Comput. Commun. Rev.最新文献

筛选
英文 中文
LoRadar: LoRa sensor network monitoring through passive packet sniffing LoRadar:通过被动嗅包方式监控LoRa传感器网络
Comput. Commun. Rev. Pub Date : 2020-10-26 DOI: 10.1145/3431832.3431835
Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana, Thilakarathna, Suranga Seneviratne, Ralph Holz, Mahbub Hassan, Albert Y. Zomaya
{"title":"LoRadar: LoRa sensor network monitoring through passive packet sniffing","authors":"Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana, Thilakarathna, Suranga Seneviratne, Ralph Holz, Mahbub Hassan, Albert Y. Zomaya","doi":"10.1145/3431832.3431835","DOIUrl":"https://doi.org/10.1145/3431832.3431835","url":null,"abstract":"IoT deployments targeting different application domains are being unfolded at various administrative levels such as countries, states, corporations, or even individual households. Facilitating data transfers between deployed sensors and back-end cloud services is an important aspect of IoT deployments. These data transfers are usually done using Low Power WAN technologies (LPWANs) that have low power consumption and support longer transmission ranges. LoRa (Long Range) is one such technology that has recently gained significant popularity due to its ease of deployment. In this paper, we present LoRadar , a passive packet sniffing framework for LoRa’s Medium Access Control (MAC) protocol, LoRaWAN. LoRadar is built using commodity hardware. By carrying out passive measurements at a given location, LoRadar provides key insights of LoRa deployments such as available LoRa networks, deployed sensors, their make, and transmission patterns. Since LoRa deployments are becoming more pervasive, these information are pivotal in characterizing network performance, comparing different LoRa operators, and in emergencies or tactical operations to quickly assess available sensing infrastructure at a given geographical location. We validate the performance of LoRadar in both laboratory and real network settings and conduct a measurement study at eight key locations distributed over a large city-wide geographical area to provide an in-depth analysis of the landscape of commercial IoT deployments. Furthermore, we show the usage of LoRadar in improving the network such as potential collision and jamming detection, device localization, as well as spectrum policing to identify devices that violate the daily duty-cycle quota. Our results show that most of the devices transmitting over the SF12 data rate at one of the survey location were violating the network provider’s quota.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards passive analysis of anycast in global routing: unintended impact of remote peering 对全局路由中任意播送的被动分析:远程对等的意外影响
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371927.3371930
Rui-Ling Bian, Shuai Hao, Haining Wang, Amogh Dhamdere, A. Dainotti, Chase Cotton
{"title":"Towards passive analysis of anycast in global routing: unintended impact of remote peering","authors":"Rui-Ling Bian, Shuai Hao, Haining Wang, Amogh Dhamdere, A. Dainotti, Chase Cotton","doi":"10.1145/3371927.3371930","DOIUrl":"https://doi.org/10.1145/3371927.3371930","url":null,"abstract":"Anycast has been widely adopted by today's Internet services, including DNS, CDN, and DDoS protection, in which the same IP address is announced from distributed locations and clients are directed to the topologically-nearest service replica. Prior research has focused on various aspects of anycast, either its usage in particular services such as DNS or characterizing its adoption by Internet-wide active probing methods. In this paper, we first explore an alternative approach to characterize anycast based on previously collected global BGP routing information. Leveraging state-of-the-art active measurement results as near-ground-truth, our passive method without requiring any Internet-wide probes can achieve 90% accuracy in detecting anycast prefixes. More importantly, our approach uncovers anycast prefixes that have been missed by prior datasets based on active measurements. While investigating the root causes of inaccuracy, we reveal that anycast routing has been entangled with the increased adoption of remote peering, a type of layer-2 interconnection where an IP network may peer at an IXP remotely without being physically present at the IXP. The invisibility of remote peering from layer-3 breaks the assumption of the shortest AS paths on BGP and causes an unintended impact on anycast performance. We identify such cases from BGP routing information and observe that at least 19.2% of anycast prefixes have been potentially impacted by remote peering.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126633266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Lessons from "a first-principles approach to understanding the internet's router-level topology" 来自“理解互联网路由器级拓扑的第一原则方法”的经验教训
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371964
D. Alderson, J. Doyle, W. Willinger
{"title":"Lessons from \"a first-principles approach to understanding the internet's router-level topology\"","authors":"D. Alderson, J. Doyle, W. Willinger","doi":"10.1145/3371934.3371964","DOIUrl":"https://doi.org/10.1145/3371934.3371964","url":null,"abstract":"Our main purpose for this editorial is to reiterate the main message that we tried to convey in our SIGCOMM'04 paper but that got largely lost in all the hype surrounding the use of scale-free network models throughout the sciences in the last two decades. That message was that because of (1) the Internet's highly-engineered architecture, (2) a thorough understanding of its component technologies, and (3) the availability of extensive (but typically noisy) measurements, this complex man-made system affords unique opportunities to unambiguously resolve most claims about its properties, structure, and functionality. In the process, we point out the fallacy of popular approaches that consider complex systems such as the Internet from the perspective of disorganized complexity and argue for renewed efforts and increased focus on advancing an \"architecture first\" view with its emphasis on studying the organized complexity of systems such as the Internet.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Privacy trading in the surveillance capitalism age viewpoints on 'privacy-preserving' societal value creation 监控资本主义时代的隐私交易——对“保护隐私”社会价值创造的看法
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371927.3371931
R. Pal, J. Crowcroft
{"title":"Privacy trading in the surveillance capitalism age viewpoints on 'privacy-preserving' societal value creation","authors":"R. Pal, J. Crowcroft","doi":"10.1145/3371927.3371931","DOIUrl":"https://doi.org/10.1145/3371927.3371931","url":null,"abstract":"In the modern era of the mobile apps (part of the era of surveillance capitalism, a famously coined term by Shoshana Zuboff), huge quantities of data about individuals and their activities offer a wave of opportunities for economic and societal value creation. However, the current personal data ecosystem is mostly de-regulated, fragmented, and inefficient. On one hand, end-users are often not able to control access (either technologically, by policy, or psychologically) to their personal data which results in issues related to privacy, personal data ownership, transparency, and value distribution. On the other hand, this puts the burden of managing and protecting user data on profit-driven apps and ad-driven entities (e.g., an ad-network) at a cost of trust and regulatory accountability. Data holders (e.g., apps) may hence take commercial advantage of the individuals' inability to fully anticipate the potential uses of their private information, with detrimental effects for social welfare. As steps to improve social welfare, we comment on the the existence and design of efficient consumer-data releasing ecosystems aimed at achieving a maximum social welfare state amongst competing data holders. In view of (a) the behavioral assumption that humans are 'compromising' beings, (b) privacy not being a well-boundaried good, and (c) the practical inevitability of inappropriate data leakage by data holders upstream in the supply-chain, we showcase the idea of a regulated and radical privacy trading mechanism that preserves the heterogeneous privacy preservation constraints (at an aggregate consumer, i.e., app, level) upto certain compromise levels, and at the same time satisfying commercial requirements of agencies (e.g., advertising organizations) that collect and trade client data for the purpose of behavioral advertising. More specifically, our idea merges supply function economics, introduced by Klemperer and Meyer, with differential privacy, that, together with their powerful theoretical properties, leads to a stable and efficient, i.e., a maximum social welfare, state, and that too in an algorithmically scalable manner. As part of future research, we also discuss interesting additional techno-economic challenges related to realizing effective privacy trading ecosystems.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reflections on a clean slate 4D approach to network control and management 对网络控制与管理的全新4D方法的思考
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371962
A. Greenberg, D. Maltz, J. Rexford, G. Xie, Jibin Zhan, Hui Zhang
{"title":"Reflections on a clean slate 4D approach to network control and management","authors":"A. Greenberg, D. Maltz, J. Rexford, G. Xie, Jibin Zhan, Hui Zhang","doi":"10.1145/3371934.3371962","DOIUrl":"https://doi.org/10.1145/3371934.3371962","url":null,"abstract":"It's been 15 years since what we now call Software Defined Network began emerging out of a set of ideas in the networking research community. This editorial note traces how the ideas in one particular paper from that time have evolved and found practical applications.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reflections on being SIGCOMM chair 2013--2017 2013- 2017年SIGCOMM主席的思考
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371942
S. Keshav
{"title":"Reflections on being SIGCOMM chair 2013--2017","authors":"S. Keshav","doi":"10.1145/3371934.3371942","DOIUrl":"https://doi.org/10.1145/3371934.3371942","url":null,"abstract":"This article discusses my personal view of being Chair of SIGCOMM from 2013 to 2017.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspective: eliminating channel feedback in next generation cellular networks 观点:消除下一代蜂窝网络中的信道反馈
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371967
Deepak Vasisht, Swarun Kumar, Hariharan Rahul, D. Katabi
{"title":"Perspective: eliminating channel feedback in next generation cellular networks","authors":"Deepak Vasisht, Swarun Kumar, Hariharan Rahul, D. Katabi","doi":"10.1145/3371934.3371967","DOIUrl":"https://doi.org/10.1145/3371934.3371967","url":null,"abstract":"The ever-increasing demand for data has forced cellular networks towards advanced multi-antenna (MIMO) techniques. However, advanced MIMO solutions such as massive MIMO, coordinated multi-point, distributed MIMO, and multi-user MIMO, all require the base station to know the downlink channels to the client. In the absence of this information, the base station cannot beamform its signal to its users. Therefore, base stations require user devices to perform the measurements and send the channels back to the basestation as feedback. This feedback generates significant overhead that scales linearly with the number of antennas, and is a bottleneck for next generation of cellular networks with large antenna deployments.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XORs in the past and future 过去和未来的xor
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371959
M. Médard, S. Katti, D. Katabi, Wenjun Hu, Hariharan Rahul, J. Crowcroft
{"title":"XORs in the past and future","authors":"M. Médard, S. Katti, D. Katabi, Wenjun Hu, Hariharan Rahul, J. Crowcroft","doi":"10.1145/3371934.3371959","DOIUrl":"https://doi.org/10.1145/3371934.3371959","url":null,"abstract":"While placing the paper \"XORs in the Air\" in the context of the theoretical and practical understanding of network coding, we present a view of the progress of the field of network coding, In particular, we examine the interplay of theory and practice in the field.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116197104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The skillful interrogation of the internet 互联网上娴熟的审讯
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371940
M. Crovella
{"title":"The skillful interrogation of the internet","authors":"M. Crovella","doi":"10.1145/3371934.3371940","DOIUrl":"https://doi.org/10.1145/3371934.3371940","url":null,"abstract":"As SIGCOMM turns 50, it's interesting to ask how networking research has evolved over time. This is a set of personal observations about the \"mindset\" associated with Internet research.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"62 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Retrospective on "fragmentation considered harmful" 回顾“被认为有害的碎片化”
Comput. Commun. Rev. Pub Date : 2019-11-08 DOI: 10.1145/3371934.3371950
J. Mogul, Christopher A. Kantarjiev
{"title":"Retrospective on \"fragmentation considered harmful\"","authors":"J. Mogul, Christopher A. Kantarjiev","doi":"10.1145/3371934.3371950","DOIUrl":"https://doi.org/10.1145/3371934.3371950","url":null,"abstract":"We look back at our 1987 paper, \"Fragmentation Considered Harmful,\" to explain why we wrote it, how the prevalence of fragmentation was reduced by approaches such as Path MTU Discovery, and how fragmentation-related issues still lurk in today's Internet. Our paper listed several reasons why we thought fragmentation was harmful; some were more true in 1987 than they are today, and after our paper was published, the community realized that fragmentation (and the mechanisms used to mitigate it) exposed harms we did not anticipate in our paper.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123677411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信