{"title":"CombiHeader: Minimizing the number of shim headers in redundancy elimination systems","authors":"Sumanta Saha, Andrey Lukyanenko, Antti Yla-Jaaski","doi":"10.1109/INFCOMW.2011.5928920","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928920","url":null,"abstract":"Redundancy elimination has been used in many places to improve network performance. The algorithms for doing this typically split data into chunks, fingerprint them, and compare the fingerprint with cache to identify similar chunks. Then these chunks are removed from the data and headers are inserted instead of them. However, this approach presents us with two crucial shortcomings. Depending on the size of chunks, either many headers need to be inserted, or probability of missing similar regions is increased. Algorithms that try to overcome missed similarity detection by expanding chunk boundary suffers from excessive memory access due to byte-by-byte comparison. This situation leads us to propose a novel algorithm, CombiHeader, that allows near maximum similarity detection using smaller chunks sizes while using chunk aggregation technique to transmit very few headers with few memory accesses. CombiHeader uses a specialized directed graph to track and merge adjacent popular chunks. By generating different generations of CombiNodes, CombiHeader can detect different lengths of similarity region, and uses the smallest number of headers possible. Experiments show that CombiHeader uses less than 25% headers than general elimination algorithms, and this number improves with the number of hits. The required memory access to detect maximal similarity region is in the range of 1%-5% of comparable algorithms for certain situations. CombiHeader is implemented as a pluggable module, which can be used with any existing redundancy elimination algorithm.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Behnke, A. Born, J. Salzmann, D. Timmermann, R. Bill
{"title":"Combining scalability and resource awareness in Wireless Sensor Network localization","authors":"R. Behnke, A. Born, J. Salzmann, D. Timmermann, R. Bill","doi":"10.1109/INFCOMW.2011.5928871","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928871","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been shown to be most suitable for monitoring large and possibly inaccessible areas. To assign measured values to certain positions as well as for complex network algorithms, localization represents a required basic capability. By splitting a costly localization calculation into precalculation and postcalculation, Distributed Least Squares (DLS) has been introduced as an efficient approach of fine grained localization.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123638004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-critical event dissemination in geographically distributed clouds","authors":"Chi-Jen Wu, Jan-Ming Ho, Ming-Syan Chen","doi":"10.1109/INFCOMW.2011.5928894","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928894","url":null,"abstract":"Cloud computing has rapidly become a new infrastructure for organizations to reduce their capital cost in IT investment and to develop planetary-scale distributed applications. One of the fundamental challenges in geographically distributed clouds is to provide efficient algorithms for supporting intercloud data management and dissemination. In this paper, we present Plume, a generic distributed intercloud overlay for time-critical event dissemination services. Plume aims at improving the interoperability of interclouds in time-critical event dissemination services, such as computing policy updating, message sharing, event notifications and so forth. Plume organizes these distributed clouds into a novel quorum ring overlay to support a constant event dissemination latency. Our numerical results show that the proposed Plume greatly improves the efficiency as compared to a DHT-based overlay approach and provides better scalability than the fully-meshed approach.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimum Disclosure Routing for network virtualization","authors":"M. Fukushima, T. Hasegawa, T. Hasegawa, A. Nakao","doi":"10.1109/INFCOMW.2011.5928932","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928932","url":null,"abstract":"Although virtual collocation of Service Providers (SPs) on top of Infrastructure Providers (InPs) via network virtualization brings various benefits, we posit that operational confidentiality has not been considered in this network model. We extend and apply the Secure Multiparty Computation (SMC) protocol to solving Minimum Disclosure Routing (MDR), that is, enabling an SP to route packets without disclosing routing information to InPs. Our study reveals that MDR can be achieved securely with marginal latency overhead with regard to the convergence time in well-engineered routing algorithms. Our study sheds light on the path for network virtualization to be used to resolve the challenges for ISPs of today.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123934758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve physical layer security in cooperative wireless network using distributed auction games","authors":"Rongqing Zhang, Lingyang Song, Zhu Han, B. Jiao","doi":"10.1109/INFCOMW.2011.5928805","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928805","url":null,"abstract":"In this paper, we investigate a cooperative wireless network with jamming-based secure communications, where a friendly jammer can transmit jamming signals to interfere the malicious eavesdropper. We find that the secrecy rate of the source-destination link can be effectively improved with the help of the friendly jammer, and each source intends to obtain optimal jamming power from the friendly jammer to maximize its secrecy rate for data transmission. We then formulate this power allocation problem as an auction game and propose two distributively auction-based power allocation schemes, which are power allocation using Traditional Ascending Clock Auction (ACA-T) and power allocation using Alternative Ascending Clock Auction (ACA-A), considering the friendly jammer as the auctioneer and the sources as the bidders. In addition, we prove that both the proposed schemes can converge in a finite number of iterations. We also prove that the ACA-A scheme is cheat-proof while the ACA-T scheme is not. Finally, simulation results are presented to demonstrate the efficiency of the proposed auction-based schemes in improving secrecy rate of wireless networks.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingyu Feng, Yuqing Zhang, Shenglong Chen, Anmin Fu
{"title":"RepHi: A novel attack against P2P reputation systems","authors":"Jingyu Feng, Yuqing Zhang, Shenglong Chen, Anmin Fu","doi":"10.1109/INFCOMW.2011.5928789","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928789","url":null,"abstract":"Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain peers can be manipulated intentionally by adversaries. In this paper, we report the discovery of a novel attack, named RepHi (Reputation Hijack), against rating-based reputation systems, such as those used in P2P networks. In RepHi, attackers disguise as routers to hijack and modify ratings. This attack can cause multi-dimensional damage, that is, undermining reputation systems, manipulating reputation and hurting the credibility of raters. We conduct an investigation on RepHi, including basic ideas and case studies. Compared with other known attacks, the RepHi attackers require less efforts to achieve the similar goals.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design of network-based flow mobility based on proxy mobile IPv6","authors":"T. Trung, Youn-Hee Han, Hyon-Young Choi, H. Geun","doi":"10.1109/INFCOMW.2011.5928841","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928841","url":null,"abstract":"Supporting flow mobility is an emerging challenge in today mobile networks. This paper introduces a network-based solution to support flow mobility. It requires minimum modification at the mobile node. All signaling processes are performed by the network. The mobile node can seamlessly switch flow over multiple access technologies while maintaining ongoing connections.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
He Yan, Benjamin Say, Brendan Sheridan, Dave Oko, C. Papadopoulos, Dan Pei, D. Massey
{"title":"IP Reachability differences: Myths and realities","authors":"He Yan, Benjamin Say, Brendan Sheridan, Dave Oko, C. Papadopoulos, Dan Pei, D. Massey","doi":"10.1109/INFCOMW.2011.5928928","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928928","url":null,"abstract":"Ideally, an Internet Service Provider offers reachability to the entire Internet. However, it is often claimed (supported by anecdotal evidence) that reachability differences exist between ISPs, with the result that some valid, globally routable IP addresses can be reached from one ISP but not from others. Outdated Bogon filters, specialized services, and regional differences have all been conjectured as possible sources of reachability differences. However, to the best of knowledge, no systematic study has verified and quantified the extent of such differences, and no analysis exists to show which (if any) of the common conjectures are the dominant causes. In this paper we provide an initial systematic study of top-tier ISP reachability differences. We compare global BGP tables from 25 ISPs to 1) quantify the extent of reachability differences, and 2) determine which (if any) of the common conjectures explain these differences.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAIL: A scalable approach for wide-area IP mobility","authors":"Zhenkai Zhu, R. Wakikawa, Lixia Zhang","doi":"10.1109/INFCOMW.2011.5928840","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928840","url":null,"abstract":"The Internet is becoming increasingly mobile, with not only smartphones outnumbering stationary hosts, but also cars, buses, trains and airplanes all coming online. This makes Internet mobility support more important than ever. However the existing standard mobility support protocols, mainly Mobile IPv6 and Network Mobility (NEMO), suffer from triangle routing problem. In this paper we present a new mobility support protocol called SAIL that provides an effective and efficient solution to the triangle routing problem while being completely compatible with Mobile IP. SAIL is built upon the Global HAHA protocol which uses multiple distributed home agents to minimizes triangle routing, but removes its high overhead by one-hop DHT. We evaluate the SAIL design through extensive simulations and our results show that SAIL can provide superior performance over Mobile IP while keeping the overhead low.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124540916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speeding up pattern matching by optimal partial string extraction","authors":"Jianlong Tan, Xia Liu, Yanbing Liu, Ping Liu","doi":"10.1109/INFCOMW.2011.5928778","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928778","url":null,"abstract":"String matching plays a key role in web content monitoring systems. Suffix matching algorithms have good time efficiency, and thus are widely used. These algorithms require that all patterns in a set have the same length. When the patterns cannot satisfy this requirement, the leftmost characters, m being the length of the shortest pattern, are extracted to construct the data structure. We call such -character strings partial strings. However, a simple extraction from the left does not address the impact of partial string locations on search speed. We propose a novel method to extract the partial strings from each pattern which maximizes search speed. More specifically, with this method we can compute all the corresponding searching time cost by theoretical derivation, and choose the location which yields an approximately minimal search time. We evaluate our method on two rule sets: Snort and ClamAV. Experiments show that in most cases, our method achieves the fastest searching speed in all possible locations of partial string extraction, and is about 5%–20% faster than the alternative methods.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}