2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
Automatically verifying STRAC policy 自动验证STRAC策略
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849195
Yunchuan Guo, Lihua Yin, Li Chao
{"title":"Automatically verifying STRAC policy","authors":"Yunchuan Guo, Lihua Yin, Li Chao","doi":"10.1109/INFCOMW.2014.6849195","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849195","url":null,"abstract":"In the IoT (Internet of Things), inconsistent ACP (Access Control Policies) would cause disastrous consequences, for example, fire disasters and failures of cardiac pacemakers, as a result, ACP should be verified before they are applied. Tediousness and error-proneness of manual verifications make automatic and formal verification necessary. In this paper, timed automata is presented to formally model the STRAC (Spatio-Temporal Access Control based on Reputation, one policy for the IoT) policies and CTL (Computation Tree Logic) is adopted to describe the properties that should be satisfied by these policies. Then model checker UPPAAL is proposed to automatically verify whether STRAC policies conform to security properties. Experiment results show that our approach is effective.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"125 1","pages":"141-142"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79505653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characterizing energy consumption of IaaS clouds in non-saturated operation 非饱和运行下IaaS云的能耗特征
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849265
Haleh Khojasteh, J. Misic, V. Mišić
{"title":"Characterizing energy consumption of IaaS clouds in non-saturated operation","authors":"Haleh Khojasteh, J. Misic, V. Mišić","doi":"10.1109/INFCOMW.2014.6849265","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849265","url":null,"abstract":"To save energy, physical machines (servers) in cloud data centers are partitioned in different pools, depending on whether they are kept on at all times and/or whether they have virtual machines instantiated. Partitioning (pooling) of servers affects the power consumption of the data center but also the performance and responsiveness to user requests. In this paper we examine the behavior of pool management scheme in different operating regions which correspond to linear operation, transition to saturation, and saturation, in particular the tradeoff between performance and power consumption. In addition, our results show that the offered load (analogous to the concept often used in networking) does not offer complete characterization of data center operation; instead, the impact of task arrival rate and task service time must be considered separately.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"39 5","pages":"398-403"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72593207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Combining cooperation and storage for the integration of renewable energy in smart grids 合作与存储相结合,实现可再生能源在智能电网中的整合
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849303
S. Lakshminarayana, Tony Q. S. Quek, H. Poor
{"title":"Combining cooperation and storage for the integration of renewable energy in smart grids","authors":"S. Lakshminarayana, Tony Q. S. Quek, H. Poor","doi":"10.1109/INFCOMW.2014.6849303","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849303","url":null,"abstract":"Two different techniques for the integration of renewable energy in smart grid systems are considered. The first is storage, which smooths the fluctuations of the renewable energy generation across time. The second is the concept of distributed generation combined with cooperation by exchanging energy among the distributed sources. This technique leads to energy aggregation from diverse sources, which averages out the variation in the energy production across space. The trade-off present between the two techniques is analyzed, and the optimal combination of storage and cooperation to achieve a certain grid performance is investigated. The problem is formulated as a stochastic optimization problem with the objective of minimizing the time average cost of energy exchange within the grid. First, an analytical model of the optimal cost is provided by investigating the steady state of the system for some specific scenarios. Then, an algorithm to solve the cost minimization problem using the technique of Lyapunov optimization is developed. The algorithm is implemented on the renewable energy data provided by National Renewable Energy Laboratory (NREL) of the United States. The results show that in the presence of limited storage devices, the grid can benefit greatly from cooperation, whereas in the presence of large storage, cooperation does not yield much benefit.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"23 1","pages":"622-627"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76532654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multiple virtual machine live migration in federated cloud systems 联邦云系统中的多虚拟机实时迁移
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849163
W. Cerroni
{"title":"Multiple virtual machine live migration in federated cloud systems","authors":"W. Cerroni","doi":"10.1109/INFCOMW.2014.6849163","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849163","url":null,"abstract":"The idea of computing utility incarnated by the cloud paradigm is gaining a lot of success, both for entertainment and business applications. The consequent increasing demand of computing, storage and communication resources within data centers is fostering new forms of infrastructure sharing such as cloud federations, which can take advantage of virtualization technologies and, in particular, of multiple virtual machine live migration techniques. Such a scenario requires a quantitative characterization of the performance of the inter-data center network infrastructure underlying the cloud federation. In this paper we propose an analytical model useful to dimension network capacity in order to achieve some given performance level in a federate cloud, assuming some simple multiple virtual machine live migration strategies.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1996 1","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75232209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
iDNS: Enabling information centric networking through The DNS iDNS:通过DNS实现以信息为中心的组网
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849278
Spencer Sevilla, Priya Mahadevan, J. Garcia-Luna-Aceves
{"title":"iDNS: Enabling information centric networking through The DNS","authors":"Spencer Sevilla, Priya Mahadevan, J. Garcia-Luna-Aceves","doi":"10.1109/INFCOMW.2014.6849278","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849278","url":null,"abstract":"Information centric networking (ICN) architectures represent a conceptual shift from naming end-hosts in the Internet to naming content directly, and require either significant changes to the existing IP infrastructure or replacing it entirely. We present iDNS (information-centric DNS), an evolutionary path towards deploying ICN at Internet scale based on modifications to the DNS that leave the current routing infrastructure unmodified. We build and evaluate an iDNS prototype, and use it to show that iDNS achieves the benefits associated with ICN (i.e. location-independent naming, nearest-replica-routing) in a manner that both leverages current infrastructure, including content delivery protocols and caches, and supports future evolution towards other network-layer ICN architectures.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 6 1","pages":"476-481"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77584551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Energy Conserving Opportunistic Routing for self-powered wireless sensor networks 自供电无线传感器网络的节能机会路由
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849184
P. Spachos, D. Hatzinakos
{"title":"Energy Conserving Opportunistic Routing for self-powered wireless sensor networks","authors":"P. Spachos, D. Hatzinakos","doi":"10.1109/INFCOMW.2014.6849184","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849184","url":null,"abstract":"Survivability is a looming threat for Wireless Sensor Networks (WSNs) especially when they are used for monitoring and tracking applications with limited available resources. Self-powered WSNs can alleviate the problem and extend network lifetime. In this poster, we introduce an Energy Conserving Opportunistic Routing (ECOR) protocol that tries to keep a balance between the energy consumption and the packet delay. Every node is self-powered and draws energy via solar panels. Preliminary simulation results are presented that show an increase in network lifetime of up to 25% compared with simple opportunistic routing while the packet delay is similar.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"19 1","pages":"119-120"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73382430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CorteXlab: An open FPGA-based facility for testing SDR & cognitive radio networks in a reproducible environment CorteXlab:一个基于fpga的开放式设施,用于在可复制环境中测试SDR和认知无线电网络
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849176
A. Massouri, L. Cardoso, B. Guillon, F. Hutu, G. Villemaud, T. Risset, J. Gorce
{"title":"CorteXlab: An open FPGA-based facility for testing SDR & cognitive radio networks in a reproducible environment","authors":"A. Massouri, L. Cardoso, B. Guillon, F. Hutu, G. Villemaud, T. Risset, J. Gorce","doi":"10.1109/INFCOMW.2014.6849176","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849176","url":null,"abstract":"While many theoretical and simulation works have already highlighted the potential gain of cognitive radio, several technical issues still have to be evaluated and overcome from an experimental viewpoint. Our team is currently developing a new experimental facility remotely accessible and dedicated to this problem. CorteXlab is developed in the framework of a nationwide French program Future Internet of Things which proposes a federated and competitive infrastructure. The Cor-teXlab facility offers a 167m2 EM shielded room and integrates a set of 22 USRP from National Instrument, 16 picoSDR nodes from Nutaq and 42 IoT-Lab wireless sensor nodes from Hikob. CorteXlab is built on the network architecture developed for the SensLAB testbed and exploits the free and open-source toolkit GNU-radio. All nodes are remotely accessible through a software interface called Minus. The demo presented at Infocom describes the facility and shows the process a user should follow to deploy his own experiment. Two typical scenarios involving several nodes are built and deployed live. The first scenario is based on IEEE 802.15.4 communication between two picoSDR nodes. The second scenario is dealing with an avoiding-interference use case where the previous two picoSDRs are communicating while a cognitive MIMO-OFDM transceiver running on one picoSDR must avoid interference with them.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"180 1","pages":"103-104"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73272625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Hierarchical hexagonal modulation with ternary symbols for wireless video transmission 无线视频传输用三元符号的分层六角形调制
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849239
Zhe Yang, Lin X. Cai, Xuan Wang, Siyuan Xiang, Jianping Pan
{"title":"Hierarchical hexagonal modulation with ternary symbols for wireless video transmission","authors":"Zhe Yang, Lin X. Cai, Xuan Wang, Siyuan Xiang, Jianping Pan","doi":"10.1109/INFCOMW.2014.6849239","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849239","url":null,"abstract":"Wireless video transmission systems have been widely adopted to facilitate the ubiquitous access of the multimedia services on the Internet. However, wireless links are not stable and the channel quality might vary with time. Efficient modulation scheme plays an important role to improve the quality of service (QoS) of video transmission. However, the previous efforts mainly focused on the rectangular constellation to carry coded information bits. In this paper, we go beyond the existing research efforts and bring non-binary communication and the hexagonal modulation together with a hybrid structure which can be compatible with the existing systems, and show by both prototyping and simulation their efficacy in wireless communication systems with varying channel conditions. For video applications requiring differentiated services, we further design hierarchical hexagonal modulation. The new cross-layer approach offers a new dimension in the pursuit of squeezing more out of the limited energy and spectrum resources in supporting wireless video applications.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"68 1","pages":"245-250"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72590629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tackling the Big Data 4 vs for anomaly detection 应对大数据4 vs异常检测
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849282
J. Camacho, G. Maciá-Fernández, J. D. Verdejo, P. García-Teodoro
{"title":"Tackling the Big Data 4 vs for anomaly detection","authors":"J. Camacho, G. Maciá-Fernández, J. D. Verdejo, P. García-Teodoro","doi":"10.1109/INFCOMW.2014.6849282","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849282","url":null,"abstract":"In this paper, a framework for anomaly detection and forensics in Big Data is introduced. The framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied nature of the data sources is treated by transforming the typically unstructured data into a highly dimensional and structured data set. To overcome both the uncertainty (low veracity) and high dimension introduced, a latent variable method, in particular Principal Component Analysis (PCA), is applied. PCA is well known to present outstanding capabilities to extract information from highly dimensional data sets. However, PCA is limited to low size, thought highly multivariate, data sets. To handle this limitation, a kernel computation of PCA is employed. This avoids computational problems due to the size (number of observations) in the data sets and allows parallelism. Also, hierarchical models are proposed if dimensionality is extreme. Finally, to handle high velocity in analyzing time series data flows, the Exponentially Weighted Moving Average (EWMA) approach is employed. All these steps are discussed in the paper, and the VAST 2012 mini challenge 2 is used for illustration.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"500-505"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79113070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Behavioral analytics for inferring large-scale orchestrated probing events 用于推断大规模精心策划的探测事件的行为分析
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849283
E. Bou-Harb, M. Debbabi, C. Assi
{"title":"Behavioral analytics for inferring large-scale orchestrated probing events","authors":"E. Bou-Harb, M. Debbabi, C. Assi","doi":"10.1109/INFCOMW.2014.6849283","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849283","url":null,"abstract":"The significant dependence on cyberspace has indeed brought new risks that often compromise, exploit and damage invaluable data and systems. Thus, the capability to proactively infer malicious activities is of paramount importance. In this context, inferring probing events, which are commonly the first stage of any cyber attack, render a promising tactic to achieve that task. We have been receiving for the past three years 12 GB of daily malicious real darknet data (i.e., Internet traffic destined to half a million routable yet unallocated IP addresses) from more than 12 countries. This paper exploits such data to propose a novel approach that aims at capturing the behavior of the probing sources in an attempt to infer their orchestration (i.e., coordination) pattern. The latter defines a recently discovered characteristic of a new phenomenon of probing events that could be ominously leveraged to cause drastic Internet-wide and enterprise impacts as precursors of various cyber attacks. To accomplish its goals, the proposed approach leverages various signal and statistical techniques, information theoretical metrics, fuzzy approaches with real malware traffic and data mining methods. The approach is validated through one use case that arguably proves that a previously analyzed orchestrated probing event from last year is indeed still active, yet operating in a stealthy, very low rate mode. We envision that the proposed approach that is tailored towards darknet data, which is frequently, abundantly and effectively used to generate cyber threat intelligence, could be used by network security analysts, emergency response teams and/or observers of cyber events to infer large-scale orchestrated probing events for early cyber attack warning and notification.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"29 1","pages":"506-511"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83578004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信