2014 23rd International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
Cost efficient survivable multicast virtual network design 低成本生存组播虚拟网络设计
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911751
D. Liao, Gang Sun, V. Anand, Kexiang Xiao, Mao Gan
{"title":"Cost efficient survivable multicast virtual network design","authors":"D. Liao, Gang Sun, V. Anand, Kexiang Xiao, Mao Gan","doi":"10.1109/ICCCN.2014.6911751","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911751","url":null,"abstract":"One of the challenge issues in network virtualization is the efficient mapping of a virtual network (VN) onto a shared substrate network. The VN mapping problem has been addressed by various researchers. However, these solutions and associated algorithms are only efficient for building unicast service oriented virtual networks, and are not applicable to multicast service oriented VNs. Furthermore, how to guarantee survivability while provisioning a virtual multicast service oriented network is an important issue that has not been addressed. In this work, we investigate the survivable multicast service oriented virtual network provisioning(SMVNP) problem and propose an efficient algorithm with resource sharing for solving this problem. We validate and evaluate our framework and algorithms by conducting simulations on realistic substrate network and by comparing with existing approach. Our simulation results show that our approach outperforms existing solution.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A security protocol for wireless sensor networks designed for monitoring smart grid transmission lines 一种用于监测智能电网传输线的无线传感器网络安全协议
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911789
Sucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Y. Qian
{"title":"A security protocol for wireless sensor networks designed for monitoring smart grid transmission lines","authors":"Sucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Y. Qian","doi":"10.1109/ICCCN.2014.6911789","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911789","url":null,"abstract":"In this paper, we introduce a security protocol for wireless sensor network which is designed for monitoring long range power transmission lines in smart grid. The proposed security protocol provides authentications to the sensor nodes and the information data, and the encryption for uplink and downlink information of the power line monitoring sensor network. Different from the existing protocol, our proposed one has an auto-correction process to keep the network operating even with malfunctioning nodes. We also conduct energy consumption analysis and select more energy efficient authentication and encryption methods. In addition, the results of energy consumption analysis help to determine the transmitting power for each node so that the sensor network can meet the delay requirement at the same time.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Auto bit rate adaptation with transmission failure diagnosis for WLANs 无线局域网的自适应比特率与传输故障诊断
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911823
Shaoen Wu, S. Biaz
{"title":"Auto bit rate adaptation with transmission failure diagnosis for WLANs","authors":"Shaoen Wu, S. Biaz","doi":"10.1109/ICCCN.2014.6911823","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911823","url":null,"abstract":"This paper proposes a bit rate adaptation scheme based on frame transmission statistics. The bit adaptation scheme judiciously exploits the fragmentation mechanism in the IEEE 802.11 to accurately diagnose the cause of a frame transmission failure and accordingly adjusts the frame delivery statistics. We analytically prove that the fragmentation mechanism incurs less overhead and is more effective than the use of RTS/CTS for rate adaptation in a collisions dominated environments. We implemented and evaluated this scheme and four other recent and representative rate adaptations schemes on a Linux based testbed. We also discuss some anomalies plaguing these rate adaptation schemes observed while implementing them. With extensive experiments, we observe that these rate adaptation schemes have strengths and weaknesses under different scenarios, although our scheme performs very well in most of cases.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feedback-based smartphone strategic sampling for BYOD security 基于反馈的智能手机BYOD安全策略抽样
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911814
Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng
{"title":"Feedback-based smartphone strategic sampling for BYOD security","authors":"Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng","doi":"10.1109/ICCCN.2014.6911814","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911814","url":null,"abstract":"Bring Your Own Device (BYOD) is an information technology (IT) policy that allows employees to use their own wireless devices to access internal network at work. Mobile malware is a major security concern that impedes BYOD's further adoption in enterprises. Existing works identify the need for better BYOD security mechanisms that balance between the strength of such mechanisms and the costs of implementing such mechanisms. In this paper, based on the idea of self-reinforced feedback loop, we propose a periodic smartphone sampling mechanism that significantly improve BYOD security mechanism's effectiveness without incurring further costs. We quantify the likelihood that “a BYOD smartphone is infected by malware” by two metrics, vulnerability and uncertainty, and base the iterative sampling process on these two metrics; the updated values of these metrics are fed back into future rounds of the mechanism to complete the feedback loop. We validate the efficiency and effectiveness of the proposed strategic sampling via simulations driven by publicly available, real-world collected traces.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism for multipath TCP in lossy networks 有损网络中基于细粒度正向预测的多路径TCP动态包调度机制
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911726
Dan Ni, Kaiping Xue, P. Hong, Sean Shen
{"title":"Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism for multipath TCP in lossy networks","authors":"Dan Ni, Kaiping Xue, P. Hong, Sean Shen","doi":"10.1109/ICCCN.2014.6911726","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911726","url":null,"abstract":"Nowadays, multi-interface terminals in heterogeneous network may access Internet through various access technologies, and further aggregate network resources from multiple paths as much as possible. Multipath TCP exploits multiple paths simultaneously by stripping data of a connection over multiple TCP flows, each of which is through a disjoint path. However, it encounters the problem caused by the great number of out-of-order packets at receiver due to dissimilar path characteristics, i.e. latency, bandwidth, packet loss rate, etc. The previous intelligent scheduling mechanisms to keep in-order delivery all ignored packet losses and became fragile in lossy networks. In this paper, we present Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism(F2P-DPS) for multipath TCP. It utilizes the idea of TCP modeling to estimate the latency on the path under scheduling and the data amount sent on the other paths simultaneously, which takes packet loss rate into consideration, and then decides which packets to send on the under-scheduling path. From the simulation, we can see that our mechanism obviously improves throughput and reduces cache occupancy at receiver in lossy networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131860406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
On simulation studies of cyber attacks against LTE networks 针对LTE网络的网络攻击仿真研究
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911737
Sulabh Bhattarai, S. Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu
{"title":"On simulation studies of cyber attacks against LTE networks","authors":"Sulabh Bhattarai, S. Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu","doi":"10.1109/ICCCN.2014.6911737","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911737","url":null,"abstract":"Because of ever-increasing performance and capacity gains, the popularity of LTE as a 4G technology has skyrocketed. Unfortunately, cyber adversaries may launch attacks against the LTE network. In this paper, we develop a theoretical framework to systematically explore the attack space which consists of three dimensions: communication services attacked, planes of attack, and network components under attack. Based on the developed framework, we carried out extensive simulations to evaluate the impact of some representative attacks on LTE network performance. Our developed framework and simulation models enables a foundation for advancing the understanding of threats on the LTE network and assists in developing counter-measures to secure LTE networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Energy-efficient routing in IPv6 home networks IPv6家庭网络中的节能路由
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911769
Arnaud Kaiser, M. Boc
{"title":"Energy-efficient routing in IPv6 home networks","authors":"Arnaud Kaiser, M. Boc","doi":"10.1109/ICCCN.2014.6911769","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911769","url":null,"abstract":"The multiplication of local access technologies and the increasing number of connected devices exhort today's home networks to be more energy-efficient. In the literature, such kind of challenge is usually handled from the standpoint of devices remaining battery, making resulting approaches specific to resources constrained networks (e.g. wireless sensor networks, ad-hoc networks, etc.). This paper considers the exploitation of devices, either routers and/or hosts, links diversity (Ethernet, Wi-Fi, PLC, etc.) as an already pertinent mean to provide energy awareness in home network operations. In this paper, we focus on the design of an IPv6 energy-efficient routing protocol for such complex home networks. Our solution first enhances the OSPF core network routing protocol with a relevant energy metric that reflects the energy consumption of home network links technologies. We further expand the Neighbor Discovery protocol with an interface selection mechanism through two new options ELCO (Energy Link Cost Option) and EPCO (Energy Path Cost Option). This mechanism enables the selection of the most energy-efficient end-to-end path. Our approach is evaluated and compared with conventional routing protocols through real experimentations. The results show that significant energy savings can be reached when using our routing protocol.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient outdoor localization method for smartphones 一种高效的智能手机户外定位方法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911788
Anhua Lin, Jianzhong Zhang, Kai Lu, Wen Zhang
{"title":"An efficient outdoor localization method for smartphones","authors":"Anhua Lin, Jianzhong Zhang, Kai Lu, Wen Zhang","doi":"10.1109/ICCCN.2014.6911788","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911788","url":null,"abstract":"Location has become a key service for smartphone applications. With the help of inertial navigation unit integrated into smartphones, such as accelerometer and compass, we can provide reliable and accurate localization service, which overcomes huge energy consumption of GPS and rough location accuracy of systems based on GSM or Wi-Fi. In this paper, we present a reliable and energy-efficient localization system using inertial sensors commonly found on today's smartphone. Reliable algorithms for displacement determination and heading direction have been developed. Then Vincenty's formulae are employed to calculate the latitude and longitude of the endpoint. In order to prevent accumulated error, location correction mechanism based on local map information and A-GPS is introduced. Measurements on Samsung I9100 and evaluation in the real condition confirm anticipated benefits. Results show that ACMG uses 24.7% less power consumption than GPS, and get a mean location accuracy of less than 6.7m in our test.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117228998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A transport protocol for content-centric networking with explicit congestion control 用于具有显式拥塞控制的以内容为中心的网络的传输协议
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911765
Feixiong Zhang, Yanyong Zhang, A. Reznik, Hang Liu, Chen Qian, Chenren Xu
{"title":"A transport protocol for content-centric networking with explicit congestion control","authors":"Feixiong Zhang, Yanyong Zhang, A. Reznik, Hang Liu, Chen Qian, Chenren Xu","doi":"10.1109/ICCCN.2014.6911765","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911765","url":null,"abstract":"Content-centric networking (CCN) adopts a receiver-driven, hop-by-hop transport approach that facilitates in-network caching, which in turn leads to multiple sources and multiple paths for transferring content. In such a case, keeping a single round trip time (RTT) estimator for a multi-path flow is insufficient as each path may experience different round trip times. To solve this problem, it has been proposed to use multiple RTT estimators to predict network condition. In this paper, we examine an alternative approach to this problem, CHoPCoP, which utilizes explicit congestion control to cope with the multiple-source, multiple-path situation. Protocol design innovations of CHoPCoP include a random early marking (REM) scheme that explicitly signals network congestion, and a per-hop fair share Interest shaping algorithm (FISP) and a receiver Interest control method (RIC) that regulate the Interest rates at routers and the receiver respectively. We have implemented CHoPCoP on the ORBIT testbed and conducted experiments under various network and traffic settings. The evaluation shows that CHoPCoP is a viable approach that can effectively deal with congestion in the multipath environment.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Leveraging tenant flexibility in resource allocation for virtual networks 利用租户在虚拟网络资源分配中的灵活性
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911766
S. Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu
{"title":"Leveraging tenant flexibility in resource allocation for virtual networks","authors":"S. Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu","doi":"10.1109/ICCCN.2014.6911766","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911766","url":null,"abstract":"Virtual networks that allow tenants to explicitly specify their computing as well as networking resources are recently proposed to be better interfaces between cloud providers and tenants. Many virtual networks have time-varying resource demands, as evidenced in prior studies [1-3]. New opportunities emerge when such variation is exploited. In this paper, we design a novel resource demand model for tenants to flexibly trade off between application performance and cost, and propose a work-conserving allocation algorithm, WCA, for deploying virtual networks with time-varying resource demands. WCA places virtual nodes in a first-fit fashion, and places virtual links through path-splitting. In each physical node or link, by opportunistically sharing physical resources among multiple variable parts of resource demands, physical utilization can be improved, and more virtual networks can be deployed concurrently. Our evaluation results show that WCA achieves a 4% higher physical resource utilization and rejects 18% less virtual network requests than a state-of-the-art algorithm [4].","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信