D. Liao, Gang Sun, V. Anand, Kexiang Xiao, Mao Gan
{"title":"Cost efficient survivable multicast virtual network design","authors":"D. Liao, Gang Sun, V. Anand, Kexiang Xiao, Mao Gan","doi":"10.1109/ICCCN.2014.6911751","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911751","url":null,"abstract":"One of the challenge issues in network virtualization is the efficient mapping of a virtual network (VN) onto a shared substrate network. The VN mapping problem has been addressed by various researchers. However, these solutions and associated algorithms are only efficient for building unicast service oriented virtual networks, and are not applicable to multicast service oriented VNs. Furthermore, how to guarantee survivability while provisioning a virtual multicast service oriented network is an important issue that has not been addressed. In this work, we investigate the survivable multicast service oriented virtual network provisioning(SMVNP) problem and propose an efficient algorithm with resource sharing for solving this problem. We validate and evaluate our framework and algorithms by conducting simulations on realistic substrate network and by comparing with existing approach. Our simulation results show that our approach outperforms existing solution.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Y. Qian
{"title":"A security protocol for wireless sensor networks designed for monitoring smart grid transmission lines","authors":"Sucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Y. Qian","doi":"10.1109/ICCCN.2014.6911789","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911789","url":null,"abstract":"In this paper, we introduce a security protocol for wireless sensor network which is designed for monitoring long range power transmission lines in smart grid. The proposed security protocol provides authentications to the sensor nodes and the information data, and the encryption for uplink and downlink information of the power line monitoring sensor network. Different from the existing protocol, our proposed one has an auto-correction process to keep the network operating even with malfunctioning nodes. We also conduct energy consumption analysis and select more energy efficient authentication and encryption methods. In addition, the results of energy consumption analysis help to determine the transmitting power for each node so that the sensor network can meet the delay requirement at the same time.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Auto bit rate adaptation with transmission failure diagnosis for WLANs","authors":"Shaoen Wu, S. Biaz","doi":"10.1109/ICCCN.2014.6911823","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911823","url":null,"abstract":"This paper proposes a bit rate adaptation scheme based on frame transmission statistics. The bit adaptation scheme judiciously exploits the fragmentation mechanism in the IEEE 802.11 to accurately diagnose the cause of a frame transmission failure and accordingly adjusts the frame delivery statistics. We analytically prove that the fragmentation mechanism incurs less overhead and is more effective than the use of RTS/CTS for rate adaptation in a collisions dominated environments. We implemented and evaluated this scheme and four other recent and representative rate adaptations schemes on a Linux based testbed. We also discuss some anomalies plaguing these rate adaptation schemes observed while implementing them. With extensive experiments, we observe that these rate adaptation schemes have strengths and weaknesses under different scenarios, although our scheme performs very well in most of cases.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feedback-based smartphone strategic sampling for BYOD security","authors":"Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng","doi":"10.1109/ICCCN.2014.6911814","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911814","url":null,"abstract":"Bring Your Own Device (BYOD) is an information technology (IT) policy that allows employees to use their own wireless devices to access internal network at work. Mobile malware is a major security concern that impedes BYOD's further adoption in enterprises. Existing works identify the need for better BYOD security mechanisms that balance between the strength of such mechanisms and the costs of implementing such mechanisms. In this paper, based on the idea of self-reinforced feedback loop, we propose a periodic smartphone sampling mechanism that significantly improve BYOD security mechanism's effectiveness without incurring further costs. We quantify the likelihood that “a BYOD smartphone is infected by malware” by two metrics, vulnerability and uncertainty, and base the iterative sampling process on these two metrics; the updated values of these metrics are fed back into future rounds of the mechanism to complete the feedback loop. We validate the efficiency and effectiveness of the proposed strategic sampling via simulations driven by publicly available, real-world collected traces.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism for multipath TCP in lossy networks","authors":"Dan Ni, Kaiping Xue, P. Hong, Sean Shen","doi":"10.1109/ICCCN.2014.6911726","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911726","url":null,"abstract":"Nowadays, multi-interface terminals in heterogeneous network may access Internet through various access technologies, and further aggregate network resources from multiple paths as much as possible. Multipath TCP exploits multiple paths simultaneously by stripping data of a connection over multiple TCP flows, each of which is through a disjoint path. However, it encounters the problem caused by the great number of out-of-order packets at receiver due to dissimilar path characteristics, i.e. latency, bandwidth, packet loss rate, etc. The previous intelligent scheduling mechanisms to keep in-order delivery all ignored packet losses and became fragile in lossy networks. In this paper, we present Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism(F2P-DPS) for multipath TCP. It utilizes the idea of TCP modeling to estimate the latency on the path under scheduling and the data amount sent on the other paths simultaneously, which takes packet loss rate into consideration, and then decides which packets to send on the under-scheduling path. From the simulation, we can see that our mechanism obviously improves throughput and reduces cache occupancy at receiver in lossy networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131860406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sulabh Bhattarai, S. Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu
{"title":"On simulation studies of cyber attacks against LTE networks","authors":"Sulabh Bhattarai, S. Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu","doi":"10.1109/ICCCN.2014.6911737","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911737","url":null,"abstract":"Because of ever-increasing performance and capacity gains, the popularity of LTE as a 4G technology has skyrocketed. Unfortunately, cyber adversaries may launch attacks against the LTE network. In this paper, we develop a theoretical framework to systematically explore the attack space which consists of three dimensions: communication services attacked, planes of attack, and network components under attack. Based on the developed framework, we carried out extensive simulations to evaluate the impact of some representative attacks on LTE network performance. Our developed framework and simulation models enables a foundation for advancing the understanding of threats on the LTE network and assists in developing counter-measures to secure LTE networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient routing in IPv6 home networks","authors":"Arnaud Kaiser, M. Boc","doi":"10.1109/ICCCN.2014.6911769","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911769","url":null,"abstract":"The multiplication of local access technologies and the increasing number of connected devices exhort today's home networks to be more energy-efficient. In the literature, such kind of challenge is usually handled from the standpoint of devices remaining battery, making resulting approaches specific to resources constrained networks (e.g. wireless sensor networks, ad-hoc networks, etc.). This paper considers the exploitation of devices, either routers and/or hosts, links diversity (Ethernet, Wi-Fi, PLC, etc.) as an already pertinent mean to provide energy awareness in home network operations. In this paper, we focus on the design of an IPv6 energy-efficient routing protocol for such complex home networks. Our solution first enhances the OSPF core network routing protocol with a relevant energy metric that reflects the energy consumption of home network links technologies. We further expand the Neighbor Discovery protocol with an interface selection mechanism through two new options ELCO (Energy Link Cost Option) and EPCO (Energy Path Cost Option). This mechanism enables the selection of the most energy-efficient end-to-end path. Our approach is evaluated and compared with conventional routing protocols through real experimentations. The results show that significant energy savings can be reached when using our routing protocol.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient outdoor localization method for smartphones","authors":"Anhua Lin, Jianzhong Zhang, Kai Lu, Wen Zhang","doi":"10.1109/ICCCN.2014.6911788","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911788","url":null,"abstract":"Location has become a key service for smartphone applications. With the help of inertial navigation unit integrated into smartphones, such as accelerometer and compass, we can provide reliable and accurate localization service, which overcomes huge energy consumption of GPS and rough location accuracy of systems based on GSM or Wi-Fi. In this paper, we present a reliable and energy-efficient localization system using inertial sensors commonly found on today's smartphone. Reliable algorithms for displacement determination and heading direction have been developed. Then Vincenty's formulae are employed to calculate the latitude and longitude of the endpoint. In order to prevent accumulated error, location correction mechanism based on local map information and A-GPS is introduced. Measurements on Samsung I9100 and evaluation in the real condition confirm anticipated benefits. Results show that ACMG uses 24.7% less power consumption than GPS, and get a mean location accuracy of less than 6.7m in our test.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117228998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feixiong Zhang, Yanyong Zhang, A. Reznik, Hang Liu, Chen Qian, Chenren Xu
{"title":"A transport protocol for content-centric networking with explicit congestion control","authors":"Feixiong Zhang, Yanyong Zhang, A. Reznik, Hang Liu, Chen Qian, Chenren Xu","doi":"10.1109/ICCCN.2014.6911765","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911765","url":null,"abstract":"Content-centric networking (CCN) adopts a receiver-driven, hop-by-hop transport approach that facilitates in-network caching, which in turn leads to multiple sources and multiple paths for transferring content. In such a case, keeping a single round trip time (RTT) estimator for a multi-path flow is insufficient as each path may experience different round trip times. To solve this problem, it has been proposed to use multiple RTT estimators to predict network condition. In this paper, we examine an alternative approach to this problem, CHoPCoP, which utilizes explicit congestion control to cope with the multiple-source, multiple-path situation. Protocol design innovations of CHoPCoP include a random early marking (REM) scheme that explicitly signals network congestion, and a per-hop fair share Interest shaping algorithm (FISP) and a receiver Interest control method (RIC) that regulate the Interest rates at routers and the receiver respectively. We have implemented CHoPCoP on the ORBIT testbed and conducted experiments under various network and traffic settings. The evaluation shows that CHoPCoP is a viable approach that can effectively deal with congestion in the multipath environment.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging tenant flexibility in resource allocation for virtual networks","authors":"S. Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu","doi":"10.1109/ICCCN.2014.6911766","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911766","url":null,"abstract":"Virtual networks that allow tenants to explicitly specify their computing as well as networking resources are recently proposed to be better interfaces between cloud providers and tenants. Many virtual networks have time-varying resource demands, as evidenced in prior studies [1-3]. New opportunities emerge when such variation is exploited. In this paper, we design a novel resource demand model for tenants to flexibly trade off between application performance and cost, and propose a work-conserving allocation algorithm, WCA, for deploying virtual networks with time-varying resource demands. WCA places virtual nodes in a first-fit fashion, and places virtual links through path-splitting. In each physical node or link, by opportunistically sharing physical resources among multiple variable parts of resource demands, physical utilization can be improved, and more virtual networks can be deployed concurrently. Our evaluation results show that WCA achieves a 4% higher physical resource utilization and rejects 18% less virtual network requests than a state-of-the-art algorithm [4].","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}