Escolar Documentos
Profissional Documentos
Cultura Documentos
DYNAMIC TIME SLOT PARTITIONING FOR MULTIMEDIA TRANSMISSION IN TWO-HOP CELLULAR NETWORKS
ABSTRACT In recen t years , there has been an e xponen tial i ncrease i n the number o f mobile phone users. In addition, a signi fican t grow th in the demand for high -ra te multimedia services o ve r wire less networks , such as video con fere ncing , multimedia streaming , etc., was no ted . Differen t solutions were p roposed to support high -quali ty high da ta rate de li very to mobile users, including resource allo ca tion techniques for packe t-radio-based ne xt gene ra tion cellula r n etwo rks. In this paper, an effi cien t time slot allocation method D ynamic Time Slot Partiti oning (D TSP) alg ori thm based on statisti cal multiple xing is proposed fo r a two-hop cel lular arch ite cture . In D TSP, the a vailable bandwid th resources a re increased b y partitioning each time slot into seve ral minislots wherein differen t numbers of minislots are allo ca ted to di fferen t users. The D TSP algori thm is based on asynchro nous time-di vision multipl e xing , wherein users with variab le number of packe ts in their bu ffe rs can tra nsmit data sequentiall y wi thou t an y loss in the o ve rall a vail able resources . The ke y ad van tage o f D TSP is tha t i t can fle xibl y adap t to di ffe ren t quali ty o f servi ce requirements , especiall y when combined wi th adap ti ve modulati on. It has been observed tha t th e sys tem capaci ty a chie ve d b y the D TSP algorithm in the downlink mode using adapti ve modulation is up to 41 pe rcen t highe r tha n when existing solutions a re emplo yed . In addi tion , DTSP results in significan tl y lo wer time for da ta transmission than the state-o f-the -art regi on an d time pa rtitio ning te chniques.
INDEX TERMS Ad apti ve modula tion , cluster-based design , d yn amic time slot parti tioning , statisti cal mul tiple xi ng, time-di vision multiple access, two-hop.
NCCT
Promise for the Best Projects
EFFICIENT LOCATION TRAINING PROTOCOLS FOR HETEROGENEOUS SENSOR AND ACTOR NETWORKS
ABSTRACT In this work, we co nsider a large-scale geog raphic a rea popula ted b y tin y sensors and some more powerful de vi ces called a cto rs, au tho ri zed to organi ze the sensors in their vi cini ty into short-li ved , acto r-centric sensor networks. The tin y sensors run on miniatu re n onrechargeable ba tteries, are anon ymous, and a re unaware of their lo ca tion. The sensors diffe r in thei r abil ity to d ynamicall y al ter thei r sleep times. Indeed , the p eriodi c sensors ha ve sleep periods o f prede fined leng ths, established a t fabri ca tion time; b y con trast, the free sensors can dynamicall y alte r thei r sleep periods, under p rogram con trol . The main con trib ution of this work is to p ropose an energ y-e fficien t lo ca tion trainin g pro tocol fo r hete rogeneous actor-cen tri c sensor netwo rks where the sensors acquire coarse-grain lo ca tion aware ness with respect to the acto r in thei r vi cini ty. Our theoreti cal anal ysis, confi rmed b y e xpe rimental e valua tion , shows that the proposed pro tocol ou tperforms the best p re viousl y known loca tion tra ining proto cols in terms of the number o f sleep/awa ke transitions, o verall sensor awake time, and energ y consumption . INDEX TERMS Sensor and acto r ne tworks , hete rogeneous sensors, coarse-grain locali za tion , locatio n tra ining pro tocols , lo cali zatio n p ro tocols.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
DESIGN AND PERFORMANCE ANALYSIS OF MOBILITY MANAGEMENT SCHEMES BASED ON POINTER FORWARDING FOR WIRELESS MESH NETWORKS
ABSTRACT We p ropose effi cien t mobility management schemes based on poin te r forwa rding for wi reless mesh networks (WMNs) wi th th e objecti ve to redu ce the o ve rall network traffi c i ncurred b y mobility managemen t an d pa cke t deli ve ry. The proposed schemes are per-user-based , i.e ., the op timal th reshold of the forwa rding chain leng th tha t minimi zes the o veral l ne twork tra ffic is d ynamicall y determined fo r each indi vidu al mobile user, based on the users specific mobility and servi ce patte rns. We de velop anal yti cal models based on stochastic Petri nets to e valu ate the perfo rmance o f the p roposed schemes. We demonstra te that the re e xists an optimal threshold of the forw arding chain leng th , gi ven a set of parameters characte ri zing the specifi c mobility and servi ce pa tte rns o f a mobile user. We also demonstrate that ou r schemes yield significa ntl y bette r performance than schemes that appl y a sta ti c threshold to all mobile users. A compara ti ve an al ysis shows that our poin ter forwa rding schemes outperform rou ting-b ased mobility management protocols for WMNs, especiall y for mobile In terne t applications characte ri zed b y la rge traffic as ymmetry fo r whi ch the downl ink pa cke t a rri val rate is much highe r than the uplink pa cke t arri val ra te . INDEX TERMS Mo bility management, poin te r forwa rding , wireless mesh networks, pe rfo rmance anal ysis, sto chastic Petri net.
NCCT
Promise for the Best Projects
A COOPERATIVE CLUSTERING PROTOCOL FOR ENERGY SAVING OF MOBILE DEVICES WITH WLAN AND BLUETOOTH INTERFACES
ABSTRACT One o f the most widel y used wireless communication standards is a Wi reless Local Area Ne two rk (WL AN) (IEEE 802 .11). Howe ver, WL AN has a serious power consumption problem . In this paper, we p ropose a no vel ene rg y sa ving approa ch tha t e xpl oits the multi radio fea ture o f re cen t mobile de vi ces equipped w ith WL AN and Blu etoo th in terfa ces. Unlike pre vious approaches, ou r work is based on clustering . In ou r work, a cluster is a Bluetoo th Personal Area Ne twork (PAN ), whi ch consists of one cluster head and seve ral regular nodes. The cluster head acts as a gatewa y between the PAN and the WL AN , enabling the regula r nodes to access the WL AN infrastructu re via low-pow er Blue too th . We present a distri buted clusterin g protocol , Coopera ti ve Netwo rking proto col (CON ET), which d ynamicall y re fo rms clusters acco rding to ea ch nodes bandwidth requiremen t, e nerg y use , and appli catio n type . CON ET d oes not require modifi ca tions of e xisting wi reless infrastru ctures because clusteri ng is perfo rmed indepe ndentl y of WL AN a ccess poin ts. We implemented the C ONET proto type with four wea rable compu ting de vi ces to evaluate the performance on real hardwa re . We also simulated CONET fo r large networks of more than 100 mobile nodes. Both results demonstra te that ou r approach is e ffecti ve in reducing the power consumption o f WL AN . INDEX TERMS Wireless communication , pro tocol a rchi te ctu re , multiradi o, ene rg y e fficien cy, clustering .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
and
sensiti ve,
pervasi ve
computing ,
wireless
sensor
NCCT
Promise for the Best Projects
A DISTRIBUTED AND SCALABLE TIME SLOT ALLOCATION PROTOCOL FOR WIRELESS SENSOR NETWORKS
ABSTRACT There are performance de ficien cies tha t hamper the deplo ymen t of Wi reless Sensor Ne tworks (WSNs) in critical monitorin g appli ca tions. Such applications are characte ri zed b y considera ble netwo rk load genera ted as a result of sensing some characteristics o f th e moni tored s ystem. Excessi ve packet collisions lead to packe t losses and retransmissions, resulting in significan t o verhead costs and laten cy. In order to address this issue, we introdu ce a distribu ted and scalable scheduling access scheme that mitigates high data loss in data-in tensi ve sensor ne tworks and can also handle some mobility. Our approa ch alle via tes tra nsmission collisions by emplo yi ng vi rtual grids tha t adopt La tin Squares cha racteristics to time slot assignments. We show tha t ou r algorithm deri ves confli ctfree time slot alloca tion schedules withou t incurring global o verhead in scheduling . Furthermore , we veri fy the e ffe cti veness of our protocol b y simulation experiments. The resul ts demonstrate that ou r te chnique can e fficien tl y h andle sensor mobility wi th accep table da ta loss, lo w pa cke t dela y, and low o ve rhead . INDEX TERMS Access scheduling, wireless topolog y changes.
NCCT
Promise for the Best Projects
DESIGN AND PERFORMANCE OF AN OPTIMAL INERTIAL POWER HARVESTER FOR HUMAN-POWERED DEVICES
ABSTRACT We present an empirical stud y o f the long-te rm practi cali ty of using human motion to genera te op era ting powe r for bo d ymounted consumer electronics and health sensors. We ha ve collected a large con tinuous acceleratio n data set from eight e xpe rimental subjects going about the ir normal dail y rou tine for three da ys each. Each subject is instrumented wi th a d ata collection ap para tus tha t simultaneousl y logs 3-axis, 80 H z accelera tion da ta from si x bod y locations . We use th is data set to optimi ze a fi rstprin ciples ph ysical model of the commonly used velo city damped resonant genera to r (VDRG) b y selecting ph ysi cal parame ters such as resonant frequen cy and damping coeffi cien t to ma ximi ze the ha rvested powe r. Our results show that with reasonable assumptions on size, mass, placement, and effi ciency o f VDR G ha rveste rs, most b od y-moun ted wi reless sensors and even some consumer electronics de vices can be powered con tinuousl y and indefini tel y from e ve ryda y moti on. We ha ve op timi zed the p ower ha rvesters fo r ea ch indi vidual an d for ea ch bod y locatio n. In addi tion, we present the po ten tial o f designing a damping- and frequen cy-tunable pow er ha rvester tha t could mi tigate the powe r reduction of a generator genera li zed for a verage subjects. We presen t the full de tails on the colle ction of the a ccele ra tion da ta sets, the de velopment o f the VDR G model, and a numerical simulator, and discuss some of the fu ture ch allenges tha t remain in this p romising field o f research. INDEX TERMS Human power harvesting , inertial gene ra tor, op timal design, tunable gene ra tor, human-powered de vi ce.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
INDEX TERMS Locatio n upda te , mobile ad hoc networks , Ma rko v decision pro cesses, leastsquares policy i tera tion
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
FAST DETECTION OF MOBILE REPLICA NODE ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL HYPOTHESIS TESTING
ABSTRACT Due to the unattende d nature o f wireless sensor networks, an ad ve rsary can captu re and compromise sensor nodes, make replicas of them, and then moun t a va rie ty o f attacks with th ese replicas. These replica node a tta cks are dangerous because the y allo w the a ttacker to le ve rage the compromise of a few nodes to exert con trol o ver much o f the netwo rk. Se veral replica node de tection schemes have been p roposed in th e lite ra ture to defend against such a tta cks in stati c sensor networks . Howe ver, these schemes rel y o n fi xed sensor loca tions and hence do not work in mobile sensor ne tworks, where sensors are e xpected to mo ve . In this work, we p ropose a fast and e ffe cti ve mobile repli ca node detection scheme using the Sequential Prob abili ty Ra tio Test. To the best o f our knowledge , this is the first wo rk to ta ckle the p roblem of repli ca node a ttacks in mobile sensor ne tworks . We show analytica ll y and through simulation exp eriments tha t our scheme detects mobile repli cas in an e ffi cien t and robust manner a t the cost o f reasonable o verheads. INDEX TERMS Replica detection , sequen tial anal ysis, mobile sensor n etwo rks, security.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
ON THE INFORMATION FLOW REQUIRED FOR TRACKING CONTROL IN NETWORKS OF MOBILE SENSING AGENTS
ABSTRACT We design controllers that permit mobile agents with distributed or networked sensing capabilities to track (follow) desired trajectories, identify what trajectory information must be distributed to each agent for tracking, and develop methods to minimize the communication needed for the trajectory information distribution.
NCCT
Promise for the Best Projects
MULTICAST THROUGHPUT FOR HYBRID WIRELESS NETWORKS UNDER GAUSSIAN CHANNEL MODEL
ABSTRACT
We study the multicas t capac ity for hy brid w ireless netw orks cons is ting of ordinary ad hoc nodes and base s tations under Gaussian Channel model, w hich gener aliz es both the unicas t and broadc ast c apac ities for hybr id w ireless netw orks. Assume that all ordinary ad hoc nodes tr ans mit at a constant pow er P, and the pow er decays along the path, w ith attenuation exponent > 2. The data r ate of a trans miss ion is deter mined by the Signal to Interference plus Nois e Ratio ( SINR) at the receiv er as Blog1 SINR. The ordinary ad hoc nodes ar e plac ed in the squar e region Aa of ar ea a acc ording to a Poisson point pr ocess of intens ity n=a. Then, m additional base stations ( BSs) acting as the relaying c ommunication gatew ays are placed regular ly in the region Aa, and are connected by a high- bandw idth w ired netw ork. Let a n and a 1, w e construc t the hy br id ex tended netw ork ( HEN) and hy brid dense netw ork ( HDN), res pec tiv ely. We choos e randomly and independently ns ordinary ad hoc nodes to be the sources of multic ast s ess ions. We assume that eac h multicast sess ion has nd randomly chos en ter minals . Thr ee br oad categor ies of multicast s trategies ar e pr oposed. The f irst one is the hybr id strategy, i.e., the multihop scheme w ith BS-supported, w hich further consis ts of tw o types of strategies c alled connectiv ity s trategy and perc olation str ategy , r espectively. The sec ond one is the or dinary ad hoc strategy, i.e., the multihop scheme w ithout any BS-supported. The third one is the classic al BS-based strategy under w hich any communic ation betw een tw o ordinary ad hoc nodes is r elayed by some spec ific BSs . According to the different scenar ios in ter ms of m, n, and nd, w e select the optimal scheme from the thr ee categories of str ategies, and deriv e the achievable multicas t thr oughput bas ed on the optimal decis ion.
INDEX TERMS Wireless h ybrid ne tworks, wi reless ad hoc ne two rks, mul ticast throughpu t, random ne tworks, multicast capaci ty, Gaussian channel mode
NCCT
Promise for the Best Projects
ON THE DESIGN OF OPPORTUNISTIC MAC PROTOCOLS FOR MULTIHOP WIRELESS NETWORKS WITH BEAMFORMING ANTENNAS
ABSTRACT
Beamfor ming antennas promise a signif icant increase in the s patial reuse of the w ireless medium w hen deployed in multihop w ireless netw orks. How ever, ex isting direc tional Medium Access Control ( MA C) protocols w ith the default binary ex ponential backoff mechanis m are not capable of fully exploiting the offered potential. In this paper, w e discuss var ious issues involved in the des ign of MA C protoc ols spec ific for beamf or ming antennas . Based on our discuss ion, w e argue that the tr aditional binary exponential backoff mechanis m limits the poss ible spatial r eus e and aggrav ates some beamfor ming-related pr oblems s uch as deafness and headof- line blocking. To gras p the trans miss ion oppor tunities offered by beamf or ming antennas , w e design an Opportunistic Direc tional MA C ( OPDMA C) pr otocol for multihop w ireless netw orks. The OPDMA C protocol employs a novel bac koff mechanis m in w hic h the node is not forced to undergo idle bac koff after a tr ans mission failur e but can rather take the oppor tunity of trans mitting other outstanding pac kets in other dir ections. This mechanis m minimizes the idle w aiting time and increases the channel utiliz ation significantly and ther eby enables OPDMA C to enhance the spatial r eusability of the w ireless medium and reduc e the impac t of the deafness problem w ithout additional over head. Thr ough ex tensiv e s imulations, w e demonstr ate that OPDMA C enhances the perfor mance in ter ms of throughput, delay, packet delivery r atio, and fairness. To further improv e its perfor mance, w e disc uss and evaluate the benef its of carefully choos ing s ome protoc ol parameters instead of using the default v alues commonly used by other direc tional MA C pr otocols.
INDEX TERMS Beamforming an tennas, medium access control , multihop wi reless networks, spatial reuse.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
QOS-AWARE ROUTING AND ADMISSION CONTROL IN SHADOW-FADING ENVIRONMENTS FOR MULTIRATE MANETS
ABSTRACT Pro vidi ng quali ty o f service (Qo S) assurances in a mobile ad h oc ne twork (MAN ET) is difficul t due to node mobili ty, con ten tion for ch annel access, a lack o f centrali zed co-o rdina tion, and the unrel iable nature o f the wire less channel . A QoS-aware rou ting (QAR ) p roto col and an admission control (AC) pro to col a re two o f the most importan t components of a s ystem attempting to pro vide Qo S guarantees in the face of the abo ve mentioned di ffi cul ties faced . Man y QAR and AC -based solutions ha ve been proposed , but such ne twork la ye r solutions are often d esigned and studie d wi th ideali zed lower la yer models in mind . This means tha t e xisting solutions are no t designed fo r dea ling wi th pra cti cal phenomena such as shadow fading and the link quali ty-dependen t fluctua tion o f link tra nsmission rates. This paper proposes and evalua tes new solutions for improvi ng the pe rfo rmance of QAR and AC p roto cols in the fa ce o f mobility, shadowing, and varying link SINR . It is fou nd tha t pro acti vel y main taining ba ckup ro utes fo r acti ve sessions, adapting transmission rates, and routi ng arou nd temporaril y low-SINR lin ks can noticea bl y impro ve the reliabil ity o f assured thro ughpu t services. INDEX TERMS Mu lti ra te mobile ad hoc ne tworks, quali ty o f service aware rou ting , admission control , shadowing /shadow fadi ng, gua ran teed th roughpu t.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
INDEX TERMS Routing , wireless ne tworks, mobile ad hoc ne two rks, multi cast, p ro tocol
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
THE HIDENETS HOLISTIC APPROACH FOR THE ANALYSIS OF LARGE CRITICAL MOBILE SYSTEMS
ABSTRACT Dealing with la rge , cri ti cal mobile systems and infrastructures where ongoing changes and resilience are paramount leads to ve ry comple x and di fficul t challenges for s ystem e valua tion . These challenges call for appro aches tha t are able to in tegra te se veral e valua tion methods for the quan ti tati ve assessment of QoS indi cators which ha ve been applied so far onl y to a l imited e xtent. In this paper, w e propose th e holisti c evaluation framework de velo ped during the recen tl y conclu ded FP6-H IDEN ETS project. It is based on abstracti on and decomposition, and i t e xploi ts the in tera ctions among diffe rent e valua tion te chniques including ana l ytical , simulati ve , and experimenta l measurement approa ches, to manage s ystem comple xity. The fe asibility o f th e holistic app roach for the anal ysis of a complete end-to -end scenario is first i llustra ted p resenting two e xamples where mobility simulation is used in combination wi th s tochasti c anal yti cal modeling , and then th rough the de velopment and implementati on o f an e va luation workflow in tegra ting se ve ral tools and model transforma tion s teps. INDEX TERMS Computer systems organi za tion , communication /ne tworking and informa tion technol og y, mobile computing, mobile communication s ystems, compu ting methodologies, simulation , modeling , and visuali za tion , model de velopment, modeling methodologies, compute r applications , mobile appli catio ns, pervasi ve computing .
NCCT
Promise for the Best Projects
INDEX TERMSBundle Pro tocol (BP), dela y-toleran t ne tworking (D TN), interpl anetary Inte rne t (IPN), Li cklide r Transmission Proto col con ve rgence la ye r (LTPCL), satelli te communications, Transmission Control Pro to col con vergen ce la yer (TCPCL ).
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
FAST SIMULATION OF SERVICE AVAILABILITY IN MESH NETWORKS WITH DYNAMIC PATH RESTORATION
ABSTRACT A fas t simulation tech nique based on importan ce sampling is de veloped fo r the anal ysis of pa th servi ce a vailabili ty in mesh ne tworks with d yn amic pa th restora tion . The method combines the simulation o f the pa th rerou ting algo rithm with a d ynamic path failu re importan ce sampling (DPFS) scheme to estimate path a vaila bilities e ffi cien tl y. In DPFS, the failu re ra tes of ne two rk elemen ts are biased at i ncre ased rates un til path failu res are observed unde r re routing. Th e simulated model uses failu re equi valence groups , wi th fini te /in fini te sources o f failu re e vents and fini te /in fini te pools of repair pe rsonnel, to fa cili tate the modeling o f bi-directional link failu res, multiple in-series lin k cu ts, op ti cal amplifi er failu res along links , node failu res, and more general geog raphi call y distribu ted failu re scenarios. The ana l ysis of a larg e mesh netwo rk e xample demonstra tes the p ractical ity o f the te chnique . INDEX TERMS Availabili ty, biasing, failu re , importance , mesh, model , ne two rk, pa th , res tora tion , risk, sampling, simulation .
NCCT
Promise for the Best Projects
EFFICIENT MULTIPATH COMMUNICATION FOR TIME-CRITICAL APPLICATIONS IN UNDERWATER ACOUSTIC SENSOR NETWORKS
ABSTRACT Due to the lon g propaga tion dela y an d high erro r ra te of a coustic channels, i t is ve ry challen ging to p ro vide reliab le da ta tra nsfer fo r time-criti cal appl ica tions in an energ y-e fficien t wa y. On the one hand, tradi tional re transmission upon failure usually in trodu ces ve ry large end-to -end dela y and is thus not proper fo r timecri tical servi ces. On the o the r hand, common approaches withou t re transmission consume lots of energ y. In this paper, we propose a new mul tipa th power-con trol transmission (MPT) scheme, whi ch can gua ran tee certain end-to-en d pa cke t e rror ra te while achie ving a goo d balance be tween the o verall ene rg y e fficien cy and the end -to end pa cke t dela y. MPT smartl y combines power con trol wi th multipa th rou ting and pa cke t combining at the destina tion . Wi th ca re full y d esigned power-con trol s tra tegies, MPT consumes much less energy than the con ventional one-pa th transmission scheme withou t re transmission. Besides, since no hop-by-hop re transmission is allowed, MPT in trodu ces much shorter d ela ys than the tradi tiona l one-p ath scheme with re transmission. We conduct e xtensi ve simulations to e valua te the performance of MPT. Our results show tha t MPT is high l y energ y-e fficien t wi th low end-to-end pa cke t dela ys . INDEX TERMS Ap plica tions, ene rg y e ffi ciency, ne two rk communica tions, underwa te r sensor networks.
NCCT
Promise for the Best Projects
p ro tocols,
coope rati ve
NCCT
Promise for the Best Projects
DELAY ANALYSIS AND OPTIMALITY OF SCHEDULING POLICIES FOR MULTIHOP WIRELESS NETWORKS
ABSTRACT We anal yze the dela y performance o f a multihop wireless network with a xed rou te between each source destina tion pair. We de velop a new queue grouping techniq ue to handle the comple x co rrela tions of the service process resulting from the multihop nature o f the rows. A gene ral set-based in terfere nce model is assumed that imposes constraints on links that ca n be served simultaneously a t an y gi ven time . These inte rfe rence co nstrain ts are used to obtain a fundamen tal lower bound on the dela y performance of an y sched uling poli cy for th e s ystem. We presen t a sys tematic me thodolog y to de ri ve such low er bounds. Fo r a special wireless system, namel y the clique , we design a poli cy tha t is sample-path dela yoptimal. Fo r th e tan dem queue network, whe re the dela y-op timal policy is known , the e xpected dela y o f the op timal policy numericall y coincides with the lower bound. We conduct e xtensi ve numerical stud ies to suggest tha t the a ve rage dela y o f the ba ck-pressure scheduling pol icy can b e made close to the lowe r bound b y using approp ria te fun ctions o f queue leng th. INDEX TERMS Dela y, d ynamic con trol , low con trol , L yapuno v anal ysis, Marko v chains, optimi za tion , qu eueing anal ysis, scheduling , wireless mesh netwo rk.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
Index Terms Li ve streaming, ne two rk archite cture , peer-to -peer (P2P) sys tem.
NCCT
Promise for the Best Projects
Index Terms Hardware -based packe t classifica tion , addressable memory (TC AM). range en-cod ing, terna ry con ten t
NCCT
Promise for the Best Projects CLOUD COMPUTING
NCCT
Promise for the Best Projects CLOUD COMPUTING
EXPLOIT ING DYN AM IC RESOURCE ALLOCAT ION FOR EFFICIENT PAR ALLEL DAT A PROCESSING IN THE CLOUD
Paralle l and D istr ibute d System s, IEEE Tr ansa ctions June 201 1
In recen t yea rs ad hoc parallel data pro cessing has emerged to be one of the killer appli cati ons for Infrastru cture-as-a -Se rvice (IaaS) clouds. Majo r Cloud computing companies have started to in tegra te frameworks fo r parallel da ta processing in their p roduct po rtfolio , making i t eas y fo r customers to a ccess these servi ces and to deplo y their p rograms. Howe ver, the pro cessing frameworks which are curren tl y used ha ve been designed for sta tic, homogeneous cluster se tups and disregard the particula r nature of a cloud. Consequentl y, the allo ca ted compu te resources may be inadequate fo r big pa rts of the submitted job and unnecessaril y in crease processing time and cost. In this paper, we discuss the opportuni ties and challenges fo r efficie nt pa rallel data pro cessing in clouds and present our research proje ct Neph ele. Neph ele is the fi rst da ta processing framework to e xp lici tl y e xploit the d ynamic resource allocation offered b y toda y's IaaS clouds fo r both , task scheduli ng a nd e xecu tion . Particula r tasks of a p rocessing job can be assigned to di ffe ren t types of virtual machines which are au tomatica ll y ins tantiated and te rminated d uring the job execu tion . Based on this new framework, we perfo rm e xten ded e valu atio ns of Ma pReduce -inspired pro cessing jobs on an IaaS cloud system and compare the results to the popula r data p rocessing framework H adoop .
NCCT
Promise for the Best Projects CLOUD COMPUTING
ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING
Paralle l and D istr ibute d System s, IEEE Tr ansa ctions May 2011
ABSTRACT
Cloud Computing has been envisioned a s the next-gene ration architec ture of IT Enterp ri se. It moves the application so ftwa re and databa se s to the cent ralized large data cente rs, whe re the management of the data and se rvice s ma y not be fully t ru stwo rthy . This unique paradigm brings about many ne w se curity challenges, which have not been well understood. Thi s wo rk studie s the problem of en su ring the integrity of data storage in Cloud Computing. In particular, we con sider the ta sk of allowing a third party audito r (TPA), on behalf of the cloud client, to ve rify the integrity of the d ynamic data sto red in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his da ta stored in the cloud are indeed intact, which can be important in achieving e conomies of scale for Cloud Computing. The suppo rt fo r data d ynamic s via the mo st gene ral form s of data ope ration, su ch a s bloc k modification, insertion, and deletion, is also a significant step to ward p racticality, since se rvice s in Cloud Computing are not limited to archive o r bac kup data only. While prio r wo rks on en suring remote data integrity often lac ks the support of either public auditability or d ynamic data operation s, thi s pape r a chieve s both. We first identify the difficultie s and potential se curit y problem s of dire ct exten sion s with fully dynamic data update s f rom prio r wo rks and then show ho w to con st ruct an elegant verification scheme fo r the seamle ss integration of the se t wo salient feature s in our p roto col de sign. In particular, to achieve ef ficient data dynamic s, we impro ve the e xi sting proof of sto rage model s by manipulating the classic Me rkle Ha sh Tree con st ru ction for bloc k tag authentica tion. To support efficient handling of multiple auditing tasks, we fu rthe r explore the technique of bilinear aggregate signature to extend our main re sult into a multiu ser setting, where TPA can perfo rm multiple auditing tasks simultaneously . Exten sive se curity and perfo rmance analy si s sho w that the p ropo sed scheme s a re highly efficient and pro vably se cure .
NCCT
Promise for the Best Projects CLOUD COMPUTING
HEURISTICS BASED QUERY PROCESSING FOR LARGE RDF GRAPHS USING CLOUD COMPUTING
Knowle dge a nd Data Engineer ing, IEEE Transactions on
ABSTRACT Semantic Web is an emerging area to augment human reasoning fo r whi ch va rious technol ogies are being develop ed. These technologi es have been standardi ze d b y W3C . One such standa rd is the RDF. Wi th the e xplosion of semanti c web technol ogies, large RDF gra phs are common place. Curren t frameworks do not scale for la rge RDF grap hs and as a result does not add ress these challenges. In this paper, we describe a framework tha t we buil t using Hadoop to store and retrie ve la rge numbers of RD F triples b y e xploi ting the cloud computin g pa radigm. We describe a scheme to sto re RD F da ta in Had oop Distribute d Fi le Sys tem. Mo re than one Hadoop job ma y be needed to answer a qu ery because a triple pattern in a query canno t ta ke part in more than one join in a H adoop job . To de te rmine the jobs, we p resent an algo rithm to g enera te qu ery plan , whose worst case cost is bounded , based on a greed y app roach to answer a SPAR QL query. We use Ha doop's MapRedu ce framework to answer the que ries. Our resul ts show that we can store large RDF g raphs in Hadoop clusters built with ch eap commodity class hardware . Furthermore , we show tha t our framework is scalable and efficient and ca n handle la rge amoun ts of RD F da ta , unli ke tradi tional app roaches .
NCCT
Promise for the Best Projects CLOUD COMPUTING
NCCT
Promise for the Best Projects
CLOUD COMPUTING
NCCT
Promise for the Best Projects CLOUD COMPUTING
ABSTRACT NoSQL Cloud data sto res pro vi de scalabili ty and high a vailabili ty prop erties fo r web applica tions, bu t a t the same time the y sacri fice data consisten cy. Howe ver, many applications canno t a ffo rd an y da ta inconsistency. CloudTPS is a scalable transaction manager, whi ch gua ran tees full AC ID properties for mul ti-i tem transactions issued b y Web appl ica tions, e ven in the presence o f serve r failu res and ne twork parti tions. We implement this approa ch on top o f the two main families of scalable da ta la yers: Bi gtabl e and SimpleDB. Perfo rmance e valua tion on top o f HBase (an open-source ve rsion of Big table ) in our local cluste r and Ama zon SimpleDB in the Ama zon cloud shows th at our s ystem scales linearl y a t least up to 40 nodes in our lo cal cluste r and 80 n odes in the Ama zon cloud .
NCCT
Promise for the Best Projects
ABSTRACT Researches on Loca tion-Based Service (LBS) ha ve been emerging in recen t ye ars due to a wide rang e of po ten tial appli catio ns. One o f the acti ve topics is the mining and predi ction o f mobile mo vements and associated transactions. Most o f existing studies focus on disco verin g mobile pa tte rns from the whole logs. Howe ver, this kind of pa tte rns may no t be p recise enough fo r p redictions since the di fferen tia ted mobile beha vio rs among users and temporal periods are no t considered. In this paper, we p ropose a no vel al gori thm, namel y, Cluste r-based Temporal Mobile Sequen tial Pa ttern Mi ne (C TMSP-Mine), to disco ver the Clusterbased Temporal Mobile Sequen tial Pa tterns (C TMSPs). Moreo ver, a pred iction strateg y is prop osed to p redict the subsequen t mobile beha viors. In CTMSP-Mi ne, user clus ters are constructed b y a no vel algori thm named Cluster-Obje ct-based Smart Clus ter Affini ty Se arch Technique (C O-Smart-C AST) and similarities between users are e valu ated b y the proposed measure, Location Based Se rvice Alignment (L BS-Alignmen t). Me anwhile , a time segmentation a pproa ch is presented to find segmenting time intervals where similar mobile characteristics e xist. To ou r best knowle dge, this is the first work on mining and p rediction o f mobile beha viors wi th consideratio ns of user relati ons and temporal prope rty simultaneousl y. Through e xperimen tal evaluation under vari ous simulated condi tions, the prop osed methods are shown to deli ve r e xcel lent pe rfo rmance .
NCCT
Promise for the Best Projects
COSDES: A COLLABORATIVE SPAM DETECTION SYSTEM WITH A NOVEL E-MAIL ABSTRACTION SCHEME
Knowle dge a nd Data Engineer ing, IEEE Transactions May 20 11 ABSTRACT E-mail communication is indispensable nowada ys, bu t the e -mail spam problem continu es growing drasticall y. In recen t yea rs, the no tion of colla bora ti ve spam fil tering wi th nea r-dupli ca te similarity matching scheme has been widel y discussed. The primary i dea of the similarity matching scheme fo r spam detection is to maintain a kno wn spam database, fo rmed b y user feedback, to block subsequent near-dupli ca te spams. On purpose of achie ving efficie nt similarity matching and reducing sto rage utili za tion , prior works mainly rep resent ea ch e -mail b y a succinct Abstraction deri ved from e-mail con ten t te xt. H owe ve r, these Abstractions of e-mails canno t full y catch th e e vol vi ng natu re of spams, and are thus no t effecti ve enough in near-dupli ca te d ete ction. In this paper, w e prop ose a no vel e-mail Abs traction scheme, whi ch considers email la yout stru cture to rep resent e-mails. We p resent a procedu re to gen era te the e-mail Abstraction using HTML co nten t in e-mail , and this newl y de vised Abs traction can more e ffecti vel y capture the near-duplica te phenomenon o f spams. Mo reo ve r, we design a comple te spam detection s ystem Cosdes (standing fo r COllabo rati ve Spam DEtection System), w hich p ossesses an effi cient nearduplica te ma tching scheme and a pro gressive upda te scheme. The p rogressi ve upda te scheme enables system Cosdes to kee p the most up -to date in fo rmation fo r nea r-dupli ca te de tection . We e valua te Cosdes on a li ve da ta set colle cted from a real e-mail serve r and show tha t our sys tem outpe rforms the prior appro aches in de tection results and is appli cable to the real w orld .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
ABSTRACT As a model fo r knowledg e descrip tion and formali za tion , on tologies are widel y used to rep resent user pro files in pe rsonali zed web information ga the ring. Howe ver, wh en re presentin g user p ro files, man y models ha ve u tili zed onl y knowledge from either a global kno wledge base or a user local informati on. In this paper, a personali zed on tolog y model is proposed for know ledge representa tion and re asoning o ver user p ro files. This model learns ontological user pro files from both a wo rld knowledge base and user local instan ce re positories . Th e on tolog y model is e val uate d b y comparing i t against ben chmark models in web in fo rmation g athe ring . The results show tha t this on tolog y model is successful .
NCCT
Promise for the Best Projects
ABSTRACT The Machine L earning (ML ) field has gained i ts momentum in almost an y domain of research and just recen tl y has become a reliable tool in the medical d omain. The empiri cal domain o f automa tic learning is used in tasks such as medical decision support, medical imaging , protein -pro tein in tera ctio n, e xtra ction o f medical know ledge , an d for o verall pa tien t management care . ML is en visioned as a tool b y which compu ter-based systems can be integra ted in the heal th care field in orde r to ge t a be tter, more e fficie nt medical ca re. This paper describes a ML-based meth odolog y for b uilding an appli ca tion tha t is capable of iden ti fyin g and disseminating heal thca re in fo rmation . It e xtra cts sente nces from published medical pape rs tha t menti on diseases and trea tments, and iden ti fies semantic relati ons that e xist betwe en diseases and trea tments. Our e valu ation results for these tasks show that the pro posed methodolog y obtains reliab le ou tcomes tha t could be in teg ra ted in an applica tion to be used in the medical care domain. The po ten tial value of this paper stands in the ML settings th at w e propose and in the fa ct th at we outperform pre vious results on the same data set.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
CLASSIFICATION AND NOVEL CLASS DETECTION IN CONCEPT-DRIFTING DATA STREAMS UNDER TIME CONSTRAINTS
Knowle dge a nd Data Engineer ing, IEEE Transactions June 2 011 ABSTRACT Mos t e xisti ng da ta stre am classifica tion techniqu es ignore one importan t aspect of stream data : arri val o f a no vel class. We add ress this issue and propose a data stream classificatio n te chnique tha t integ ra tes a no vel class detection mechanism into tradi tional classifiers, enablin g automati c dete ction of no vel cl asses before the true labels o f th e no vel class instan ces arri ve . No vel class detection prob lem becomes more challenging in the presence o f concep t-d rift, when the underl ying data distribu tions e vol ve in streams. In order to determine w hethe r an instan ce belo ngs to a no vel class, the classifica tion model sometimes needs to wait for more test instances to disco ve r similarities among those insta nces. A ma ximum allowable wai t time Tc is imposed as a time constrain t to classify a test instan ce. Furthe rmore, most e xisting stream classification app roaches assume that th e true label o f a da ta poin t can be accessed immediately afte r the data poin t is classified . In reali ty, a time del a y Tl is in vol ve d in obtai ning the true label o f a data poin t since manual labeling is time consuming. We show how to make fas t and correct classificati on decisions under these constrain ts and appl y them to real benchmark da ta . Comparison wi th sta te-o f-the -art stream classifica tion techniq ues pro ve the superio rity of ou r approa ch.
NCCT
Promise for the Best Projects
ANOM ALY DETECTION IN NET WORK TRAFFIC BASED ON ST ATISTICAL INFERENCE AND ALPHA-ST ABLE MODELING
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions: July -A ug. 2011
ABSTRACT This paper proposes a no vel method to detect anomalies in network traffi c, based on a nonrestricted -stable first-orde r model and sta tisti cal h ypo thesis testing . To this end, we gi ve statis tical e vidence tha t th e marginal distribu tion o f rea l traffi c is adequatel y modeled with -stabl e fun ctions and classify tra ffic pa tterns b y means of a Gene rali zed Li kelihood Ra tio Test (GLRT). The method au tomatica ll y chooses tra ffic windows used as a reference , which the tra ffic window und er test is compared wi th , wi th no e xpert in terven tion nee ded to tha t end . We fo cus on dete cting two anomal y types, namel y floods and flashcrowds, which ha ve been frequen tl y studi ed in the li tera ture. Performance o f our dete ction method has been measured through Recei ve r Opera ting Cha racteris tic (R OC) curves and results indica te that ou r method outperfo rms the closel y-rela ted sta te-o f-the -art con tri butio n described in . Al l e xperiments use traffi c data colle cte d from two rou ters at our uni ve rsity-a 25,000 studen ts institu tion-w hich pro vide two di fferen t le vels of tra ffi c aggrega tion fo r our tests (tra ffic a t a p articula r school an d the whole uni versity). In addi tion , the tra ffic model is tested with publicl y a vailable tra ffic traces. Due to the comple xi ty o f -sta ble distribu tions, care has been taken in designing appropria te numerical algo ri thms to deal wi th the model .
NCCT
Promise for the Best Projects
ABSTRACT Ove r the past de cade , loca l monitoring has been shown to be a po werful techniq ue fo r impro ving securi ty in multiho p wireless sensor networks (WSNs). Indeed , lo cal monito ring-based securi ty algo ri thms are becoming the most popular too l for p ro viding secu rity in WSNs. Howe ver, local monitoring as it is currentl y pra cti ced is costl y in terms of energ y consumption, a major d rawback fo r energ y-constrain ed systems such as WSNs. In WSN en vi ronments, the sca rce power resources are typical l y add ressed through sleep-wa ke scheduling o f the nodes. Howe ver, sleep-wake schedul ing te chniques in WSNs are vulnera ble e ven to simple attacks. In this paper, a ne w technique is proposed th at promises to allow operati on o f WSNs in a manner tha t is bo th ene rg y-e ffi cien t and secure . The proposed te chnique combines local moni toring wi th a n o vel , more secu re form o f sleep-wake sched uling . The la tte r is a new methodolog y dubbed Elmo (Energ y Awa re Local MOni to ring in Sensor Ne tworks), which enables sleep-wa ke management in a secure manner even in th e fa ce o f ad ve rsarial nodes tha t choose no t to awaken nodes responsible fo r moni toring thei r tra ffic. An a nal ytical p roo f is gi ven showing tha t securi ty co ve rage is not wea kened under Elmo. Moreo ver, ns-2 simulation results show tha t the performance o f lo cal monitoring is practi call y unchan ged, while energ y sa vings o f 20 to 100 times are achie ved , depending on the scenario .
NCCT
Promise for the Best Projects
EFFICIENT FAULT DETECTION AND DIAGNOSIS IN COMPLEX SOFTWARE SYSTEMS WITH INFORMATIONTHEORETIC MONITORING
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions on
ABSTRACT Ma nagement metrics o f comple x software sys tems exhibi t stable co rrel ations which can enab le faul t de te ctio n and diagnosis. Cu rren t approa ches use specifi c anal yti c fo rms, typi call y linea r, for modeling correla tions. In practice , more complex nonline ar rela tionships exist be tween metrics . Moreo ver, most interme tric corre latio ns form clusters ra ther than simple pa irwise correlations. These clusters pro vi de additi onal info rmation and o ffer the possibility fo r optimi za tion . In this pape r, we address these issues b y using No rmali zed Mu tual In formation (N MI) as a similarity measure to iden ti fy clusters o f correla ted metrics, wi thou t assuming any speci fic form fo r the me tric rela tionships. We show how to ap pl y the Wilco xon Ran k-Sum test o n the en trop y measures to de tect errors in the s ystem. We also present th ree diagnosis algorithms to loca te faul ty componen ts: RatioScore , based on th e Ja cca rd coe fficie nt, SigScore , whi ch in corpo rates knowledge o f componen t dependen cies, and Ba yesianScore , whi ch uses Ba yesian in fe rence to assign a faul t probabil ity to ea ch component. We e valu ate ou r approach in the conte xt of a comple x en terp rise applica tion , and show that 1 ) stable , nonlinea r correla tions e xist and can be cap tured w ith ou r approach ; 2 ) we can de tect a l arge fra ction o f faul ts with a low false positi ve ra te (we dete ct u p to 18 o f the 22 faul ts we injected); and 3 ) we impro ve the diagnosis with our new diagnosis algo rithms.
NCCT
Promise for the Best Projects
ABSTRACT
Suppose Alice owns a k-anon ymous da tabase and needs to de termine wh ethe r her datab ase, when inserted with a tuple ow ned b y Bob , is still k-anon ymous. Also , suppose that a ccess to the da tabase is strictl y con trolled , because fo r example data are used for certain e xpe riments tha t need to be maintained confide ntia l. Clearl y, allowing Alice to directl y read the con ten ts of the tuple b reaks the p ri vacy of Bob (e .g., a pa tien t's medical record); on the o the r hand , the con fiden tiali ty o f the datab ase managed by Al ice is viola ted once Bob has access to the con tents of the da tabase. Thus, the problem is to che ck whe ther the datab ase inserted wi th the tuple is still k-anon ymous, with out le ttin g Ali ce and Bob know the con ten ts o f the tuple and the da tabase, respecti vel y. In this paper, we p ropose two pro tocols solving this problem on suppression-based and generaliza tion -based k-anon ymous and confide ntia l da tabases. The pro toco ls rel y on well-known cryptographi c assumptions, and we pro vide theore ti cal anal yses to p roo f their soundness and e xpe rimental results to illustra te thei r effi ciency.
NCCT
Promise for the Best Projects
ABSTRACT In this pape r, we fo rmulate an anal yti cal model to cha racteri ze the spread o f malware in de centrali zed, Gnute lla type peer-to-pee r (P2P) ne tworks and stud y the d ynamics associated with the spread of malware . Using a compartmental model, we deri ve the s ystem paramete rs or netw ork condi tions under whi ch the P2P network ma y rea ch a malware free equ ilibrium. The model also e valua tes the e ffect o f con trol stra tegies like node quaran tine on stifling the spread o f malware. The model is then e xtended to consider the impact of P2P ne two rks on the malware spre ad in ne two rks o f smart cell phones.
NCCT
Promise for the Best Projects
ABSTRACT In this work, a scheme for ke y distri butio n and netw ork access in a Wi reless Sensor Netw ork (WSN) tha t u tili zes Iden ti ty-Based Cryp tog raph y (IBC) is presented . The scheme is anal yzed on the AR M92 0T p rocessor and measurements were taken fo r the run time and ene rg y o f i ts componen ts. It was found tha t the Ta te pairing componen t o f the scheme consumes significan t amounts of energ y, and so should be ported to ha rdware. An a ccele rato r was implemented in 65 nm Complementary Me tal Oxide Sili con (C MOS) technolo g y a nd a rea, timing, and ene rg y figures ha ve been ob tained fo r the design . Results indica te tha t a ha rdware implementati on o f IBC would meet the stri ct ene rg y cons train t requi red of a wireless sensor netwo rk node .
NCCT
Promise for the Best Projects
REPLICA PLACEMENT FOR ROUTE DIVERSITY IN TREE-BASED ROUTING DISTRIBUTED HASH TABLES
Depe nda ble and Sec ure Com puting, IEEE Tra nsactions on Iss ue Date: MayJune 20 11
ABSTRACT Distribu ted hash tables (DH Ts) share storage and rou ting responsibility among all nodes in a peer-to-p eer ne twork. Th ese netwo rks ha ve bound ed pa th leng th unlike unstructu red ne two rks. Unfo rtunatel y, nodes can den y a ccess to ke ys o r misroute loo kups. We address both o f these problems throu gh repli ca placement. We cha racteri ze tree -based routing DHTs and de fine Ma xDisjoint, a repli ca placement tha t creates route di versity for these DHTs. We pro ve tha t this placement cre ates disjoint routes and find the replication deg ree ne cessary to produce a desired number o f disjoint rou tes. Using simulations of Pastry (a tree-b ased routi ng DHT), we e valua te the impact of Ma xDisjoin t on routing rob ustness compared to other placements when nodes are compromised at ra ndom or in a con tiguous run . Furthermore , we co nsider ano ther rou te di ve rsity mecha nism that we call neighbor set rou ting a nd show that, w hen used wi th ou r repl ica pla cement, i t can successfully rou te messages to a correct re plica e ven wi th a quarte r of the nodes in the s ystem compromised a t random. Finall y, we demonstra te a famil y o f repl ica que ry stra tegies tha t can trade o ff response time and sys tem load. We p resent a h ybrid query strateg y tha t keeps response time lo w wi thou t produ cing too high a loa d.
NCCT
Promise for the Best Projects
ROBUST CORRELATION OF ENCRYPTED ATT ACK TRAFFIC THROUGH STEPPING STONES BY FLOW WAT ERM ARKING
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions May-June 2011 ABSTRACT
Netwo rk-ba sed intrude rs seldom attac k their victims direc tly f rom their o wn compute r. O ften, they stage their attac ks th rough intermediate stepping stone s in orde r to conceal their identity and origin. To identify the source of the at tac k behind the stepping stone (s), it i s ne ce ssa ry to correlate the incoming and outgoing flows o r conne ction s of a stepping stone. To re si st attempt s a t co rrelation, the atta c ke r may enc rypt or otherwi se manipulate the connection t raffic. Timing-ba sed co rrelation approache s have been shown to be quite effe ctive in correlating encryp ted connection s. Ho weve r, timing-ba sed co rrelation approache s a re subject to timing perturbation s tha t may be deliberately int roduced b y the atta c ke r at stepping stone s. In this paper, we p ropo se a novel wate rmark-ba sed -co rrelation scheme that i s de signed spe cifically to be robu st again st timing perturba tion s. Unlike mo st p reviou s timing-ba sed correlation approache s, ou r wa terma rk-ba sed app roach i s a ctive in that it embeds a unique waterma rk into the enc rypted flows b y slightly adju sting the timing of selected pac ket s. The unique watermark that i s embedded in the encrypted flow give s us a number of advantage s over pa ssi ve timing-ba sed correlation in re si sting timing perturbation s by the atta c ke r. In contra st to the exi sting passi ve co rrelation approache s, ou r ac tive wate rmark-ba sed co rrelation does not ma ke any limiting assumption s about the distribution or random pro ce ss of the original interpac ket timing of the pac ket flow. In theory, ou r wate rmark-ba sed correlation can achieve arbitra rily clo se to 100 percent correlation true po sitive rate (TPR), and a rbitra rily clo se to 0 percent fal se po sitive rate (FP R) at the same time for sufficiently long flows, de spite arbit ra rily large (but bounded) timing pertu rbation s of any di stribution by the attac ker. Our paper i s the first that identifies 1 ) accu rate quantitative tradeoff s bet ween the achievable correlation effectivene ss a - - nd the defining characte ri stic s of the timing perturbation; and 2) a provable upper bound on the number of pac ke t s needed to achieve a de si red co rrelation effectivene ss, given the amount of timing perturbation. Experimental re sult s show that our a ctive waterma rk-ba sed correlation perfo rm s bette r and require s fe we r pac ket s than exi sting, pa ssive timing-ba sed correlation methods in the pre sence of random timing pertu rbation s.
NCCT
Promise for the Best Projects
ABSTRACT In terne t performance measurement is commonly percei ved as a high-cost control-pla ne acti vi ty and un til now it has tended to be implemented on top o f the network's forwa rding ope ratio n. Consequen tl y, measurement mechanisms have often had to trade rel e vance and accu racy o ver non-i ntrusi veness and cost effecti veness. In this pape r, we p resent the software implementation o f an in-l ine measurement mechanism that uses nati ve structures o f the In te rnet Proto col version 6 (IPv6 ) stack to pigg yback measurement in formation on da ta-carrying tra ffic as this is routed be tween two poin ts in the ne two rk. We care full y e xamine the o verhea d associated with bo th the measurement process and the measurement da ta , and w e demonstra te tha t dire ct two -poin t measurement has minimal impact on throug hput and on s ystem p rocessing load . The results of this paper show tha t adequatel y engineered measurement mechanisms that e xploi t selecti ve pro cessing do not compromise the network's forwa rding e fficie ncy, a nd can be depl o yed in an alwa ys -on manner to re veal the true pe rfo rmance of ne twork tra ffi c o ver small timescales.
NCCT
Promise for the Best Projects
ABSTRACT Since th e earl y 1990s, there ha ve been se veral a ttempts to secure the Simple Network Man agement Pro tocol (SN MP). The thi rd ve rsion of the p ro tocol , published as full standard in 2002 , i ntroduced the User-based Secu rity Model (USM), whi ch comes with i ts own user and ke y-management in frastructure . Since then , ne twork opera to rs ha ve repo rte d tha t depl o ying ano the r user and ke y management infrastru ctu re to secure SN MP is e xpensi ve and a reason to no t deplo y SN MPv3 . This paper describes how e xisting securi ty p ro tocols ope rating abo ve the transport la yer and b elow appli catio n pro toco ls can be used to secu re SN MP. These pro tocols can take ad van tage o f alre ad y d eplo yed ke y management infrastructu res tha t are used for o the r ne twork management in terfaces and hen ce their use can redu ce the ope ra tional costs associa ted with securing SN MP. Our main con tribu tion is a deta iled performance anal ysis of a p rototype implementation , comparing the pe rfo rmance o f SN MPv3 o ver SSH , TLS, and DTLS with oth er versions of SN MP. We a lso discuss the differe nces between the va rious op tions to secure SN MP and pro vide gui delines fo r choosing solutions to implement or deplo y.
NCCT
Promise for the Best Projects
ABSTRACT While pee r-to-pe er ne tworks are mainl y used to loca te uni que resources across the In te rnet, new interesting deplo ymen t scenarios are emerging. Pa rticula rl y, some applications (e.g ., VoIP) are proposing the crea tion o f o verla ys for the locali za tion o f services b ased on equi va lent serva nts (e .g., voi ce rela ys). This paper e xplores th e possible ove rla y a rchi te ctu res tha t ca n be adop ted to pro vide such servi ces, showing how an u nstru ctu red solution based on a scalefree o verla y topolog y is an effe cti ve op tion to deplo y in this con te xt. Consequentl y, we propose EQU ATOR (EQUi valen t servAn t loca TOR), an unstructure d o verla y implementing th e abo ve mentioned op era ting principles, based on an overla y cons truction algo ri thm tha t well appro ximates an ideal scalefree construction model. We present bo th anal yti cal an d simulation results whi ch support our o ve rla y topolog y selection and va lidate the pro posed archi tecture .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
THROUGHPUT OPTIMIZATION IN MULTIHOP WIRELESS NET WORKS WITH MULT IPACKET RECEPTION AND DIRECTIONAL ANTENN AS
Paralle l and D istr ibute d System s, IEEE Tr ansa ctions July 201 1
ABSTRACT Recent ad vances in the ph ysical la yer ha ve e nabled the simultaneous recep tion of multipl e packets b y a node in wire less networks . We address the th roughpu t optimi za tion problem in wireless networks that support multipacket re cep tion (MPR ) capab ility. Th e problem is modeled as a joint rou ting and sched uling problem, which is known to be N P-hard. The scheduling subproblem deals with finding the optimal schedulable sets, which a re de fined as subsets of lin ks tha t can be scheduled o r a cti va ted simultaneously. We demonstrate tha t an y soluti on of the scheduling subproblem can be bui lt with |E| + 1 or fewe r schedulable sets, whe re |E| is the number o f links o f the ne twork. This result is in contras t with p re vious works tha t sta ted that a soluti on of the scheduling subproblem is composed of a n e xpo nenti al number o f schedu lable sets. Due to the hardness of the problem , we p ropose a pol ynomial time scheme based on a combination of linear programming and appro ximation algo rithm paradigms. We ill ustra te the use o f the scheme to s tud y the impact o f design paramete rs on the pe rfo rmance o f MPR-capable ne two rks, including th e number o f transmit interfa ces, the beamwid th, and the re cei ve r range o f the an tennas.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
ABSTRACT Ma n y communica tion s ystems, networks. For such netwo rks, pre ven ting malicious atta cks or neighboring nodes followin g thei r e.g ., in tern et, can be modeled as comple x immuni zation stra tegies are necessary fo r vi ruses being percolated from a node to its connecti vities.
In re cen t years , various immunizatio n stra tegies ha ve been p roposed and demonstrated , most of which rest on the assumptions that the stra tegies can be execu ted in a cen tra li zed manner and /or tha t the comple x ne twork a t hand is reasonabl y s table (i ts topolog y will no t chan ge o vertime). In o the r wo rds, i t would be di fficul t to appl y them in a de centrali ze d ne twork en vironment, as often fou nd in th e rea l wo rld. In this paper, we p ropose a decentrali zed and scalable immuniza tion stra teg y based on a self-organi zed computing approa ch called au tonom y-o riented computing (AOC ) [1 ], [2 ]. In this strateg y, au tonomous behavior-b ased entities are deplo yed in a decen trali zed network, and a re ca pable o f collecti vel y finding those nodes wi th high degrees o f conducti vi ties (i .e., those tha t can readil y sprea d viruses). Through e xpe riments in vol ving bo th s yn the tic an d real -world networks , we demonstrate tha t this stra teg y can e ffecti vel y and e fficien tl y lo ca te highl yconnected nodes in dece ntrali zed comple x ne twork en vi ronments of various topologies, and i t is also scalable in handli ng la rge-scale de cen trali zed netw orks. We ha ve compared our stra teg y w ith some of the well -know n stra tegies, incl uding acquain tance and co vering stra tegies on bo th s yn the tic and real-wo rld networks .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
A DATA THROUGHPUT PREDICTION AND OPTIMIZATION SERVICE FOR WIDELY DISTRIBUTED MANY-TASK COMPUTING
Paralle l and D istr ibute d System s, IEEE Tr ansa ctions June 201 1 ABSTRACT In this paper, we p resent the design and implementa tion of a n applica tion -la ye r data th roughpu t p rediction and optimi za tion servi ce for man y-task computing in widel y distribu ted en vi ronments. This service uses multiple parallel TCP streams to impro ve the e nd-to-end throu ghpu t o f da ta transfers . A n o vel mathema tical model is de veloped to de te rmine the number o f pa rallel streams, requi red to achie ve the best ne twork pe rfo rmance . This model can predict the optimal number of paral lel streams with as few as th ree pred iction points. We implement this new service in the Stork Data Scheduler, where the prediction poin ts can be ob tained using Ipe rf and Grid FTP samplings. Our results show tha t the predi ction cost plus the op timi zed trans fer time is much less than the nonop timi zed transfer time in most cases. As a resul t, Stork da ta transfe r jo bs with op timi zation servi ce can be completed much earlier, compared to nonop timi zed data trans fer jobs.
NCCT
Promise for the Best Projects
ABSTRACT While the cap abili ty o f computing sys tems has been increasing at Moo re 's Law, the amoun t o f digi tal da ta has been increasing e ven fas ter. There is a growing need for s ystems tha t can manage and ana l yze very large da ta sets , pre ferabl y on shared-n othin g commodity sys tems due to th eir low e xpense . In this paper, we describe the design and implementa tion of a distributed file system calle d Se ctor an d an associated p rogramming framework called Sphe re tha t processes the data managed by Sector in paralle l. Sph ere is designed so tha t the p rocessing of da ta can be done in place o ver the da ta whene ve r possible. Sometimes, this is called data locality. We describ e the dire cti ves Sphere supports to impro ve da ta lo cali ty. In our e xpe rimental studies, the Se ctor/Sphe re system has consistentl y pe rformed abou t 2 -4 times faster than Hadoop , the most popular system for pro cessing very l arge da ta sets.
NCCT
Promise for the Best Projects
NONLOCAL PDES-BASED MORPHOLOGY ON WEIGHTED GRAPHS FOR IMAGE AND DATA PROCESSING
Ima ge Pr ocess ing, IEEE Tra nsactions on Is sue Da te: June 2011
ABSTRACT Ma thema tical morpholog y (MM) offe rs a wide range o f opera tors to a ddress va rious image processing problems. These operators can be defined in te rms of algebraic (discre te ) sets or as partial di fferen tial equa tions (PD Es). In this paper, we introduce a nonl ocal PDEs-based morphologi cal framework de fined on weighted graphs. We present and anal yze a set of opera tors tha t leads to a famil y o f discreti zed morphological PDEs on weighte d graphs. Ou r fo rmulation in trodu ces nonlocal patch -based con figu ra tions fo r image p rocessing and e xtends PDEs-based approach to the p rocessing of arbi tra ry da ta such as nonuniform high dimensional data . Finall y, we show the p oten tiali ties of ou r methodolog y in orde r to p rocess, segment and classify images and arbi tra ry da ta .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
Abstrac t Human observers understand the con tent o f an image i ntui ti vel y. Based upon image conten t, the y pe rfo rm many image-rela ted tasks, such as crea ting slide shows and photo albums, and organi zing their image archi ves. Fo r e xample , to select photos fo r an album, people assess image quality based upon the main objects in the image. The y modify colo rs in an image based upon the color o f importan t objects, such as sky, grass or skin. Serious pho tog raphers might modify each object separatel y. Pho to appl ica tions, in con trast, use low-le vel descrip to rs to guide similar tasks. Typical descrip tors, such as color histog rams, noise level , JPEG arti facts and o verall sharpness, can guide an imaging applica tion and safegua rd against blu nders. Howe ver, th ere is a gap between the outcome of such opera tions and the same task pe rfo rmed b y a pe rson. We belie ve that the gap can be b ridged b y automati call y unde rstanding the con ten t of the image. This paper presents algorithms for automa tic ta gging of percep tual objects in images, including sky, skin , and foliage , whi ch constitu tes an important step toward this goal .
NCCT
Promise for the Best Projects
ABSTRACT This paper presents a techn ique fo r motion dete ction tha t inco rpora tes seve ral inno vati ve mechanisms. For e xample , our proposed techni que stores, for ea ch pi xel, a set o f values taken in the past a t th e same location o r in the neighborhood . It then compares this set to the current pi xel value in orde r to determine whe ther tha t pi xel belongs to the background , and adap ts the model b y choosing ra ndoml y whi ch values to substi tute from the ba ckground model. This approa ch di ffe rs from those based upon the classical belie f that the oldest va lues should be replaced first. Finall y, when the pi xel is found to be part of the backgro und, i ts value is propagated in to the background model of a neighbo ring pi xel. We descri be our method in ful l de tails (incl uding pseudo-code and the paramete r va lues used) and compare i t to o ther background subtra ction techni ques. Efficie ncy figures show that our method ou tperforms recen t and pro ven sta te -ofthe-a rt meth ods in te rms of bo th computa tion speed and dete ction ra te . We also anal yze the p erformance o f a downscaled version o f our alg ori thm to the absolute minimum of one comparison and on e b yte of memory per pi xel . It appears tha t e ven such a simplified version o f ou r algorithm perfo rms bette r than mainstream te chniques.
NCCT
Promise for the Best Projects
CONTEXTUAL KERNEL AND SPECTRAL METHODS FOR LEARNING THE SEMANTICS OF IMAGES
Ima ge Pr ocess ing, IEEE Tra nsactions on Is sue Da te: June 2011
Abstrac t This paper p resents con te xtual kern el and spectral methods fo r lea rning the semantics of images that allow us to automaticall y ann ota te an image with ke ywords . Fi rst, to e xploi t the conte xt of visual words wi thin images for au tomati c image annota tion , we de fine a n o vel spatial strin g ke rnel to quan ti fy the similarity between images. Speci ficall y, we represen t each image as a 2-D sequence of visual words and measure the similarity be tween two 2 -D sequences using the shared o ccurrences of s -length 1-D subsequences by decomposing each 2-D sequence into two orthogo nal 1-D sequences. Based on ou r p roposed spatial string kernel, we further fo rmulate automa tic image ann ota tion as a con te xtual ke ywo rd propaga tion problem, whi ch can be sol ved very effi cientl y b y linea r p rogramming. Unlike the traditi onal rele vance models tha t trea t each ke yword inde penden tl y, the p roposed conte xtual kernel method for ke ywo rd propaga tion takes in to accoun t the semantic con te xt o f ann ota tion ke yw ords and p ropaga tes multiple ke ywords simultaneousl y. Signifi can tl y, this type o f semantic con te xt can also be in corpo ra ted in to spectral embedding for refining the anno ta tions of images predicted b y ke ywo rd propaga tion . Expe riments on th ree standa rd image datasets demonstra te that ou r conte xtual ke rnel and spectral methods can a chie ve significa ntl y be tte r results than th e state o f the a rt.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
ABSTRACT Wi th the emergence o f high da ta ra te sensor network appli cations, the re is an increasing demand for high-perfo rmance query services. To meet this challenge , we propose D ynamic Conflict-free Qu ery Sch eduling (DCQS), a no vel sched uling techniq ue fo r qu eries in wi reless sensor netw orks. In con tras t to ea rlier TD MA p ro tocols designed for gen eral -purpose workl oads, DCQS is speci ficall y designed for que ry services in wirel ess sensor networks. DCQS has se ve ral unique fe atu res. First, i t op timizes the query performance thro ugh con flict-free transmission scheduling based on the temporal p roperties o f queries in wireless sensor networks. Seco nd, i t can adap t to workload changes withou t e xpli citl y reconstructing the transmission schedule. Furthermore , DC QS also pro vides predictable perfo rmance in terms of the maximum achie va ble que ry ra te . We p ro vid e an anal yti cal capaci ty bound fo r DCQS tha t e nables DC QS to handle o ve rload th rough ra te con trol. NS2 simulations demonstrate tha t DC QS significan tl y ou tpe rforms a representa ti ve TD MA pro tocol (DR AND) and 802 .11b in te rms of query la tency and through put.
NCCT
Promise for the Best Projects
COOPERATING WITH SMARTNESS: USING HETEROGENEOUS SMART ANTENNAS IN MULTI-HOP WIRELESS NETWORKS
Mobile C om puting, IEEE Tra nsactions Fe br uary 2011 ABSTRACT The use o f smart an tennas in multi-h op wi reless netwo rks (MWNs) has garne red significan t atten tion o ver the last few yea rs. While homogeneous MWNs wi th all nodes havi ng the same antenna capabili ties will ha ve ce rtai n applica tions , we argue that MWNs with nodes ha ving he te rogeneous an tenna ca pabili ties are more likel y to be the norm due to a vari ety o f moti vati ng fa cto rs. In the con te xt o f such heterogeneous smart ante nna ne tworks (HSANs), we in vestiga te and moti va te the need for a simple form o f node coope ra tion called retransmit diversity. We show that while such a simple form of node coopera tion cannot bring significan t bene fi ts to homogeneous omni-directional an tenna networks, th e y can bring g rea t gains to hete rogeneous smart an tenna ne two rks. We then p resent se ve ral ke y pro perties pertaining to n ode coop era tion in HSANs along with anal yti cal reasoning. In th e process, we identi fy a fundamental trade off be tween e xploiting smart an tenna gai n and co opera tion gai n, tha t unde rmines the abili ty o f H SANs to le verage node co opera tion to thei r ma ximum po ten tial . To address this tra deoff, we then present a n adapti ve coo pera tion mechanism and incorp ora te this mechanism through the design o f a simple but e ffi cien t MAC proto col . The perfo rmance o f th e MAC pro tocol is e valua ted through ns2 simulations along with a realisti c ph ysical la ye r channel model fo r smart an tenna en vironmen ts.
NCCT
Promise for the Best Projects
ABSTRACT IEEE 802 .11 WL ANs are becoming more and more popular in homes and urban areas. As compared to tradi tional WL AN se tups (such as in campuses) where knowledgeable ne twork administra to rs can make cen trali zed decisions on channel selection , access points (APs) in these networks are o ften deplo yed b y network non-specia lists in an uncoordin ated manner, leadin g to unpl anned topolog y, in terfe rence and there fore unsa tisfactory th roughpu t performance . We consider i n this pape r a distrib uted channel uncoordina ted WL ANs, where APs can self-con figure minimize interfe rence wi th adjacen t APs. We fi rst problem on channel assignment which o vercomes encoun tered b y un coordina ted WL ANs. assignment algori thm fo r their ope rating channels to fo rmulate the op timi za tion some of the weaknesses
We show tha t th e problem is NP-hard , and propose an efficien t, simple and distribu ted algori thm termed C AC AO (Cli ent-Assisted Channel Assignment Op timization ). In C AC AO, the clien ts feed back thei r tra ffi c info rmation to thei r APs. Th is leads to bette r knowledg e about ne twork en vi ronment and be tte r channel assignment decisions a t the APs. We condu ct e xtensi ve simulation stud y a nd comparisons using Network Simulato r 2 (NS2). Ou r results show that C AC AO ou t-pe rfo rms other trad ition al and recen t schemes in terms of TC P and UD P throug hputs wi th a similar le vel o f fairness. Furthermore , i t con verges qui te fas t and redu ces co-cha nnel in terferen ce significan tl y.
NCCT
Promise for the Best Projects
SCHEDUL ABILITY AN ALYSIS FOR H ARD NET WORK LIFETIM E WIRELESS SENSOR NET WORKS WITH HIGH ENERGY FIRST CLUSTERING
Reliability , IEEE Tra nsactions Apr il 2011
ABSTRACT Network li fetime pred ictabili ty is an essential system requi rement for the type o f wireless sensor network (WSN) used in safe ty-cri ti cal and highl y-rel iable applica tions. Al l sensor nodes in these time-cri tical WSNs should meet the li fetime cons train t at an y time instance , else i t may cause seve re consequen ces tha t in vol ve economic losses, or even fa tali ties. In the lite ra ture , cluste ring sensors into groups is a popular strateg y to maximi ze the ne twork li fe time, bu t none of the clustering algo ri thms address the predictabili ty issue for time-cri tical WSNs. In this paper, the High Energ y First (H EF) cluste ring algori thm is chosen as a design refe rence model, whi ch is pro ved in this pape r to be a n op timal cluste ring policy u nder certain ideal condi tions. To address netwo rk life time p redictabili ty in practice , the ne twork life time bounds and feasibili ty test for the H EF a re de veloped via the worst case energ y consumption anal ysis. The ne twork simulator 2 (NS2 ) is used to veri fy the prop osed network li fetime predictabili ty model, and the resul ts show that the de ri ved bounds of the predictabili ty pro vide accura te estimatio ns o f the s ystem li fe time.
NCCT
Promise for the Best Projects
ANOMALY DETECTION IN NETWORK TRAFFIC BASED ON STATISTICAL INFERENCE AND ALPHA-STABLE MODELING
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions July-Aug. 2011 ABSTRACT This paper proposes a no vel method to detect anomalies in network traffi c, based on a nonrestricted -stable first-orde r model and sta tisti cal h ypo thesis testing . To this end, we gi ve statis tical e vidence tha t th e marginal distribu tion o f rea l traffi c is adequatel y modeled with -stabl e fun ctions and classify tra ffic pa tterns b y means of a Gene rali zed Li kelihood Ra tio Test (GLRT). The method au tomatica ll y chooses tra ffic windows used as a reference , which the tra ffic window und er test is compared wi th , wi th no e xpert in terven tion nee ded to tha t end . We fo cus on dete cting two anomal y types, namel y floods and flashcrowds, which ha ve been frequen tl y studi ed in the li tera ture. Performance o f our dete ction method has been measured through Recei ve r Opera ting Cha racteris tic (R OC) curves and results indica te that ou r method outperfo rms the closel y-rela ted sta te-o f-the -art con tri butio n described in . Al l e xperiments use traffi c data colle cte d from two rou ters at our uni ve rsity-a 25,000 studen ts institu tion-w hich pro vide two di fferen t le vels of tra ffi c aggrega tion fo r our tests (tra ffic a t a p articula r school an d the whole uni versity). In addi tion , the tra ffic model is tested with publicl y a vailable tra ffic traces. Due to the comple xi ty o f -sta ble distribu tions, care has been taken in designing appropria te numerical algo ri thms to deal wi th the model .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
EFFICIENT FAULT DETECTION AND DIAGNOSIS IN COMPLEX SOFTWARE SYSTEMS WITH INFORMATIONTHEORETIC MONITORING
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions on ABSTRACT Ma nagement metrics o f comple x software sys tems exhibi t stable co rrel ations which can enab le faul t de te ctio n and diagnosis. Cu rren t approa ches use specifi c anal yti c fo rms, typi call y linea r, for modeling correla tions. In practice , more complex non linear rel ationships e xist be tween metri cs. Mo reo ve r, most in te rmetri c correl ations fo rm cluste rs ra ther th an simple pairwise correla tions . Th ese clusters pro vide addi tional information and o ffe r the possibility for op timi za tion . In this pape r, we add ress these issues by using Normali zed Mu tual Information (N MI) as a similarity measure to iden ti fy clusters of co rrela ted metrics, wi thou t assuming any speci fic form for the metri c relatio nships. We show how to appl y the Wilco xon Rank-Sum test on the en trop y measures to detect e rro rs in the s ystem. We also present th ree diagn osis algorithms to l oca te faul ty components: Rati oSco re , based on the Ja cca rd coe ffici ent, SigScore , which incorpora tes knowledge o f component depe ndencies, and Ba yesianScore , which uses Ba yesian i nfe rence to assign a faul t probab ility to ea ch component. We e valu ate ou r approach in the conte xt of a comple x en terp rise applica tion , and show that 1 ) stable , nonlinea r correla tions e xist and can be cap tured w ith ou r approach ; 2 ) we can de tect a l arge fra ction o f faul ts with a low false positi ve ra te (we dete ct u p to 18 o f the 22 faul ts we injected); and 3 ) we impro ve the diagnosis with our new diagnosis algo rithms.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
ABSTRACT In this work, a scheme for ke y distri butio n and netw ork access in a Wi reless Sensor Netw ork (WSN) tha t u tili zes Iden ti ty-Based Cryp tog raph y (IBC) is presented . The scheme is anal yzed on the AR M92 0T p rocessor and measurements were taken fo r the run time and ene rg y o f i ts componen ts. It was found tha t the Ta te pairing componen t o f the scheme consumes significan t amounts of energ y, and so should be ported to ha rdware. An a ccele rato r was implemented in 65 nm Complementary Me tal Oxide Sili con (C MOS) technolo g y a nd a rea, timing, and ene rg y figures ha ve been ob tained fo r the design. Results indica te tha t a hardwa re implementa tion of IBC w ould meet the strict energ y cons train t requi red of a wire less sensor netwo rk node .
NCCT
Promise for the Best Projects
REPLICA PLACEMENT FOR ROUTE DIVERSITY IN TREEBASED ROUTING DISTRIBUTED HASH TABLES
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions May-June 2011 ABSTRACT Distribu ted hash tables (DH Ts) share storage and rou ting responsibility among all nodes in a peer-to-p eer ne twork. Th ese netwo rks ha ve bound ed pa th leng th unlike unstructu red ne two rks. Unfo rtunatel y, nodes can den y a ccess to ke ys o r misroute loo kups. We add ress both o f these problems through replica pla cement. We cha racteri ze tree -based rou ting DH Ts and define Ma xDisjoin t, a repli ca placement tha t crea tes rou te di versity for these DH Ts. We p ro ve that this placement crea tes disjoint rou tes and find the repli ca tion deg ree necessary to produce a desired number o f disjoin t rou tes. Using simulations of Pastry (a tree-b ased routi ng DHT), we e valua te the impact of Ma xDisjoin t on routing rob ustness compared to other placements when nodes are compromised at ra ndom or in a con tiguous run . Furthermore , we co nsider ano ther rou te di ve rsity mecha nism that we call neighbor set rou ting a nd show that, w hen used wi th ou r repl ica pla cement, i t can successfully rou te messages to a correct re plica e ven wi th a quarte r of the nodes in the s ystem compromised a t random. Finall y, we demonstra te a famil y o f repl ica que ry stra tegies tha t can trade o ff response time and sys tem load. We p resent a h ybrid query strateg y tha t keeps response time lo w wi thou t produ cing too high a loa d.
NCCT
Promise for the Best Projects
ROBUST CORRELATION OF ENCRYPTED ATTACK TRAFFIC THROUGH STEPPING STONES BY FLOW WATERMARKING
Depe nda ble a nd Se cure C om puting, IEEE Tra nsactions May-June 2011 ABSTRACT
Netwo rk-ba sed intrude rs seldom attac k their victims direc tly f rom their o wn compute r. O ften, they stage their attac ks th rough intermediate stepping stone s in orde r to conceal their identity and origin. To identify the source of the at tac k behind the stepping stone (s), it i s ne ce ssa ry to correlate the incoming and outgoing flows o r conne ction s of a stepping stone. To re si st attempt s a t co rrelation, the atta c ke r may enc rypt or otherwi se manipulate the connection t raffic. Timing-ba sed co rrelation approache s have been shown to be quite effe ctive in correlating encryp ted connection s. Ho weve r, timing-ba sed co rrelation approache s a re subject to timing pertu rbation s that may be deliberately introdu ced by the atta c ke r at stepping stone s. In this pape r, we p ropo se a novel wate rmark-ba sed -co rrelation scheme that is de signed spe cifically to be robu st again st timing perturbation s. Unlike mo st p reviou s timing-ba sed correlation approa che s, ou r wate rmark-ba sed approa ch i s active in that it embed s a unique wa terma rk into the enc rypted flows by slightly adju sting the timing of selected pac ket s. The unique waterma rk that i s embedded in the encrypted flow give s us a number of ad vantage s ove r pa ssi ve timing-ba sed co rrelation in re si sting timing pertu rbation s by the attac ker. In cont ra st to the exi sting pa ssive correlation approache s, ou r active wate rmark-ba sed correlation does not ma ke any limiting assumption s about the distribution or random proce ss of the original interpac ket timing of the pac ke t flow. In theory, ou r wate rmark-ba sed co rrelation can achieve arbitra rily clo se to 100 percent co rrelation true po sitive ra te (TPR), and arbitra rily clo se to 0 percent fal se po sitive rate (FP R) at the same time for sufficiently long flows, de spite arbitra rily large (but bounded ) timing pertu rbation s of any di stribution by the attac ke r. Our pape r i s the fi rst that identifies 1) accura te quantitative t radeoff s between the achievable co rrelation effectivene ss a - - nd the defining characte ri stic s of the timing perturbation; and 2) a provable upper bound on the number o f pac ke t s needed to achieve a de si red correlation effectivene ss, given the amount of timing pertu rbation. Experimental re sult s show that our a ctive waterma rk-ba sed correlation perfo rm s bette r and require s fe we r pac ket s than exi sting, pa ssive timing-ba sed correlation methods in the pre sence of random timing pertu rbation s.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
ABSTRACT While pee r-to-pe er ne tworks are mainl y used to loca te uni que resources across the In te rnet, new interesting deplo ymen t scenarios are emerging. Pa rticula rl y, some applications (e.g ., VoIP) are proposing the crea tion o f o verla ys for the locali za tion o f services b ased on equi va lent serva nts (e .g., voi ce rela ys). This paper e xplores th e possible ove rla y a rchi te ctu res tha t ca n be adop ted to pro vide such servi ces, showing how an u nstru ctu red solution based on a scalefree o verla y topolog y is an effe cti ve op tion to deplo y in this con te xt. Consequentl y, we propose EQU ATOR (EQUi valen t servAn t loca TOR), an unstructure d o verla y implementing th e abo ve mentioned op era ting principles, based on an overla y cons truction algo ri thm tha t well appro ximates an ideal scalefree co nstru ctio n model . We p resent bo th ana l ytical and simulation results which support our o verla y topolog y selection and val idate the prop osed archi tecture .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
THROUGHPUT OPTIMIZATION IN MULTIHOP WIRELESS NETWORKS WITH MULTIPACKET RECEPTION AND DIRECTIONAL ANTENNAS
Paralle l and D istr ibute d System s, IEEE Tr ansa ctions July 201 1 ABSTRACT Recent ad vances in the ph ysical la yer ha ve e nabled the simultaneous recep tion of multipl e packets b y a node in wire less networks . We address the th roughpu t optimi za tion problem in wireless networks that support multipacket re cep tion (MPR ) capabili ty. The problem is modeled as a joint routin g and scheduling problem, whi ch is known to be NP-hard . The scheduling subproblem deals with finding the optimal schedulable sets, w hich a re de fined as subsets of lin ks tha t can be scheduled o r acti vated simultaneously. We demonstra te tha t an y solution o f the scheduling subproblem can be built with |E| + 1 or fe wer schedulable sets, whe re |E| is the number o f li nks o f th e ne two rk. This result is in contras t with p re vious works tha t sta ted that a soluti on of the scheduling subproblem is composed of a n e xpo nenti al number o f schedu lable sets. Due to the hardness of the problem , we p ropose a pol ynomial time scheme based on a combination of linear programming and appro ximation algo rithm paradigms. We ill ustra te the use o f the scheme to s tud y the impact o f design paramete rs on the pe rfo rmance o f MPR-capable ne two rks, including th e number o f transmit interfa ces, the beamwid th, and the re cei ve r range o f the an tennas.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
In re cen t years , various immunizatio n stra tegies ha ve been p roposed and demonstrated , most of which rest on the assumptions that the stra tegies can be execu ted in a cen tra li zed manner and /or tha t the comple x ne twork a t hand is reasonabl y stable (i ts topolog y will no t change o ve rtime). In o the r words, it would be diffi cul t to appl y them in a decentra li zed ne twork en vironment, as often found in the real worl d. In this paper, we propose a d ecen trali zed and scalable immuni zation strateg y based on a self-organi ze d computing app roach called au tonom y-o rien ted computing (AOC) [1 ], [2 ]. In this stra teg y, au tonomous beha vio r-based en tities are deplo yed in a de cen trali zed ne twork, and a re capab le o f colle cti vel y fi nding those nodes wi th high degrees o f conducti vities (i.e ., those tha t can readil y spread vi ruses). Through e xpe riments in vol ving bo th s yn the tic an d real -world networks , we demonstrate tha t this stra teg y can e ffecti vel y and e fficien tl y lo ca te highl yconnected nodes in dece ntrali zed comple x ne twork en vi ronments of various topologies, and i t is also scalable in handli ng la rge-scale de cen trali zed netw orks. We ha ve compared our stra teg y w ith some of the well -know n stra tegies, incl uding acquain tance and co vering stra tegies on bo th s yn the tic and real-wo rld networks .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
A DATA THROUGHPUT PREDICTION AND OPTIMIZATION SERVICE FOR WIDELY DISTRIBUTED MANY-TASK COMPUTING
Paralle l and D istr ibute d System s, IEEE Tr ansa ctions June 201 1 Abstrac t In this paper, we p resent the design and implementa tion of a n applica tion -la ye r data th roughpu t p rediction and optimi za tion servi ce for man y-task computing in widel y distribu ted en vi ronments. This service uses multiple parallel TCP streams to impro ve the e nd-to-end throu ghpu t o f da ta transfers . A n o vel mathema tical model is de veloped to de te rmine the number o f pa rallel streams, requi red to achie ve the best ne twork pe rfo rmance . This model can predict the optimal number of paral lel streams with as few as th ree pred iction points. We implement this new service i n th e Stork Da ta Scheduler, whe re the pred iction points can be obta ined using Ip erf and Grid FTP samplings. Our results show tha t the prediction cost plus th e op timized transfe r time is much less than the nonoptimi zed transfe r time in most cases. As a resul t, Stork da ta tra nsfer jobs wi th optimization service can be comple ted much earlie r, compared to nonop timi zed da ta transfe r jo bs.
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NONLOCAL PDES-BASED MORPHOLOGY ON WEIGHTED GRAPHS FOR IMAGE AND DATA PROCESSING
Ima ge Pr ocess ing, IEEE Tra nsactions June 2011 ABSTRACT Ma thema tical morpholog y (MM) offe rs a wide range o f opera tors to a ddress va rious image processing problems. These operators can be defined in te rms of algebraic (discre te) sets o r as partial di ffe ren tial equa tions (PDEs). In this paper, we in trodu ce a nonlo cal PD Es-based morphological framework defined on wei ghted gra phs. We present and a nal yze a set o f opera tors tha t leads to a famil y o f discre ti ze d morpholo gical PD Es on weigh ted graphs . Our fo rmulation in trodu ces nonloca l pa tch -based con figu rations fo r image processing and e xtends PD Es-based approach to the pro cessing of arbi tra ry da ta such as nonuniform high dimensional data. Finall y, we show the po ten tiali ties of our methodolog y in order to process, segment and classify images and arbitrary data .
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
NCCT
Promise for the Best Projects
CONTEXTUAL KERNEL AND SPECTRAL M ETHODS FOR LEARNING THE SEM ANTICS OF IM AGES
Ima ge Pr ocess ing, IEEE Tra nsactions June 2011 ABSTRACT This paper p resents con te xtual kern el and spectral methods fo r lea rning the semantics of images that allow us to automaticall y ann ota te an image with ke ywords . Fi rst, to e xploi t the conte xt of visual words wi thin images for au tomati c image annota tion , we de fine a n o vel spatial strin g ke rnel to quan ti fy the similarity between images. Speci ficall y, we represen t each image as a 2-D sequence of visual words and measure the similarity be tween two 2 -D sequences using the shared o ccurrences of s -length 1-D subsequences by decomposing each 2-D sequence into two orthogo nal 1-D sequences. Based on our proposed spati al string ke rnel , we fu rther fo rmulate au tomati c image annotation as a conte xtual ke yword p ropaga tion probl em, which can be solved ve ry e ffi cien tl y b y linea r prog ramming. Unlike the tradi tiona l rele van ce models that trea t each ke ywo rd independen tl y, the pro posed conte xtual ke rnel method for ke yword propaga tion takes into account the semantic conte xt o f annota tion ke ywords a nd p ropaga tes multi ple ke ywo rds simultaneousl y. Signifi can tl y, this type o f semantic con te xt can also be in corpo ra ted in to spectral embedding for refining the anno ta tions of images predicted b y ke ywo rd propaga tion . Expe riments on th ree standa rd image datasets demonstra te that ou r conte xtual ke rnel and spectral methods can a chie ve significa ntl y be tte r results than th e state o f the a rt.
NCCT
Promise for the Best Projects
Traditional decision tree classiers work with data whose values are known and precise. We extend such classiers to handle data with uncertain information, which originates from measurement/quantisation errors, data staleness, multiple repeated measurements, etc. The value uncertainty is represented by multiple values forming a probability distribution function (pdf). We discover that the accuracy of a decision tree classier can be much improved if the whole pdf, rather than a simple statistic, is taken into account. We extend classical decision tree building algorithms to handle data tuples with uncertain values. Since processing pdfs is computationally more costly, we propose a series of pruning techniques that can greatly improve the efficiency of the construction of decision trees.
NCCT
Promise for the Best Projects