered in our RWA strategy.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lightweight classification algorithm for energy conservation in wireless sensor networks","authors":"N. Tezcan, Wenye Wang","doi":"10.1109/ICCCN.2005.1523816","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523816","url":null,"abstract":"Classification of sensor nodes can be used as a technique for conserving energy and prolonging the lifetime of a wireless sensor network (WSN). In this paper, we present a new algorithm of lightweight and dynamic classification. By this algorithm, energy consumption is reduced while providing a full coverage, which is an important network parameter in WSNs. Moreover, node classification is adaptive to topology changes and has no constraint on routing protocols and hardware. Based on sensors residual energy, they are classified as essential and non-essential and rotated dynamically. Essential nodes send their measurements to the sink, whereas, non-essential ones do not send new data and receive queries from the sink. This reduces transmitting and receiving energy of non-essential nodes and regulates data traffic. Further, our mechanism may provide location-based tunable redundancy, e.g., if redundant data is needed from a specific region, the sink may query the corresponding essential nodes to activate non-essential ones in that region. We analyze the complexity and energy consumption for the scenario where nodes are randomly deployed in a given region. Analysis, supported by extensive simulation in ns2, shows that energy consumption due to communications can be reduced in proportional to the ratio of essential nodes and fairly distributed among sensors by rotation.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-line multicast routing in WDM grooming networks","authors":"A. Vishwanath, W. Liang","doi":"10.1109/ICCCN.2005.1523861","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523861","url":null,"abstract":"This paper considers the problem of on-line multicast routing in WDM grooming optical mesh networks without wavelength conversion capability. In such networks, provisioning of connection requests with fractional wavelength capacity requirements is achieved by dividing a wavelength into multiple time slots and multiplexing traffic on the wavelength. We present an on-line multicast traffic grooming algorithm for the concerned problem. The objective is to efficiently route multicast requests with sub-wavelength capacity requirements onto high-capacity wavelengths, and balance the load on the links in the network at the same time. To do so, we propose a cost function, which not only encourages grooming new requests onto the wavelengths that are being used by existing traffic, but also performs load balancing by intelligently increasing the cost of using wavelengths on links. The performance results obtained by experiments on a representative sized mesh network show that the proposed algorithm outperforms the other existing algorithms.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability and hop-count based approach for route computation in MANET","authors":"Sridhar K, M. Chan","doi":"10.1109/ICCCN.2005.1523800","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523800","url":null,"abstract":"In this paper, we present an approach for MANET routing based on stability and hop-count, where the stability metric considered is the residual lifetime of a link. We view stability based routing not as a separate routing protocol but as an enhancement to a hop-count based routing protocol (e.g. DSR or AODV), so that the expected residual lifetime as well as hop count of a route are taken into account. First, we investigate how residual link lifetime is affected by parameters such as speed and mobility pattern using simulation. The result shows that residual link lifetime is a function of current link age, mobility speed and mobility pattern and does not vary monotonically with age. Therefore, intuitive idea such as older links are more stable, which is used in existing stability-based routing algorithms like associativity based routing (ABR), does not hold across a large spectrum of mobility speeds and models. Instead, the reverse can be true. We propose stability and hop-count based routing algorithm (SHARC) using DSR as the basic routing protocol. The stability of a path is calculated using a simple histogram based estimator. Simulation results show that SHARC performs better than a hop-count only algorithm (DSR) and a stability only algorithm for both throughout of long-lived TCP and response time of short data transfer. SHARC also performs close to an algorithm with perfect knowledge of link residual lifetime in many cases.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116356279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing restoration blocking in WDM optical networks","authors":"Zhi Liu, L. Ruan","doi":"10.1109/ICCCN.2005.1523877","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523877","url":null,"abstract":"In this paper, we study the problem of reducing restoration blocking probability in WDM optical networks. First, we present two reasons for restoration blocking: primary holding and mutual competition. Next, we propose two dynamic routing and wavelength assignment algorithms to address primary holding and give three heuristics to address mutual competition. Simulation results show that our algorithms can effectively reduce the restoration blocking probability without sacrificing working blocking probability.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}