2014 23rd International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
A privacy protection policy combined with privacy homomorphism in the Internet of Things 物联网中结合隐私同态的隐私保护策略
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911856
Guozi Sun, Siqi Huang, W. Bao, Yitao Yang, Zhiwei Wang
{"title":"A privacy protection policy combined with privacy homomorphism in the Internet of Things","authors":"Guozi Sun, Siqi Huang, W. Bao, Yitao Yang, Zhiwei Wang","doi":"10.1109/ICCCN.2014.6911856","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911856","url":null,"abstract":"Recently, IOT (Internet of Things) develops very rapidly. However, the personal privacy protection is one of directly important factors that impact the large-scale applications of IOT. To solve this problem, this paper proposes a privacy protection policy based on privacy homomorphism. It can protect the security of personal information well by processing the needs of users without acquiring of plaintext. In another aspect, it also greatly improves the performance of the original multiplication homomorphism algorithm.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Multi-bit sensing based target localization (MSTL) algorithm in wireless sensor networks 基于多比特感知的无线传感器网络目标定位(MSTL)算法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911739
Quanlong Li, Qing Yang, Shaoen Wu
{"title":"Multi-bit sensing based target localization (MSTL) algorithm in wireless sensor networks","authors":"Quanlong Li, Qing Yang, Shaoen Wu","doi":"10.1109/ICCCN.2014.6911739","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911739","url":null,"abstract":"Efficient and accurate target localization is one of the most fundamental problems in Wireless Sensor Networks (WSN), and has been studied for several years. Due to its simplicity and low energy consumption, binary sensing model is widely used in the literature to achieve fast target localization but with low accuracy. To improve localization accuracy, we propose a novel multi-bit sensing model where multi-bit information is sent by sensors to report the relative distances between a target and the sensors. Based on this sensing model, a new target localization algorithm is proposed, which can improve localization precision by estimating a targets position within a reduced area. Furthermore, the proposed algorithm works well with irregular sensing boundary caused by noise, channel fading, and obstacles. Simulation results show that the multi-bit sensing based target localization (MSTL) algorithm could improve localization accuracy by 50%.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130820140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN MT-NCOR:一种实用的WMN网络编码机会路由优化方法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911724
Xiang Lan, Sanfeng Zhang
{"title":"MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN","authors":"Xiang Lan, Sanfeng Zhang","doi":"10.1109/ICCCN.2014.6911724","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911724","url":null,"abstract":"Network coded opportunistic routing (NCOR) is a potential communication paradigm in wireless multi-hop networks (WMN) with lossy links. It leverages the multipath diversity of wireless networks and applies network coding to resist random erasures. Related optimization work minimizing transmission cost or maximizing throughput are based on the collision-free assumption, which either requires perfect schedule of MAC layer or only considers low traffic load and thus few packet collisions will occur. However, the assumption doesn't hold true because real WMNs often need to support content distribution service and bear a high level of traffic load, and 802.11 protocols cannot guarantee an ideal schedule with no collisions. In order to achieve an optimal forwarding rate distribution and reduce conflicting packets, this paper proposes a throughput optimization algorithm which takes into consideration the channel capacity and interference between neighboring nodes. Based on this algorithm, we implement a practical NCOR protocol aiming at achieving maximum throughput named MT-NCOR. Through extensive experiments, we show that MT-NCOR outperforms the state-of-art NCOR protocols in both throughput and total cost, especially in networks backing high traffic loads.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors 构建带式屏障,以最少的摄像机传感器提供高质量的监控
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911787
Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, A. Tokuta
{"title":"Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors","authors":"Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, A. Tokuta","doi":"10.1109/ICCCN.2014.6911787","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911787","url":null,"abstract":"A wireless sensor network is said to form a belt-barrier for a region if it is able to detect any object moving from outside the region to inside. Recently, Cheng and Tsai found if camera sensors are used to form a belt-barrier, the breadth of the barrier becomes an important quality factor to ensure high quality of monitoring (QoM). Then, they proposed the minimum β-breadth belt-barrier construction problem ((β, 1)-B3CP) whose goal is to select a minimum number of camera sensors to form a β-breadth belt-barrier, which ensures the width of the picture of any object which moves through the barrier is at least β. In this paper, we perform more thorough investigation of the problem and introduce a new polynomial time exact algorithm for the problem under the assumption that the angle of each camera is fixed. Our simulation result shows our algorithm outperforms Cheng and Tsai's algorithm. We also introduce a variation of (β, 1)-B3CP, namely (β, k)-B3CP, which aims to construct k node-disjoint β-breadth belt-barrier for fault-tolerance purpose, propose a new heuristic algorithm for it, and conduct simulations to evaluate its performance.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121196329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Age-based cooperative caching in information-centric networking 信息中心网络中基于年龄的协同缓存
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911725
Zhongxing Ming, Mingwei Xu, Dan Wang
{"title":"Age-based cooperative caching in information-centric networking","authors":"Zhongxing Ming, Mingwei Xu, Dan Wang","doi":"10.1109/ICCCN.2014.6911725","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911725","url":null,"abstract":"Information-Centric Networking (ICN) provides substantial flexibility for users. One of the most important features of ICN is the universal in-network caching. The characteristics of ICN make it substantially different from traditional caching systems. In this paper we propose an age-based cooperative caching scheme in response to the special characteristics of ICN. We leverage the coupling between routing and caching in ICN to develop a light-weight collaboration mechanism that adaptively pushes popular contents to the network edge. We evaluate our approach using real traces and realistic network topology. Results show that our approach can significantly reduce network delay and traffic, and outperforms existing schemes.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach 基于蜂窝网络的单元间设备对设备通信的资源分配:一种博弈论方法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911738
Jun Huang, Yanxiao Zhao, K. Sohraby
{"title":"Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach","authors":"Jun Huang, Yanxiao Zhao, K. Sohraby","doi":"10.1109/ICCCN.2014.6911738","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911738","url":null,"abstract":"Device-to-Device (D2D) communication is envisioned as a promising technology to significantly improve the performance of current cellular infrastructures. Allocating resources to the D2D link, however, raises an enormous challenge to the co-existing D2D and cellular communications due to mutual interference. While there have been many resource allocation solutions proposed for D2D underlaying cellular network, they have primarily focused on the intracell scenario while leaving the intercell settings untouched. In this paper, we investigate the resource allocation problem for intercell D2D communications underlaying cellular networks, where D2D link is located in the overlapping area of two neighboring cells. We present three inter-cell D2D scenarios regarding the resource allocation problem. To address this problem, we develop a repeated game model under these scenarios. Distinct from existing works, we characterize the communication infrastructure, namely Base Stations (BSs), as players competing resource allocation quota for D2D demand, and define the utility of each player as the payoff from both cellular and D2D communications using radio resources. We also propose a resource allocation algorithm and protocol based on the equilibrium derivations. Numerical results indicate that the developed model not only significantly enhances the system performance including sum rate and sum rate gain, but also sheds lights on resource configurations for intercell D2D scenarios.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A multi-attribute routing protocol for opportunistic network environments 机会网络环境的多属性路由协议
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911876
Sadaf Yasmin, R. N. B. Rais, A. Qayyum
{"title":"A multi-attribute routing protocol for opportunistic network environments","authors":"Sadaf Yasmin, R. N. B. Rais, A. Qayyum","doi":"10.1109/ICCCN.2014.6911876","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911876","url":null,"abstract":"In opportunistic networks, nodes hold packets in permanent storage and make independent routing decisions on sporadically emerging links. This helps to achieve connectivity even if an end-to-end contemporaneous path does not exist between a pair of nodes. Next-hop decision is generally dependent on future probability of encounters with a destination node while other constraints on nodes' resources are ignored. We argue, in this paper that considering multiple parameters related to destination dependent and independent characteristics of a node, while determining its next-hop fitness, can help achieve better performance in resource-stringent opportunistic network environments. Our proposed routing protocol, MARS, not only gets itself cognizant of mobility patterns present within the network but also combines these mobility patterns with other stochastic information about nodes' characteristics. With the help of simulations, we show that MARS is able to achieve high delivery rates and comparable end-to-end latency with well-known routing protocols while maintaining its overhead to a significantly low limit.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Channel assignment based on conflict-area for reducing interference in large-scale WLANs 大规模无线局域网中基于冲突区域的信道分配减少干扰
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911872
Wenqi Sun, Hewu Li, Jianping Wu
{"title":"Channel assignment based on conflict-area for reducing interference in large-scale WLANs","authors":"Wenqi Sun, Hewu Li, Jianping Wu","doi":"10.1109/ICCCN.2014.6911872","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911872","url":null,"abstract":"Using unlicensed spectrums is a key factor in popularity of WLANs. Meanwhile, the interference is becoming severer in coming time because of network expansion. Assigning channels for AP in distributed way only reduce interference around single AP rather than reducing system interference. However systematic optimizations usually require real-time information which increase complexity for applying. This paper identifies a idea for optimizing system interference from the view of several sub-areas. Actually, interferences spread regionally depending on signal propagation. Conflict-areas are divided according to the interfering range. We define an index to present interference in conflict-areas and the goal is to minimize maximum index of the areas. It means that interferences of the whole network are comparatively low and distributed evenly. Both the theoretical evaluation and experiments in real network show that the conflict-area method is reasonable. Average interferences in most conflict-areas under experiments are reduced (about 50%) or remain unchanged (about 40%).","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"3 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Keynote speakers: Big data science and social networks — Accelerating insights and building value 主题演讲嘉宾:大数据科学和社交网络——加速洞察和创造价值
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911711
A. Choudhary, John C.S. Lui, K. Ross
{"title":"Keynote speakers: Big data science and social networks — Accelerating insights and building value","authors":"A. Choudhary, John C.S. Lui, K. Ross","doi":"10.1109/ICCCN.2014.6911711","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911711","url":null,"abstract":"These keynote discusses the following: Big Data Science and Social Networks - Accelerating Insights and Building Value; Sampling Theory of Large Networks; Mining Online Social Networks: Opportunities and Privacy Issues.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
E-DARWIN: Energy Aware Disaster Recovery Network using WiFi Tethering E-DARWIN:使用WiFi连接的能源感知灾难恢复网络
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911770
M. Raj, K. Kant, Sajal K. Das
{"title":"E-DARWIN: Energy Aware Disaster Recovery Network using WiFi Tethering","authors":"M. Raj, K. Kant, Sajal K. Das","doi":"10.1109/ICCCN.2014.6911770","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911770","url":null,"abstract":"In this paper, we propose a novel architecture called Energy Aware Disaster Recovery Network using WiFi Tethering (E-DARWIN). The underlying idea is to make use of WiFi Tethering technology ubiquitously available on wireless devices, like smartphones and tablets, to set up an ad hoc network for data collection in disaster scenarios. To this end, we design novel mechanisms, which aid in autonomous creation of the ad hoc network, distribution of data capturing task among the devices, and collection of data with minimum delay. Specifically, we design and implement a distributed coalition formation game for distributing the data capturing task among wireless devices based on their capabilities, available energy, and network participation for higher network lifetime. Finally, we evaluate the performance of the proposed architecture using a prototype application implemented on Android platform and large-scale simulations.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信