2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)最新文献

筛选
英文 中文
A new mechanism for SDN network virtualization service 一种SDN网络虚拟化服务的新机制
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867766
Changcheng Huang, Jiafeng Zhu, Min Luo, Wu Chou
{"title":"A new mechanism for SDN network virtualization service","authors":"Changcheng Huang, Jiafeng Zhu, Min Luo, Wu Chou","doi":"10.1109/SACONET.2014.6867766","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867766","url":null,"abstract":"Software Defined Network (SDN) is becoming a new paradigm for both WAN and enterprise networks. By separating control and data planes, SDN allows network providers to sell new services without changing their physical switches. One of the key services SDN can enable is network virtualization which allows a service provider to have a virtual slice of a network provider's physical network. While this feature empowers service providers to have dynamic networks, it is becoming more difficult for a network provider to statistically share its resource usage across multiple service providers due to the fact that service providers are reluctant to share their user information. This paper presents a new scheme that empowers network provider to maximize statistical resource sharing with service guarantee while minimizing information shared.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wireless Sensor Network Cloud services: Towards a partial delegation 无线传感器网络云服务:走向部分委托
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867773
D. Clement, Cotsaftis Michel, Bertelle Cyrille
{"title":"Wireless Sensor Network Cloud services: Towards a partial delegation","authors":"D. Clement, Cotsaftis Michel, Bertelle Cyrille","doi":"10.1109/SACONET.2014.6867773","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867773","url":null,"abstract":"Current emerging technologies in Wireless Sensor Networks are providing protocols and operating systems to build up the Internet Of Things which heads towards SaaS approach in the Cloud. However, this paper discusses about the impossibility to directly route all nodes from the Cloud. Hence, this paper proposes a new framework based on mobile agents to distribute and deploy applications over a CoAP middleware. This is mainly performed using a distributed publish-subscribe mechanism on each node. The solution allows agents to model distributed applications and their remote deployments.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Diagnosis of route leaks among autonomous systems in the Internet Internet自治系统间路由泄漏诊断
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867765
M. S. Siddiqui, D. Montero, M. Yannuzzi, R. Serral-Gracià, Xavi Masip-Bruin
{"title":"Diagnosis of route leaks among autonomous systems in the Internet","authors":"M. S. Siddiqui, D. Montero, M. Yannuzzi, R. Serral-Gracià, Xavi Masip-Bruin","doi":"10.1109/SACONET.2014.6867765","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867765","url":null,"abstract":"Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large scale disruption in the Internet. Route leak is one such inter-domain routing security problem which has the potential to cause wide-scale Internet service failure. Route leaks occur when Autonomous systems violate export policies while exporting routes. As BGP security has been an active research area for over a decade now, several security strategies were proposed, some of which either advocated complete replacement of the BGP or addition of new features in BGP, but they failed to achieve global acceptance. Even the most recent effort in this regard, lead by the Secure Inter-Domain Routing (SIDR) working group (WG) of IETF fails to counter all the BGP anomalies, especially route leaks. In this paper we look at the efforts in countering the policy related BGP problems and provide an analytical insights into why they are ineffective. We contend a new direction for future research in managing the broader security issues in the inter-domain routing. In that light, we propose a naive approach for countering the route leak problem by analyzing the information available at hand, such as the RIB of the router. The main purpose of this paper was to position and highlight the autonomous smart analytical approach for tackling policy related BGP security issues.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A smart methodology for deterministic deployment of wireless sensor networks 无线传感器网络确定性部署的智能方法
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867774
Mustapha Réda Senouci, Mohamed El Yazid Boudaren, M. Senouci, A. Mellouk
{"title":"A smart methodology for deterministic deployment of wireless sensor networks","authors":"Mustapha Réda Senouci, Mohamed El Yazid Boudaren, M. Senouci, A. Mellouk","doi":"10.1109/SACONET.2014.6867774","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867774","url":null,"abstract":"This paper presents a smart methodology for deterministic deployment of wireless sensor networks. We discuss a set of factors involved in the wireless sensor network deployment problem, such as building abstract models, using simulation to rank deployment alternatives, and measuring the real performances of the network to verify that they meet the design goals. Network designers can use this methodology to determine the best network topology based on mission specific goals. The methodology can also be exploited to further analyze, compare, and validate deterministic deployment strategies.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A generalized distributed consensus algorithm for monitoring and decision making in the IoT 一种用于物联网监控和决策的广义分布式共识算法
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867769
Denis Carvin, P. Owezarski, Pascal Berthou
{"title":"A generalized distributed consensus algorithm for monitoring and decision making in the IoT","authors":"Denis Carvin, P. Owezarski, Pascal Berthou","doi":"10.1109/SACONET.2014.6867769","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867769","url":null,"abstract":"In this paper, we propose a method to distributively monitor a dynamic mobile network. For this purpose, we take advantage of the consensus theory to provide each node with a common view of the network. More specifically, we give a decentralized algorithm to estimate a time-varying distribution, where each node has a partial information on this distribution. Our algorithm allows a trade-off between the precision of its estimation and its bandwidth consumption. We validate our approach by simulation under NS3, considering the distribution of several network metrics. Simulation results demonstrate how our algorithm can give insights on the network behavior that could be exploitable in a decision making process.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115325976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Leveraging Net2Plan planning tool for network orchestration in OpenDaylight 利用Net2Plan规划工具在OpenDaylight中进行网络编排
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867770
J. Izquierdo-Zaragoza, Angel Fernandez-Gambin, J. Pedreno-Manresa, P. Pavón-Mariño
{"title":"Leveraging Net2Plan planning tool for network orchestration in OpenDaylight","authors":"J. Izquierdo-Zaragoza, Angel Fernandez-Gambin, J. Pedreno-Manresa, P. Pavón-Mariño","doi":"10.1109/SACONET.2014.6867770","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867770","url":null,"abstract":"The software-defined networking (SDN) paradigm brings unprecedented agility and flexibility to network operators. The usage of centralized software-based controllers simplifies operation and management and enables innovation in the control plane through network programmability. Besides, a controller may be operated via third-party applications using the so-called northbound application programming interfaces (APIs). In this paper, we report our preliminary work on the interaction between the northbound interface of the open-source industry-supported OpenDaylight controller and our Net2Plan tool. Net2Plan is an open-source network planning tool that is able to execute user-made algorithms. By connecting Net2Plan to OpenDaylight, users would be able to easily orchestrate their networks, e.g. defining flow routing, making use of built-in or user-defined algorithms, implemented in the Net2Plan framework. In this paper, we present some illustrative experiments, and discuss future challenges.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123057438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards a service-oriented and component-based transport layer 面向服务和基于组件的传输层
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867767
Mohamed Oulmahdi, D. Guillaume, C. Chassot
{"title":"Towards a service-oriented and component-based transport layer","authors":"Mohamed Oulmahdi, D. Guillaume, C. Chassot","doi":"10.1109/SACONET.2014.6867767","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867767","url":null,"abstract":"The Internet Transport layer, designed for old context and applications requirements, became less and less efficient with the evolution of applications requirements and equipment technologies. We study in this paper the possibility to redesign the Internet Transport layer by applying a service-oriented and a components-based approach, in order to make it more adapted to the new context, and able to support future evolutions. We describe first the limitation of the actual design, and after, how we can resolve them with these two approaches. At last, we present the new design implications and considerations, and we study particularly the management of services one.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"116 1-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120915850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New trends in sensor coverage modeling and related techniques: A brief synthesis 传感器覆盖建模及相关技术的新趋势:简要综述
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867778
Mohamed El Yazid Boudaren, Mustapha Réda Senouci, M. Senouci, A. Mellouk
{"title":"New trends in sensor coverage modeling and related techniques: A brief synthesis","authors":"Mohamed El Yazid Boudaren, Mustapha Réda Senouci, M. Senouci, A. Mellouk","doi":"10.1109/SACONET.2014.6867778","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867778","url":null,"abstract":"Sensor coverage model is a mathematical formulation that attempts to quantify the sensors capability to sense some physical phenomena at some locations of interest. Typically, a space point is said to be covered if its coverage measure, the quantification output of such models, satisfies some predefined criteria depending on the application. Choosing a coverage model is a crucial step in a wide range of wireless sensor networks applications including sensor placement and sensor redundancy detection, among other problems. The aim of this paper is to briefly summarize sensor coverage models described in the literature and their related motivations and applications.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Proposal of a new information-theory based technique and analysis of traffic anomaly detection 基于信息论的交通异常检测新技术的提出与分析
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1109/SACONET.2014.6867763
Antonio Cuadra-Sánchez, J. Aracil, Javier Ramos de Santiago
{"title":"Proposal of a new information-theory based technique and analysis of traffic anomaly detection","authors":"Antonio Cuadra-Sánchez, J. Aracil, Javier Ramos de Santiago","doi":"10.1109/SACONET.2014.6867763","DOIUrl":"https://doi.org/10.1109/SACONET.2014.6867763","url":null,"abstract":"The change-point detection theory is used to identify abrupt changes in the network traffic. The literature has focused on longitudinal traffic analysis, namely, detecting sudden peak changes, rather than analyzing the traffic pattern on a 24h typical day. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs, which is useful for checking interconnection agreements amongst operators, something not possible with traditional sudden peak changes techniques. As we introduce in this paper, no author to date has devised to detect changing points inside a typical day traffic pattern, which constitutes an innovative information-theory based technique. The aim of this paper is to present this new technique and to analyze how the different algorithms behave in detecting changing points inside a typical day profile. We conclude that a combination of the algorithms provides better results than the use of a single one. In low traffic periods the tests of goodness-of-fit best detect changing conditions, while in normal traffic periods (daytime) entropy-based algorithms best detect traffic increases; besides, the Statistical Control Charts complements both of them when detecting very abrupt changes regardless the traffic load.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122955147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IMAKA-Tate: Secure and efficient privacy preserving for Indoor Positioning applications IMAKA-Tate:用于室内定位应用的安全高效的隐私保护
2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) Pub Date : 2014-06-18 DOI: 10.1080/17445760.2015.1058939
M. Sadikin, M. Kyas
{"title":"IMAKA-Tate: Secure and efficient privacy preserving for Indoor Positioning applications","authors":"M. Sadikin, M. Kyas","doi":"10.1080/17445760.2015.1058939","DOIUrl":"https://doi.org/10.1080/17445760.2015.1058939","url":null,"abstract":"IEEE 802 Wireless Indoor Positioning (WIP) techniques (i.e. Received Signal Strengths, Time of Arrival and Angle of arrival) have emerged as prominent solution for various applications in indoor environment. Nevertheless, such positioning techniques introduce tremendous problem in term of security and privacy issues. On the other hand, the enforcement of security mechanism in WIP system is more intricate, as the constrained nature of WIP demands appropriate security method. This paper presents our proposed solution called IMAKA-Tate (Identity protection, Mutual Authentication and Key Agreement using light-weight Tate pairing over super singular curve). This method is tailored to satisfy the security and privacy requirements in WIP system. Indeed, the proposed solution ensures the privacy preserving by protecting the user identity from being reveled by unauthorized. Furthermore, IMAKA-Tate performs mutual authentication and key agreement which enable the protection from various risks and possible attacks in the existing WIP system.","PeriodicalId":440592,"journal":{"name":"2014 International Conference on Smart Communications in Network Technologies (SaCoNeT)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信