2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)最新文献

筛选
英文 中文
PRE-Fog: IoT trace based probabilistic resource estimation at Fog PRE-Fog:基于物联网跟踪的概率资源估计
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444724
Mohammad Aazam, M. St-Hilaire, Chung-Horng Lung, I. Lambadaris
{"title":"PRE-Fog: IoT trace based probabilistic resource estimation at Fog","authors":"Mohammad Aazam, M. St-Hilaire, Chung-Horng Lung, I. Lambadaris","doi":"10.1109/CCNC.2016.7444724","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444724","url":null,"abstract":"Lately, pervasive and ubiquitous computing services have been under focus of not only the research community, but developers as well. Different devices generate different types of data with different frequencies. Emergency, healthcare, and latency sensitive services require real-time responses. Also, it is necessary to decide what type of data has to be uploaded to the cloud, without burdening the core network and the cloud. For this purpose, the cloud on the edge of the network, known as Fog or Micro Datacenter (MDC), plays an important role. Fog resides between the underlying Internet of Things (IoTs) and the mega datacenter cloud. Its purpose is to manage resources, perform data filtration, preprocessing, and security measures. To achieve this, Fog requires an effective and efficient resource management framework, which we propose in this paper. Fog has to deal with mobile nodes and IoTs, which involves objects and devices of different types having a fluctuating connectivity behavior. All such types of service customers have an unpredictable relinquish probability, since any object or device can stop using resources at any moment. In our proposed methodology for resource estimation and management through Fog computing, we take into account these factors and formulate resource management on the basis of fluctuating relinquish probability of the customer, service type, service price, and variance of the relinquish probability. With the intent of showing practical implications of our method, we implemented it on Crawdad real trace and Amazon EC2 pricing. Based on various services, differentiated through Amazon's price plans and historical record of Cloud Service Customers (CSCs), the model determines the amount of resources to be allocated. More loyal CSCs get better services, while for the contrary case, the provider reserves resources cautiously.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"50 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks 存在节点流失和攻击情况下保密性多对多通信的匿名性研究
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444871
Jörg Daubert, Tim Grube, M. Mühlhäuser, Mathias Fischer
{"title":"On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks","authors":"Jörg Daubert, Tim Grube, M. Mühlhäuser, Mathias Fischer","doi":"10.1109/CCNC.2016.7444871","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444871","url":null,"abstract":"Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by advertisement companies, in todays' Internet. P2P-based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many-to-many communication between services and users. However, churn and the resulting overlay degradation in P2P-based pub-sub systems require repairs and optimizations to maintain anonymity and efficiency. This paper analyzes attacks on such repair and optimization functions to disclose participants. For that, we apply a strong attacker model that combines large-scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121085610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring network infrastructural behaviour during disasters 在灾难期间推断网络基础设施的行为
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444855
Z. Gilani, A. Sathiaseelan, J. Crowcroft, V. Pejović
{"title":"Inferring network infrastructural behaviour during disasters","authors":"Z. Gilani, A. Sathiaseelan, J. Crowcroft, V. Pejović","doi":"10.1109/CCNC.2016.7444855","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444855","url":null,"abstract":"An unexpected increase in natural disasters has prompted a large interest in governments and organisations to utilise ICT for many different purposes such as preparation, impact mitigation, loss reduction and relief efforts. This paper presents initial work on studying disaster scenarios from device level perspective to characterise network infrastructural behaviour during extraordinary situations. We find connectivity challenges during disasters and observe sharp decline of quality metrics and loss of station quantity between ordinary and extraordinary time periods. We also make distinctions between usual and unusual behaviour seen during ordinary and extraordinary situations.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"214 0 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116444854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel storage covert channel on wearable devices using status bar notifications 在可穿戴设备上使用状态栏通知的新型存储隐蔽通道
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444898
K. Denney, A. S. Uluagac, K. Akkaya, S. Bhansali
{"title":"A novel storage covert channel on wearable devices using status bar notifications","authors":"K. Denney, A. S. Uluagac, K. Akkaya, S. Bhansali","doi":"10.1109/CCNC.2016.7444898","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444898","url":null,"abstract":"Covert channels have been used as a means to circumvent security measures and send sensitive data undetectable to an onlooker. Many covert channels in Android systems have been documented utilizing various system resources or settings available to the entire system. Nonetheless, this paper introduces a new storage covert channel on the emerging field of wearables that sends data to other applications, or even to other nearby devices, through the use of notifications that are normally displayed on the status bar of an Android device. In this paper, we present the design of our ongoing work for this covert channel using Android-based wearable devices. Furthermore, we evaluate the performance of this covert channel using real equipment. Our evaluation demonstrates the functionality and feasibility of the proposed covert channel.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Power scheduling in privacy enhanced microgrid networks with renewables and storage 可再生能源和存储增强微电网隐私的电力调度
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444814
Arif Önder Isikman, Cankal Altun, S. Uludag, B. Tavlı
{"title":"Power scheduling in privacy enhanced microgrid networks with renewables and storage","authors":"Arif Önder Isikman, Cankal Altun, S. Uludag, B. Tavlı","doi":"10.1109/CCNC.2016.7444814","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444814","url":null,"abstract":"As many countries embark on a major transitioning to the Smart Grid (SG), realizing the benefits of the new paradigm depends on generation, collection, and usage of unprecedented amount of data. With such proliferated data processing, there are legitimate concerns that call for sound privacy measures to ensure proper safekeeping. A significant portion of the potential benefits of the SG initiative, thus, relies on devising convincing mechanisms to strengthen the privacy. As a new distribution subsystem, microgrids are expected to play a crucial role in the SG. In this paper, we develop a privacy-aware microgrid power scheduling formulation with renewable sources and energy storage where five different classes of appliances are prioritized by smart meters. Our analysis shows that there is a tradeoff between maximizing the power usage and privacy levels. Hence, it is not possible to find a solution that maximizes both objectives simultaneously. However, it is possible to achieve significantly higher levels of privacy preservation with moderate sacrifice from the power usage, especially when the number of users is high.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Product rating prediction using trust relationships in social networks 基于社交网络信任关系的产品评级预测
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444742
A. Davoudi, M. Chatterjee
{"title":"Product rating prediction using trust relationships in social networks","authors":"A. Davoudi, M. Chatterjee","doi":"10.1109/CCNC.2016.7444742","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444742","url":null,"abstract":"Traditional recommender systems assume that all users are independent and identically distributed, and ignores the social interactions and connections between users. These issues hinder the recommender systems from providing more personalized recommendations to the users. In this paper, we propose a social trust model and use the probabilistic matrix factorization method to estimate users taste by incorporating user-item rating matrix. The effect of users friends tastes is modeled using a trust model which is defined based on importance (i.e., centrality) and similarity between users. Similarity is modeled using Vector Space Similarity (VSS) algorithm and centrality is quantified using two different centrality measures (degree and eigen-vector centrality). To validate the proposed method, rating estimation is performed on the Epinions dataset. Experiments show that our method provides better prediction when using trust relationship based on centrality and similarity values rather than using the binary values. The contributions of centrality and similarity in the trust values vary with different measures of centrality.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Coexistence of IEEE 802.11n and licensed-assisted access devices using listen-before-talk techniques IEEE 802.11n和使用先听后说技术的许可辅助接入设备共存
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444841
C. Casetti
{"title":"Coexistence of IEEE 802.11n and licensed-assisted access devices using listen-before-talk techniques","authors":"C. Casetti","doi":"10.1109/CCNC.2016.7444841","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444841","url":null,"abstract":"The proliferation of smartphones and related high-bandwidth services such as video streaming or cloud services are leading to increasing traffic demands, hence to the need of more efficient mobile networks. As current 4G networks are nearing their capacity, there is growing interest for the inclusion of new spectrum bands for LTE networks, among which unlicensed spectrum features prominently. Coexistence issues are all but certain, especially in the 5 GHz unlicensed band, where incumbent, ubiquitous WiFi devices are likely to be affected. Many coexistence solutions are currently being investigated, at both physical and MAC layer. In this work, we explore the impact of a MAC-layer solution that is supposed to allow graceful co-channel coexistence, finding that there are indeed some cases where, depending on the choice of parameters and configuration, the performance of WiFi traffic can be seriously degraded.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hierarchy-based monitoring of Vehicular Delay-Tolerant Networks 基于层次的车辆容忍延迟网络监控
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444821
E. Salvador, D. Macedo, J. Nogueira, Virgil Del Duca Almeida, L. Granville
{"title":"Hierarchy-based monitoring of Vehicular Delay-Tolerant Networks","authors":"E. Salvador, D. Macedo, J. Nogueira, Virgil Del Duca Almeida, L. Granville","doi":"10.1109/CCNC.2016.7444821","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444821","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) are mobile networks that extend over vast areas and have intense node mobility. These characteristics lead to frequent delays and disruptions. A solution is to employ the Delay Tolerant Network (DTN) paradigm. However, the frequent disruptions as well as the delay and reliability constraints of certain VANET applications hinder the employment of both conventional and DTN-based management architectures. This paper tackles monitoring, one of the tasks of network management. We describe a hierarchical architecture that copes with near real-time as well as non real-time monitoring tasks. The proposed solution is evaluated using simulations, where we measure the delay and delivery rates of the monitoring data. The results show that the proposed solution reduces the delivery delay and increases the chances that a notification will be delivered on time to its destination.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fair and Delay Adaptive Scheduler (FDAS) preliminary modeling and optimization 公平与延迟自适应调度(FDAS)的初步建模与优化
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444856
Abdelwahab M. Elnaka, Q. Mahmoud, Xining Li
{"title":"Fair and Delay Adaptive Scheduler (FDAS) preliminary modeling and optimization","authors":"Abdelwahab M. Elnaka, Q. Mahmoud, Xining Li","doi":"10.1109/CCNC.2016.7444856","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444856","url":null,"abstract":"Fair and Delay Adaptive Scheduler (FDAS) is a scheduling mechanism that dynamically adapts to the incoming traffic flows' requirements in term of bandwidth allocation, delay bounds and packet loss restrictions. It performs this utilizing both virtual finish time fluid scheduling along with schedulability and delay sensitive scheduling. The former ensures that the flows receive a fair share of the available output throughput while the later ensures that time critical flows that are about to expire will receive preferential treatment when needed to avoid getting garbled and dropped when possible. FDAS tries to maximize the satisfaction as perceived by incoming traffic flows through balancing between bandwidth fairness and delay bound accommodation. FDAS acts as a hybrid scheduler that tries to overcome fairness allocation problems due to preferential treatment for the soon-to-expire packets which happens in Earliest Deadline First (EDF) schedulers. Meanwhile, it tries to minimize the number of packets that violate their deadlines for transmission and get garbled accordingly that happens on Weighted Fair Queuing (WFQ) and its derivatives. In this paper, we try to answer the question of how many of the flows and how much of their traffic can be accommodated in terms of delay bound and throughput requirements given the incoming mixture of traffic with diverse QoS requirements. FDAS preliminary modeling and optimization is discussed in this paper to answer the above question in a manner that maximizes the overall performance satisfaction as perceived by incoming flows taking into consideration traffic priorities, if any.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128043982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing WebRTC-based team apps with a cross-platform mobile framework 使用跨平台移动框架开发基于webbrtc的团队应用程序
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2016-03-31 DOI: 10.1109/CCNC.2016.7444762
Kundan Singh, J. Buford
{"title":"Developing WebRTC-based team apps with a cross-platform mobile framework","authors":"Kundan Singh, J. Buford","doi":"10.1109/CCNC.2016.7444762","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444762","url":null,"abstract":"We present lessons learned in developing cross platform multi-party team applications. Our apps include a range of communication and collaboration scenarios: document and content sharing in a team space, an agent-based meeting helper, phone number dialer via a voice-over-IP (VoIP) gateway, and multi-party call in peer-to-peer or client-server mode. We use web real-time communication (WebRTC) to enable the audio and video media paths in the apps. We use frameworks such as Chrome Apps and Apache Cordova to create apps that can be accessed from a browser, or installed on a desktop, mobile device, or wearable. The challenges and techniques described in our paper related to audio, video, network, power conservation and security are important to other developers building cross-platform apps involving WebRTC, VoIP and cloud services.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信